رکورد قبلیرکورد بعدی

" Computer security : "


Document Type : BL
Record Number : 861010
Main Entry : European Symposium on Research in Computer Security(23rd :2018 :, Barcelona, Spain)
Title & Author : Computer security : : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised selected papers /\ Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Publication Statement : Cham :: Springer,, 2019.
Series Statement : Lecture notes in computer science ;; 11387
: LNCS sublibrary. SL 4, Security and cryptology
Page. NO : 1 online resource (x, 233 pages) :: illustrations (some color)
ISBN : 3030127850
: : 3030127869
: : 3030127877
: : 9783030127855
: : 9783030127862
: : 9783030127879
: 9783030127855
Contents : Intro; Preface; Organization; Contents; Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2018); Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning; 1 Introduction; 2 Experimental Set-Up; 2.1 Modbus Protocol; 2.2 Sensors and PLC; 2.3 Operation Mode; 3 Dataset; 3.1 Scenarios; 3.2 Pre-processing; 4 Experiments and Results; 4.1 Parameters; 4.2 First Experiment; 4.3 Second Experiment; 4.4 Third Experiment; 5 Discussion and Limitations; 6 Related Work; 7 Conclusion and Future Work; References; Cyber-Attacks Against the Autonomous Ship
: 1 Introduction2 Related Work; 3 The ICT Architecture of the Cyber-Enabled Ship; 4 Identifying and Analyzing Attacks Against the Cyber-Enabled Ship; 4.1 Methodology; 4.2 Applying STRIDE to the Cyber-Enabled Ship; 5 Summary of Results and Discussion; 6 Conclusions and Future Work; References; EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security; 1 Introduction; 2 Architecture of EPIC; 2.1 Views of EPIC; 3 Experiments with EPIC; 3.1 Feasible Attack Scenarios; 3.2 Power Supply Interruption Attack; 3.3 Physical Damage Attack; 4 Cascading Effects
: 4 Results4.1 One-Class Support Vector Machines; 4.2 Support Vector Machines; 4.3 Neural Networks; 4.4 Long Short Term Memory Neural Networks; 5 Discussion; 6 Related Work; 7 Conclusion; References; SDN-Enabled Virtual Data Diode; 1 Introduction; 2 Data Diodes for IACS Security; 2.1 Data Diode Products; 3 Leveraging SDN to Virtualize the Data Diode; 3.1 Proactive Data Diode; 3.2 Reactive Data Diode; 3.3 NFV-Assisted Data Diode; 4 Proof-of-Concept Virtual Data Diode Prototype; 5 Evaluation; 5.1 Experimental Testbed; 5.2 Validation and Lessons Learned; 6 Conclusion; References
: 5 Related Work6 Conclusion and Future Work; References; A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles; 1 Introduction; 2 Related Work; 2.1 Limitations of Current Approaches; 3 The Setting; 3.1 The Reference Architecture; 3.2 The Characteristics of CAN Communication; 3.3 Attack Model; 4 Hardware Based Bus Count Solution; 5 Formalization and Proof; 5.1 The Security Modeling Framework SeMF; 5.2 The Formal Model; 5.3 Verification of the Formal Model; 6 Discussion and Conclusions; References
: Enhancing Usage Control for Performance: An Architecture for Systems of Systems1 Introduction; 2 Background and Related Work; 2.1 RBAC -- ABAC; 2.2 Usage Control; 2.3 Risk Aggregation; 3 The Proposed Architecture; 3.1 The Architectural Model and its Components; 3.2 Protocol and Interface; 4 Test Case; 5 Conclusion; References; Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection; 1 Introduction; 2 Data Sets; 3 Machine Learning Methods; 3.1 One-Class Support Vector Machines; 3.2 Support Vector Machines; 3.3 Neural Networks; 3.4 Long Short Term Memory Neural Networks
Abstract : This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.
Subject : Computer networks-- Security measures, Congresses.
Subject : Computer security, Congresses.
Subject : Data encryption (Computer science), Congresses.
Subject : Data protection, Congresses.
Subject : Computer networks-- Security measures.
Subject : Computer security.
Subject : Data encryption (Computer science)
Subject : Data protection.
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬
Added Entry : Antón, Annie I.
: Cuppens, Frédéric
: Cuppens, Nora
: Gritzalis, Stefanos
: Kalloniatis, Christos
: Katsikas, Sokratis K.
: Lambrinoudakis, Costas
: Mylopoulos, John
Added Entry : CyberICPS (Workshop)(4th :2018 :, Barcelona, Spain)
: SECPRE (Workshop)(2nd :2018 :, Barcelona, Spain)
Parallel Title : CyberICPS 2018
: : SECPRE 2018
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟