贿赂 发表于 2025-3-27 00:37:31

Privacy and Informational Self-determination Through Informed Consent: The Way Forwardinformed consent”, which allows it to do as it pleases with your Personal Information (PI). Although many developed countries have enacted privacy laws and regulations to govern the collection and use of PI as a response to the increased misuse of PI, these laws and regulations rely heavily on the c

BOOST 发表于 2025-3-27 02:04:09

Building a Privacy Testbed: Use Cases and Design Considerationscommon practice of using third-party libraries to provide critical functionality. To add to the complexity, most mobile applications interact with the “cloud”—not only the platform provider’s ecosystem (such as Apple or Google) but also with third-party servers (as a consequence of library use). Thi

legislate 发表于 2025-3-27 06:43:02

http://reply.papertrans.cn/24/2339/233880/233880_33.png

SNEER 发表于 2025-3-27 13:02:14

TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment, etc. With the advancement of IoT technologies, the IoT platforms bring many new features to the IoT devices so that these devices can not only passively monitor the environment (e.g. conventional sensors), but also interact with the physical surroundings (e.g. actuators). In this light, new proble

Antarctic 发表于 2025-3-27 17:05:09

Adversarial Command Detection Using Parallel Speech Recognition Systemss; an attacker is able to modify an audio signal such that humans do not notice this modification but the Speech Recognition (SR) will recognise a command of the attacker’s choice. In this paper we describe a defence method against such adversarial commands. By using a second SR in parallel to the m

墙壁 发表于 2025-3-27 19:17:47

Security Measuring System for IoT Devicess for the end users and producers that will allow them to understand how secure their IoT devices are and to compare these devices with each other, as well as to enhance the security of the devices. The paper proposes a security measuring system that is based on the hierarchy of metrics representing

heartburn 发表于 2025-3-27 23:13:15

http://reply.papertrans.cn/24/2339/233880/233880_37.png

defendant 发表于 2025-3-28 02:13:03

A Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical Systemshysical systems, two practical application and validation scenarios are presented. In the first case we apply our ontology to fill in some gaps into the National Vulnerability Database, by utilizing a logistic classifier trained by a subset of the NVD, with the purpose of predicting missing values f

公共汽车 发表于 2025-3-28 07:57:11

Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysicarein for selecting a set of security controls that minimizes both the residual risk and the cost of implementation. We use the DELTA demand-response management platform for the energy market stakeholders such as Aggregators and Retailers [.] as a use case to illustrate the workings of the proposed a

独行者 发表于 2025-3-28 14:28:04

Analysis of Cyber Security Features in Industry 4.0 Maturity Modelsto assess the negative impact on business caused by cyber security attacks in Industry 4.0. So-called maturity models are useful instruments for this purpose. However, it has not yet been thoroughly investigated which maturity models from the literature can be used to assess cyber security in the co
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Computer Security. ESORICS 2021 International Workshops; CyberICPS, SECPRE, A Sokratis Katsikas,Costas Lambrinoudakis,Marco Anto Conference