Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers

Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers
ISBN-10
3030420485
ISBN-13
9783030420482
Series
Computer Security
Category
Computers
Pages
440
Language
English
Published
2020-02-21
Publisher
Springer Nature
Authors
John Mylopoulos, Steven Furnell, Christos Kalloniatis

Description

This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The CyberICPS Workshop received 13 submissions from which 5 full papers and 2 short papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 9 full papers out of 14 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. The SPOSE Workshop received 7 submissions from which 3 full papers and 1 demo paper were accepted for publication. They demonstrate the possible spectrum for fruitful research at the intersection of security, privacy, organizational science, and systems engineering. From the ADIoT Workshop 5 full papers and 2 short papers out of 16 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Other editions

Similar books

  • Computer Security Basics
    By Rick Lehtinen, Deborah Russell, G. T. Gangemi

    A shield attenuates electromagnetic signals, conducting them to ground before they can escape. A shield, which can be as small as a cable casing or as large as an entire building, is constructed in such a way that signals can't emanate ...

  • Introduction to Computer Security
    By Matthew A. Bishop

    In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples...

  • Computer Security: Art and Science
    By Matt Bishop, Matthew A. Bishop

    "This is an excellent text that should be read by every computer security professional and student." Dick Kemmerer, University of California, Santa Barbara.

  • Computer Security Fundamentals
    By Chuck Easttom

    This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense.

  • Computer Security - ESORICS 94: Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9,...
    By Dieter Gollmann

    This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.

  • Computer Security
    By Stuart E. Madnick, David K. Hsiao, Douglas S. Kerr

    Privacy and its technical implications on security; Operational security; Physical security; Hardware security; Operating system security; Database security.

  • Halting the Hacker: A Practical Guide to Computer Security
    By Donald L. Pipkin

    Contents PART I : Foreword Preface Understanding Hackers The Hacking Environment XV xix 1 1 Historic Perspective Hacker or Cracker CHAPTER 1 : Who Hackers Are Internal Hackers 2 3 5 5 External Hackers Categorizing Hackers Demographics ...

  • Computer Security in the 21st Century
    By D.T. Lee, S. P. Shieh, Doug Tygar

    Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

  • Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions
    By Ramesh Subramanian

    "This book offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as ...

  • Computer and Information Security Handbook
    By John R. Vacca

    Cellular Network Attack Taxonomy Abstract Model Abstract Model Findings Three-Dimensional Attack Taxonomy 5. Cellular Network Vulnerability Analysis Cellular Network Vulnerability Assessment Toolkit (CAT) Advanced Cellular Network ...