04717nam 22008175 450 991033757890332120210430124634.03-030-12786-910.1007/978-3-030-12786-2(CKB)4100000007598268(DE-He213)978-3-030-12786-2(MiAaPQ)EBC5924607(PPN)233799761(EXLCZ)99410000000759826820190130d2019 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierComputer Security[electronic resource] ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers /edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (X, 233 p. 108 illus., 78 illus. in color.)Security and Cryptology ;11387Includes index.3-030-12785-0 This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.Security and Cryptology ;11387Seguridad informáticaDelitos por ordenadorComputersLaw and legislationComputer organizationSoftware engineeringApplication softwareSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Crimehttps://scigraph.springernature.com/ontologies/product-market-codes/I28070Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computer Systems Organization and Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13006Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Seguridad informáticaDelitos por ordenadorComputers.Law and legislation.Computer organization.Software engineering.Application software.Systems and Data Security.Computer Crime.Legal Aspects of Computing.Computer Systems Organization and Communication Networks.Software Engineering.Information Systems Applications (incl. Internet).005.8Katsikas Sokratis Kedthttp://id.loc.gov/vocabulary/relators/edtCuppens Frédéricedthttp://id.loc.gov/vocabulary/relators/edtCuppens Noraedthttp://id.loc.gov/vocabulary/relators/edtLambrinoudakis Costasedthttp://id.loc.gov/vocabulary/relators/edtAntón Annieedthttp://id.loc.gov/vocabulary/relators/edtGritzalis Stefanosedthttp://id.loc.gov/vocabulary/relators/edtMylopoulos Johnedthttp://id.loc.gov/vocabulary/relators/edtKalloniatis Christosedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910337578903321Computer & security878224UNINA