Linked e-resources

Details

CyberICPS 2022
Towards Comprehensive Modeling of CPSs to Discover and Study Interde-pendencies
Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study
Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles
Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Ef-fectiveness of Existing Security Solutions
The effects of the Russo-Ukrainian war on network infrastructures through the lens of BGP
Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness
A Framework for Developing Tabletop cybersecurity Exercies
A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems
SECPRE 2022
OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the context of Cyber Security
Measuring the adoption of TLS Encrypted Client Hello extension and its forebear in the wild.-SPOSE 2022
SPOSE 2022
Influencing Factors for Users' Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User Study
Towards a Security Impact Analysis Framework: A Risk-based and MITRE Attack Approach
Data Protection Officers' Perspectives on Privacy Challenges in Digital Eco-systems
Rebooting IT-Security - How Organisations Can Encourage and Sustain Se-cure Behaviours
CPS4CIP 2022
Resilience, Risk Assessment, and Secure communications
Towards Reverse Engineering of Industrial Physical Processes
Solutions for Protecting the Space Ground Segments: From risk assessment to emergency response
Modelling and Simulation of Railway Networks for Resilience Analysis
HoneyChart: Automated Honeypot Management Over Kubernetes
ComSEC: Secure communications for baggage handling systems
Methodology for resilience assessment for rail infrastructure considering cyber-physical threats
Cyber-Physical Systems Security, Standards, and Datasets
Coverage-guided fuzzing of embedded systems leveraging hardware tracing
Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research
Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference Architecture
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case
CDT& SECOMANE 2022
A Revisitation of Clausewitz's thinking from the Cyber Situational Aware-ness perspective
Examining 5G technology-based applications for military communications
Design of a validation model of the cognitive state in military operations in cyberspace
Design and validation of a threat model based on "Cyber Kill Chain" applied to human factors
The cloud continuum for military deployable networks: challenges and op-portunities
EIS 2022
Ballot-Polling Audits of Instant-Runoff Voting Elections with a DirichletTree Model
Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits
Election Infrastructure
Why is Online Voting Still Largely a Black Box?
Connecting Incident Reporting Infrastructure to Election Day Proceedings
Council of Europe Guidelines on the Use of ICT in Electoral Processes
Security Assurance Methodology
SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation
A Comparison-Based Methodology for the Security Assurance of Novel Systems
Security Assurance Technique
Automation of Vulnerability Information Extraction using TransformerBased Language Models
Product Incremental Security Risk Assessment using DevSecOps Practices
SLIME: State Learning In the Middle of Everything for Tool-Assisted Vulnerability Detection.

Browse Subjects

Show more subjects...

Statistics

from
to
Export