找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computer Security. ESORICS 2021 International Workshops; CyberICPS, SECPRE, A Sokratis Katsikas,Costas Lambrinoudakis,Marco Anto Conference

[复制链接]
楼主: Bunion
发表于 2025-3-27 00:37:31 | 显示全部楼层
Privacy and Informational Self-determination Through Informed Consent: The Way Forwardinformed consent”, which allows it to do as it pleases with your Personal Information (PI). Although many developed countries have enacted privacy laws and regulations to govern the collection and use of PI as a response to the increased misuse of PI, these laws and regulations rely heavily on the c
发表于 2025-3-27 02:04:09 | 显示全部楼层
Building a Privacy Testbed: Use Cases and Design Considerationscommon practice of using third-party libraries to provide critical functionality. To add to the complexity, most mobile applications interact with the “cloud”—not only the platform provider’s ecosystem (such as Apple or Google) but also with third-party servers (as a consequence of library use). Thi
发表于 2025-3-27 06:43:02 | 显示全部楼层
发表于 2025-3-27 13:02:14 | 显示全部楼层
TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment, etc. With the advancement of IoT technologies, the IoT platforms bring many new features to the IoT devices so that these devices can not only passively monitor the environment (e.g. conventional sensors), but also interact with the physical surroundings (e.g. actuators). In this light, new proble
发表于 2025-3-27 17:05:09 | 显示全部楼层
Adversarial Command Detection Using Parallel Speech Recognition Systemss; an attacker is able to modify an audio signal such that humans do not notice this modification but the Speech Recognition (SR) will recognise a command of the attacker’s choice. In this paper we describe a defence method against such adversarial commands. By using a second SR in parallel to the m
发表于 2025-3-27 19:17:47 | 显示全部楼层
Security Measuring System for IoT Devicess for the end users and producers that will allow them to understand how secure their IoT devices are and to compare these devices with each other, as well as to enhance the security of the devices. The paper proposes a security measuring system that is based on the hierarchy of metrics representing
发表于 2025-3-27 23:13:15 | 显示全部楼层
发表于 2025-3-28 02:13:03 | 显示全部楼层
A Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical Systemshysical systems, two practical application and validation scenarios are presented. In the first case we apply our ontology to fill in some gaps into the National Vulnerability Database, by utilizing a logistic classifier trained by a subset of the NVD, with the purpose of predicting missing values f
发表于 2025-3-28 07:57:11 | 显示全部楼层
Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysicarein for selecting a set of security controls that minimizes both the residual risk and the cost of implementation. We use the DELTA demand-response management platform for the energy market stakeholders such as Aggregators and Retailers [.] as a use case to illustrate the workings of the proposed a
发表于 2025-3-28 14:28:04 | 显示全部楼层
Analysis of Cyber Security Features in Industry 4.0 Maturity Modelsto assess the negative impact on business caused by cyber security attacks in Industry 4.0. So-called maturity models are useful instruments for this purpose. However, it has not yet been thoroughly investigated which maturity models from the literature can be used to assess cyber security in the co
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-3 15:41
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表