05076nam 22008295 450 99646549570331620201019130716.03-319-72817-210.1007/978-3-319-72817-9(CKB)4100000001381791(DE-He213)978-3-319-72817-9(MiAaPQ)EBC6283136(MiAaPQ)EBC5577018(Au-PeEL)EBL5577018(OCoLC)1019679971(PPN)223955183(EXLCZ)99410000000138179120171221d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierComputer Security[electronic resource] ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers /edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XII, 281 p. 76 illus.) Security and Cryptology ;106833-319-72816-4 Protecting Industrial Control and Cyber-Physical Systems -- Threats, Vulnerabilities and Risks -- Cyber Attacks in Industrial Control and Cyber-Physical Systems -- Detecting Attacks in Industrial Control and Cyber-Physical Systems -- Security and Privacy Requirements Assurance and Evaluation -- Security Requirements Elicitation and Modelling.This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017. The CyberICPS Workshop received 32 submissions from which 10 full and 2 short papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 14 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.Security and Cryptology ;10683Computer securityData encryption (Computer science)Software engineeringComputer organizationComputers and civilizationMicroprogramming Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Computer Systems Organization and Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13006Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Control Structures and Microprogramminghttps://scigraph.springernature.com/ontologies/product-market-codes/I12018Computer security.Data encryption (Computer science).Software engineering.Computer organization.Computers and civilization.Microprogramming .Systems and Data Security.Cryptology.Software Engineering.Computer Systems Organization and Communication Networks.Computers and Society.Control Structures and Microprogramming.005.8Katsikas Sokratis Kedthttp://id.loc.gov/vocabulary/relators/edtCuppens Frédéricedthttp://id.loc.gov/vocabulary/relators/edtCuppens Noraedthttp://id.loc.gov/vocabulary/relators/edtLambrinoudakis Costasedthttp://id.loc.gov/vocabulary/relators/edtKalloniatis Christosedthttp://id.loc.gov/vocabulary/relators/edtMylopoulos Johnedthttp://id.loc.gov/vocabulary/relators/edtAntón Annieedthttp://id.loc.gov/vocabulary/relators/edtGritzalis Stefanosedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465495703316Computer & security878224UNISA