muffler 发表于 2025-3-25 07:22:47

Communication and Cybersecurity Testbed for Autonomous Passenger Shipintroduced to maritime infrastructure, which includes ships, ports, and other facilities. Digital transformation in maritime has among its goals reducing human involvement and improving remote connectivity. The achievement of these goals hinges on several components, including communication technolo

卜闻 发表于 2025-3-25 09:10:05

A Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical Systemsent procedures applied on complex cyber-physical systems. The proposed ontology unifies information from an extensive collection of known cybersecurity datasets, semi-structured or unstructured (text) data from public security reports, environmental security information gathered from network securit

CRASS 发表于 2025-3-25 12:37:57

http://reply.papertrans.cn/24/2339/233880/233880_23.png

原告 发表于 2025-3-25 17:23:00

Integrated Design Framework for Facilitating Systems-Theoretic Process Analysisep approach is followed by safety experts irrespective of any software based tool-support, but identified hazards should be associated with security risks and human factors issues. In this paper, a design framework using Integrating Requirements and Information Security (IRIS) and open source Comput

evasive 发表于 2025-3-25 20:49:36

Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysicane physical and cyber components and connect to each other. This interconnection enables the offering of functionality beyond the combined offering of each individual component, but at the same time increases the cyber risk of the overall system, as such risk propagates between and aggregates at com

Muscularis 发表于 2025-3-26 01:23:08

http://reply.papertrans.cn/24/2339/233880/233880_26.png

运气 发表于 2025-3-26 06:04:42

http://reply.papertrans.cn/24/2339/233880/233880_27.png

治愈 发表于 2025-3-26 12:25:27

Integrating Privacy-By-Design with Business Process Redesignsonal data regulation (e.g., the General Data Protection Regulation – GDPR in the EU) is a necessity, while requirements for privacy-by-design need also to be met. This paper proposes a comprehensive method to support the identification, modelling, (re)design, implementation, and realisation of priv

装饰 发表于 2025-3-26 15:47:53

http://reply.papertrans.cn/24/2339/233880/233880_29.png

Atheroma 发表于 2025-3-26 18:26:06

http://reply.papertrans.cn/24/2339/233880/233880_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Computer Security. ESORICS 2021 International Workshops; CyberICPS, SECPRE, A Sokratis Katsikas,Costas Lambrinoudakis,Marco Anto Conference