|
Showing 1 - 5 of
5 matches in All Departments
This book constitutes the refereed proceedings of the 9th
International Workshop on Security and Trust Management, STM 2013,
held in Egham, UK, in September 2013 - in conjunction with the 18th
European Symposium Research in Computer Security (ESORICS 2013).
The 15 revised full papers including two invited talks were
carefully reviewed and selected from 47 submissions. The papers are
organized into topical sections on policy enforcement and
monitoring; access control; trust, reputation, and privacy;
distributed systems and physical security; authentication and
security policies.
|
Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, …
|
R1,043
Discovery Miles 10 430
|
Ships in 9 - 17 working days
|
This book constitutes the refereed proceedings of the First
International Workshop on Cyber-Physical Security for Critical
Infrastructures Protection, CPS4CIP 2020, which was organized in
conjunction with the European Symposium on Research in Computer
Security, ESORICS 2020, and held online on September 2020.The 14
full papers presented in this volume were carefully reviewed and
selected from 24 submissions. They were organized in topical
sections named: security threat intelligence; data anomaly
detection: predict and prevent; computer vision and dataset for
security; security management and governance; and impact
propagation and power traffic analysis. The book contains 6
chapters which are available open access under a CC-BY license.
|
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, …
|
R1,523
Discovery Miles 15 230
|
Ships in 10 - 15 working days
|
This book constitutes the refereed post-conference proceedings of
the Second International Workshop on Information & Operational
Technology (IT & OT) security systems, IOSec 2019 , the First
International Workshop on Model-driven Simulation and Training
Environments, MSTEC 2019, and the First International Workshop on
Security for Financial Critical Infrastructures and Services,
FINSEC 2019, held in Luxembourg City, Luxembourg, in September
2019, in conjunction with the 24th European Symposium on Research
in Computer Security, ESORICS 2019. The IOSec Workshop received 17
submissions from which 7 full papers were selected for
presentation. They cover topics related to security architectures
and frameworks for enterprises, SMEs, public administration or
critical infrastructures, threat models for IT & OT systems and
communication networks, cyber-threat detection, classification and
pro ling, incident management, security training and awareness,
risk assessment safety and security, hardware security,
cryptographic engineering, secure software development, malicious
code analysis as well as security testing platforms. From the MSTEC
Workshop 7 full papers out of 15 submissions are included. The
selected papers deal focus on the verification and validation
(V&V) process, which provides the operational community with
confidence in knowing that cyber models represent the real world,
and discuss how defense training may benefit from cyber models. The
FINSEC Workshop received 8 submissions from which 3 full papers and
1 short paper were accepted for publication. The papers reflect the
objective to rethink cyber-security in the light of latest
technology developments (e.g., FinTech, cloud computing,
blockchain, BigData, AI, Internet-of-Things (IoT), mobile-first
services, mobile payments).
This book constitutes the refereed proceedings of the 30th Annual
IFIP WG 11.3 International Working Conference on Data and
Applications Security and Privacy, DBSec 2016, held in trento,
Itlay, in July 2016. The 17 full papers and 7 short papers
presented were carefully reviewed and selected from 54 submissions.
Their topics cover a wide range of data and application security
and privacy problems including those of mobile devices,
collaborative systems, databases, big data, virtual systems, cloud
computing, and social networks. The program also included
twoinvited talks.
This book constitutes the proceedings of the 10th International
Symposium on Frontiers of Combining Systems, FroCoS 2015, held in
Wroclaw, Poland, in September 2015. The 20 papers presented in this
volume were carefully reviewed and selected from 34 submissions.
They were organized in topical sections named: description logics;
theorem proving and model building; decision procedures; decision
procedures for verification; rewriting and constraint solving;
transformations between symbolic systems; combination methods; and
reasoning in large theories. The book also contains one invited
talk in full-paper length.
|
|