Computer security : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised selected papers /

Saved in:
Bibliographic Details
Meeting name:European Symposium on Research in Computer Security (23rd : 2018 : Barcelona, Spain)
Imprint:Cham : Springer, 2019.
Description:1 online resource (x, 233 pages) : illustrations (some color)
Language:English
Series:Lecture notes in computer science ; 11387
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 11387.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11781518
Hidden Bibliographic Details
Varying Form of Title:CyberICPS 2018
SECPRE 2018
Other authors / contributors:Katsikas, Sokratis K., editor.
Cuppens, Frédéric, editor.
Cuppens, Nora, editor.
Lambrinoudakis, Costas, editor.
Antón, Annie I., editor.
Gritzalis, Stefanos, editor.
Mylopoulos, John, editor.
Kalloniatis, Christos, editor.
CyberICPS (Workshop) (4th : 2018 : Barcelona, Spain)
SECPRE (Workshop) (2nd : 2018 : Barcelona, Spain)
ISBN:9783030127862
3030127869
3030127850
9783030127855
9783030127879
3030127877
9783030127855
Digital file characteristics:text file PDF
Notes:Online resource; title from PDF title page (SpringerLink, viewed February 6, 2019).
Summary:This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.
Other form:Printed edition: 9783030127855
Printed edition: 9783030127879
Standard no.:10.1007/978-3-030-12786-2

MARC

LEADER 00000cam a2200000Ii 4500
001 11781518
005 20210625185137.2
006 m o d
007 cr cnu|||unuuu
008 190206s2019 sz a o 100 0 eng d
015 |a GBB931604  |2 bnb 
016 7 |a 019235126  |2 Uk 
019 |a 1089998633  |a 1091271705  |a 1122812497  |a 1125776351 
020 |a 9783030127862  |q (electronic bk.) 
020 |a 3030127869  |q (electronic bk.) 
020 |a 3030127850 
020 |a 9783030127855 
020 |a 9783030127879  |q (print) 
020 |a 3030127877 
020 |z 9783030127855  |q (print) 
024 7 |a 10.1007/978-3-030-12786-2  |2 doi 
035 |a (OCoLC)1084656930  |z (OCoLC)1089998633  |z (OCoLC)1091271705  |z (OCoLC)1122812497  |z (OCoLC)1125776351 
035 9 |a (OCLCCM-CC)1084656930 
037 |a com.springer.onix.9783030127862  |b Springer Nature 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d UAB  |d UKMGB  |d MUB  |d OCLCF  |d OCLCO  |d DKU  |d VT2  |d COO  |d OCLCQ  |d EBLCP  |d LEATE  |d OCLCQ  |d UKAHL 
049 |a MAIN 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
111 2 |a European Symposium on Research in Computer Security  |n (23rd :  |d 2018 :  |c Barcelona, Spain)  |0 http://id.loc.gov/authorities/names/nb2018018372 
245 1 0 |a Computer security :  |b ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised selected papers /  |c Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.). 
246 3 |a CyberICPS 2018 
246 3 |a SECPRE 2018 
264 1 |a Cham :  |b Springer,  |c 2019. 
300 |a 1 online resource (x, 233 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture notes in computer science ;  |v 11387 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed February 6, 2019). 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling. 
505 0 |a Intro; Preface; Organization; Contents; Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2018); Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning; 1 Introduction; 2 Experimental Set-Up; 2.1 Modbus Protocol; 2.2 Sensors and PLC; 2.3 Operation Mode; 3 Dataset; 3.1 Scenarios; 3.2 Pre-processing; 4 Experiments and Results; 4.1 Parameters; 4.2 First Experiment; 4.3 Second Experiment; 4.4 Third Experiment; 5 Discussion and Limitations; 6 Related Work; 7 Conclusion and Future Work; References; Cyber-Attacks Against the Autonomous Ship 
505 8 |a 1 Introduction2 Related Work; 3 The ICT Architecture of the Cyber-Enabled Ship; 4 Identifying and Analyzing Attacks Against the Cyber-Enabled Ship; 4.1 Methodology; 4.2 Applying STRIDE to the Cyber-Enabled Ship; 5 Summary of Results and Discussion; 6 Conclusions and Future Work; References; EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security; 1 Introduction; 2 Architecture of EPIC; 2.1 Views of EPIC; 3 Experiments with EPIC; 3.1 Feasible Attack Scenarios; 3.2 Power Supply Interruption Attack; 3.3 Physical Damage Attack; 4 Cascading Effects 
505 8 |a 5 Related Work6 Conclusion and Future Work; References; A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles; 1 Introduction; 2 Related Work; 2.1 Limitations of Current Approaches; 3 The Setting; 3.1 The Reference Architecture; 3.2 The Characteristics of CAN Communication; 3.3 Attack Model; 4 Hardware Based Bus Count Solution; 5 Formalization and Proof; 5.1 The Security Modeling Framework SeMF; 5.2 The Formal Model; 5.3 Verification of the Formal Model; 6 Discussion and Conclusions; References 
505 8 |a Enhancing Usage Control for Performance: An Architecture for Systems of Systems1 Introduction; 2 Background and Related Work; 2.1 RBAC -- ABAC; 2.2 Usage Control; 2.3 Risk Aggregation; 3 The Proposed Architecture; 3.1 The Architectural Model and its Components; 3.2 Protocol and Interface; 4 Test Case; 5 Conclusion; References; Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection; 1 Introduction; 2 Data Sets; 3 Machine Learning Methods; 3.1 One-Class Support Vector Machines; 3.2 Support Vector Machines; 3.3 Neural Networks; 3.4 Long Short Term Memory Neural Networks 
505 8 |a 4 Results4.1 One-Class Support Vector Machines; 4.2 Support Vector Machines; 4.3 Neural Networks; 4.4 Long Short Term Memory Neural Networks; 5 Discussion; 6 Related Work; 7 Conclusion; References; SDN-Enabled Virtual Data Diode; 1 Introduction; 2 Data Diodes for IACS Security; 2.1 Data Diode Products; 3 Leveraging SDN to Virtualize the Data Diode; 3.1 Proactive Data Diode; 3.2 Reactive Data Diode; 3.3 NFV-Assisted Data Diode; 4 Proof-of-Concept Virtual Data Diode Prototype; 5 Evaluation; 5.1 Experimental Testbed; 5.2 Validation and Lessons Learned; 6 Conclusion; References 
650 0 |a Computer security  |v Congresses. 
650 0 |a Data encryption (Computer science)  |v Congresses. 
650 0 |a Computer networks  |x Security measures  |v Congresses. 
650 0 |a Data protection  |v Congresses. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
700 1 |a Katsikas, Sokratis K.,  |e editor.  |0 http://id.loc.gov/authorities/names/nr97001917 
700 1 |a Cuppens, Frédéric,  |e editor.  |0 http://id.loc.gov/authorities/names/n00005480 
700 1 |a Cuppens, Nora,  |e editor.  |0 http://id.loc.gov/authorities/names/nb2017007458 
700 1 |a Lambrinoudakis, Costas,  |e editor.  |0 http://id.loc.gov/authorities/names/nb2006021621 
700 1 |a Antón, Annie I.,  |e editor.  |0 http://id.loc.gov/authorities/names/no2010015955 
700 1 |a Gritzalis, Stefanos,  |e editor.  |0 http://id.loc.gov/authorities/names/nb2004300965 
700 1 |a Mylopoulos, John,  |e editor. 
700 1 |a Kalloniatis, Christos,  |e editor. 
711 2 |a CyberICPS (Workshop)  |n (4th :  |d 2018 :  |c Barcelona, Spain)  |0 http://id.loc.gov/authorities/names/nb2019004714 
711 2 |a SECPRE (Workshop)  |n (2nd :  |d 2018 :  |c Barcelona, Spain)  |0 http://id.loc.gov/authorities/names/nb2019004715 
776 0 8 |i Printed edition:  |z 9783030127855 
776 0 8 |i Printed edition:  |z 9783030127879 
830 0 |a Lecture notes in computer science ;  |v 11387.  |0 http://id.loc.gov/authorities/names/n42015162 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology.  |0 http://id.loc.gov/authorities/names/no2007042442 
903 |a HeVa 
929 |a oclccm 
999 f f |i 61a54c5d-42cb-5b08-ab98-1394fd6d65a0  |s 0baf135d-1106-5e7b-a9a1-135f08e70406 
928 |t Library of Congress classification  |a QA76.9.A25  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-030-12786-2  |z Springer Nature  |g ebooks  |i 12559268