LEADER 05975nam 22008415 450 001 996418207003316 005 20201104150241.0 010 $a3-030-42051-5 024 7 $a10.1007/978-3-030-42051-2 035 $a(CKB)4100000010480277 035 $a(DE-He213)978-3-030-42051-2 035 $a(MiAaPQ)EBC6120928 035 $a(PPN)242979270 035 $a(EXLCZ)994100000010480277 100 $a20200220d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security$b[electronic resource] $eESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26?27, 2019, Revised Selected Papers /$fedited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XVIII, 279 p. 270 illus., 65 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11981 300 $aIncludes index. 311 $a3-030-42050-7 327 $aInformation & Operational Technology (IT & OT) security systems (IOSec 2019) -- Model-driven Simulation and Training Environments (MSTEC 2019) -- Security for Financial Critical Infrastructures and Services (FINSEC 2019). 330 $aThis book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The IOSec Workshop received 17 submissions from which 7 full papers were selected for presentation. They cover topics related to security architectures and frameworks for enterprises, SMEs, public administration or critical infrastructures, threat models for IT & OT systems and communication networks, cyber-threat detection, classification and pro ling, incident management, security training and awareness, risk assessment safety and security, hardware security, cryptographic engineering, secure software development, malicious code analysis as well as security testing platforms. From the MSTEC Workshop 7 full papers out of 15 submissions are included. The selected papers deal focus on the verification and validation (V&V) process, which provides the operational community with confidence in knowing that cyber models represent the real world, and discuss how defense training may benefit from cyber models. The FINSEC Workshop received 8 submissions from which 3 full papers and 1 short paper were accepted for publication. The papers reflect the objective to rethink cyber-security in the light of latest technology developments (e.g., FinTech, cloud computing, blockchain, BigData, AI, Internet-of-Things (IoT), mobile-first services, mobile payments). 410 0$aSecurity and Cryptology ;$v11981 606 $aComputer security 606 $aComputers 606 $aComputer organization 606 $aComputer crimes 606 $aLaw and legislation 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aComputer Crime$3https://scigraph.springernature.com/ontologies/product-market-codes/I28070 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aComputers. 615 0$aComputer organization. 615 0$aComputer crimes. 615 0$aLaw and legislation. 615 0$aData encryption (Computer science). 615 14$aSystems and Data Security. 615 24$aInformation Systems and Communication Service. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aComputer Crime. 615 24$aLegal Aspects of Computing. 615 24$aCryptology. 676 $a005.8 702 $aFournaris$b Apostolos P$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAthanatos$b Manos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLampropoulos$b Konstantinos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIoannidis$b Sotiris$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHatzivasilis$b George$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDamiani$b Ernesto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAbie$b Habtamu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRanise$b Silvio$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVerderame$b Luca$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSiena$b Alberto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418207003316 996 $aComputer & security$9878224 997 $aUNISA