陈旧 发表于 2025-3-30 08:13:46
http://reply.papertrans.cn/24/2339/233834/233834_51.png补充 发表于 2025-3-30 15:03:38
http://reply.papertrans.cn/24/2339/233834/233834_52.png乳汁 发表于 2025-3-30 17:49:40
Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessmenttraining their secure coding skills. The impact of our work is to introduce a new automatic challenge evaluation method together with a virtual coach to improve existing cybersecurity awareness training programs. These training workshops can be easily held remotely or off-line.Latency 发表于 2025-3-30 21:17:12
http://reply.papertrans.cn/24/2339/233834/233834_54.png轻快来事 发表于 2025-3-31 04:42:31
Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Clities they may find in their systems and the best ways to detect them. We validate our proposed vulnerability categories by analysing a further 6 months of ICS Advisory reports, which shows that our categories continue to dominate the reported weaknesses. We further validate our proposed detection表否定 发表于 2025-3-31 06:52:25
Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepteria concern both users’ social norms and technical privacy artifacts. Based on these criteria, the social and technical privacy aspects that should be considered from both users’ and developers’ perspective are discussed, leading to the identification of the socio-technical concepts and their interHiatal-Hernia 发表于 2025-3-31 10:11:15
Definition and Verification of Security Configurations of Cyber-Physical Systemsurity requirements that, through a defined security feature model, will result in a configuration of services and security properties of the CPS, whose correctness can be verified. For this last stage, we have created a catalogue of feature models supported by a tool that allows the automatic verifiperiodontitis 发表于 2025-3-31 13:53:40
http://reply.papertrans.cn/24/2339/233834/233834_58.pngLITHE 发表于 2025-3-31 20:36:47
Aligning the Concepts of Risk, Security and Privacy Towards the Design of Secure Intelligent Transpoices. This paper moves into this direction by identifying how risk analysis can interact with security and privacy requirements engineering world, in order to provide a holistic approach for reasoning about security and privacy in such complex environments like ITS systems. The key contribution of t炼油厂 发表于 2025-3-31 22:03:17
http://reply.papertrans.cn/24/2339/233834/233834_60.png