


default search action
CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: Copenhagen, Denmark
- Sokratis K. Katsikas
, Frédéric Cuppens
, Christos Kalloniatis
, John Mylopoulos, Frank Pallas
, Jörg Pohle
, M. Angela Sasse
, Habtamu Abie
, Silvio Ranise
, Luca Verderame
, Enrico Cambiaso
, Jorge Maestre Vidal
, Marco Antonio Sotelo Monge
, Massimiliano Albanese
, Basel Katt
, Sandeep Pirbhulal
, Ankur Shukla
:
Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13785, Springer 2023, ISBN 978-3-031-25459-8
8th Workshop on Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2022)
- Aida Akbarzadeh
, Sokratis K. Katsikas
:
Towards Comprehensive Modeling of CPSs to Discover and Study Interdependencies. 5-25 - Muhammad Ramadan Saifuddin
, Lin Wei, Heng Chuan Tan
, Binbin Chen:
Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study. 26-45 - Yuqing Zhu, Sridhar Adepu, Kushagra Dixit, Ying Yang, Xin Lou:
Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles. 46-66 - Adriaan de Vos
, Alessandro Brighente
, Mauro Conti
:
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions. 67-80 - Zisis Tsiatsikas
, Georgios Karopoulos
, Georgios Kambourakis:
The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP. 81-96 - Sunil Chaudhary
, Vasileios Gkioulos, David Goodman:
Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness Resources. 97-115 - Nabin Chowdhury
, Vasileios Gkioulos
:
A Framework for Developing Tabletop Cybersecurity Exercises. 116-133 - Christos Lyvas, Konstantinos N. Maliatsos, Andreas Menegatos, Thrasyvoulos Giannakopoulos, Costas Lambrinoudakis, Christos Kalloniatis, Athanasios G. Kanatas:
A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems. 134-152
6th International Workshop on Security and Privacy Requirements Engineering (SECPRE 2022)
- Mohammad Heydari, Haralambos Mouratidis, Vahid Heydari Fami Tafreshi:
OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security. 157-176 - Zisis Tsiatsikas
, Georgios Karopoulos
, Georgios Kambourakis:
Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild. 177-190
4th Workshop on Security, Privacy, Organizations, and Systems Engineering (SPOSE 2022)
- Frank Ebbers
, Murat Karaboga
:
Influencing Factors for Users' Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User Study. 195-211 - Abdelhadi Belfadel
, Martin Boyer, Jérôme Letailleur, Yohann Petiot, Reda Yaich:
Towards a Security Impact Analysis Framework: A Risk-Based and MITRE Attack Approach. 212-227 - Stephan Wiefling
, Jan Tolsdorf
, Luigi Lo Iacono
:
Data Protection Officers' Perspectives on Privacy Challenges in Digital Ecosystems. 228-247 - M. Angela Sasse, Jonas Hielscher, Jennifer Friedauer, Annalina Buckmann:
Rebooting IT Security Awareness - How Organisations Can Encourage and Sustain Secure Behaviours. 248-265
3rd Cyber-Physical Security for Critical Infrastructures Protection (CPS4CIP 2022)
- Mariano Ceccato
, Youssef Driouich, Ruggero Lanotte, Marco Lucchese, Massimo Merro:
Towards Reverse Engineering of Industrial Physical Processes. 273-290 - Ilias Gkotsis
, Leonidas Perlepes
, Aggelos Aggelis
, Katerina Valouma
, Antonis Kostaridis
, Eftichia Georgiou
, Nikolaos Lalazisis
, Vasiliki Mantzana
:
Solutions for Protecting the Space Ground Segments: From Risk Assessment to Emergency Response. 291-307 - Kushal Srivastava, Corinna Köpke, Johannes Walter, Katja Faist, John Marschalk Berry, Claudio Porretti, Alexander Stolz:
Modelling and Simulation of Railway Networks for Resilience Analysis. 308-320 - George Kokolakis, Grigoris Ntousakis, Irodotos Karatsoris, Spiros Antonatos, Manos Athanatos, Sotiris Ioannidis:
HoneyChart: Automated Honeypot Management over Kubernetes. 321-328 - Filipe Apolinário
, João Guiomar, Éric Hervé, Sven Hrastnik, Nelson Escravana, Miguel L. Pardal
, Miguel Correia
:
ComSEC: Secure Communications for Baggage Handling Systems. 329-345 - Corinna Köpke, Johannes Walter, Eros Cazzato, Catalin Linguraru, Uli Siebold, Alexander Stolz:
Methodology for Resilience Assessment for Rail Infrastructure Considering Cyber-Physical Threats. 346-361 - Maximilian Beckmann, Jan Steffan
:
Coverage-Guided Fuzzing of Embedded Systems Leveraging Hardware Tracing. 362-378 - Asya Mitseva, Paul Thierse, Harald Hoffmann, Devran Er, Andriy Panchenko:
Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research. 379-397 - Daniel De Pascale, Mirella Sangiovanni, Giuseppe Cascavilla
, Damian A. Tamburri, Willem-Jan van den Heuvel:
Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference Architecture. 398-408 - Francesco Spegni, Antonio Sabatelli, Alessio Merlo, Lucia Pepa, Luca Spalazzi
, Luca Verderame:
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case. 409-426
2nd International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge (CDT & SECOMANE 2022)
- Pedro Ramon y Cajal Ramo
, Claudia Castillo Arias
, Jorge Carlos Manzanares Martínez
, Jorge Maestre Vidal
:
A Revisitation of Clausewitz's Thinking from the Cyber Situational Awareness Perspective. 431-448 - Antonio Portilla-Figueras, Salvador Llopis Sánchez, Silvia Jiménez-Fernández, Sancho Salcedo-Sanz:
Examining 5G Technology-Based Applications for Military Communications. 449-465 - Juan León Murillo
, Marco Antonio Sotelo Monge
, Víctor A. Villagrá
:
Design of a Validation Model of the Cognitive State in Military Operations in Cyberspace. 466-481 - Inés Hernández San Román
, Marco Antonio Sotelo Monge
, Víctor A. Villagrá
:
Design and Validation of a Threat Model Based on Cyber Kill Chain Applied to Human Factors. 482-499 - Elisa Rojas
, Diego Lopez-Pajares
, Joaquin Alvarez-Horcajo
, Salvador Llopis Sánchez
:
The Cloud Continuum for Military Deployable Networks: Challenges and Opportunities. 500-519
1st International Workshop on Election Infrastructure Security (EIS 2022)
- Floyd Everest
, Michelle L. Blom
, Philip B. Stark
, Peter J. Stuckey
, Vanessa Teague
, Damjan Vukcevic
:
Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model. 525-540 - Philip B. Stark
:
Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits. 541-554 - Michael Kirsten
, Melanie Volkamer
, Bernhard Beckert
:
Why Is Online Voting Still Largely a Black Box? 555-567 - Kamryn Parker
, Hoda Mehrpouyan
, Jaclyn J. Kettler
, Chad Houck:
Connecting Incident Reporting Infrastructure to Election Day Proceedings. 568-584 - Ardita Driza Maurer, Melanie Volkamer
, Robert Krimmer
:
Council of Europe Guidelines on the Use of ICT in Electoral Processes. 585-599
1st International Workshop on System Security Assurance (SecAssure 2022)
- Shao-Fang Wen, Basel Katt:
SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation. 605-624 - Peeter Laud, Jelizaveta Vakarjuk:
A Comparison-Based Methodology for the Security Assurance of Novel Systems. 625-644 - Fateme Hashemi Chaleshtori
, Indrakshi Ray
:
Automation of Vulnerability Information Extraction Using Transformer-Based Language Models. 645-665 - Sébastien Dupont, Artsiom Yautsiukhin, Guillaume Ginis, Giacomo Iadarola, Stefano Fagnano, Fabio Martinelli, Christophe Ponsard, Axel Legay, Philippe Massonet:
Product Incremental Security Risk Assessment Using DevSecOps Practices. 666-685 - Eric Lesiuta
, Victor Bandur
, Mark Lawford
:
SLIME: State Learning in the Middle of Everything for Tool-Assisted Vulnerability Detection. 686-704

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.