会议文集


文集名Computer Security. ESORICS 2023 International Workshops
会议名28th European Symposium on Research in Computer Security (ESORICS 2023) Workshops: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI
中译名《第二十八届欧洲计算机安全研究专题研讨会 - 讨论会,卷2》
会议日期September 25-29, 2023
会议地点The Hague, The Netherlands
出版年2024
馆藏号351856


题名作者出版年
An Opportunity-Based Approach to Information Security RiskDinh Uy Tran; Sigrid Haug Selnes; Audun Josang; Janne Hagen2024
A Methodology for Cybersecurity Risk Assessment in Supply ChainsBetul Gokkaya; Leonardo Aniello; Erisa Karafili; Basel Halak2024
IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical OperationsGuilherme Saraiva; Filipe Apolinario; Miguel L. Pardal2024
Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization FrameworkTiago Fontes Dias; Joao Vitorino; Tiago Fonseca; Isabel Praca; Eva Maia; Maria Joao Viamonte2024
Labeling NIDS Rules with MITRE ATT&CK Techniques Using ChatGPTNir Daniel; Florian Klaus Kaiser; Anton Dzega; Aviad Elyashar; Rami Puzis2024
User Behavior Analysis for Malware DetectionValentina Dumitrasc; Rene Serral-Gracia2024
Balancing XAI with Privacy and Security ConsiderationsChristoforos N. Spartalis; Theodoros Semertzidis; Petros Daras2024
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack DetectionChathuranga Sampath Kalutharage; Xiaodong Liu; Christos Chrysoulas; Oluwaseun Bamgboye2024
Digital Twins in Healthcare: Security, Privacy, Trust and Safety ChallengesCecilie Solberg Jorgensen; Ankur Shukla; Basel Katt2024
C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous DrivingMohamed Abdelsalam; Simon Greiner; Oum-El-Kheir Aktouf; Annabelle Mercier2024
The VOCODES Kill Chain for Voice Controllable DevicesSergio Esposito; Daniele Sgandurra; Giampaolo Bella2024
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer NetworkVictoria Bull; Niclas Finne; Andrea Agiollo; Pallavi Kaliyar; Luca Pajola; Thiemo Voigt; Mauro Conti2024
Firmware-Based DoS Attacks in Wireless Sensor NetworkPhi Tuong Lau; Stefan Katzenbeisser2024
Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client LifetimeGiovanni Di Crescenzo; Matluba Khodjaeva; Dilan D. Morales Caro2024
SigIL: A Signature-Based Approach of Malware Detection on Intermediate LanguageGiancarlo Fortino; Claudia Greco; Antonella Guzzo; Michele Ianni2024
Toward Next-Generation Cyber Range: A Comparative Study of Training PlatformsAlexandre Grimaldi; Julien Ribiollet; Pantaleone Nespoli; Joaquin Garcia-Alfaro2024
Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided FuzzingMarcello Maugeri; Cristian Daniele; Giampaolo Bella2024
Trust Assumptions in Voting SystemsKristjan Krips; Nikita Snetkov; Jelizaveta Vakarjuk; Jan Willemson2024
Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-CycleFlorian Kammuller2024
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static AnalysisSampath Rajapaksha; Janaka Senanayake; Harsha Kalutarage; Mhd Omar Al-Kadri2024
123