LEADER 04715nam 22008175 450 001 996466343703316 005 20210430124634.0 010 $a3-030-12786-9 024 7 $a10.1007/978-3-030-12786-2 035 $a(CKB)4100000007598268 035 $a(DE-He213)978-3-030-12786-2 035 $a(MiAaPQ)EBC5924607 035 $a(PPN)233799761 035 $a(EXLCZ)994100000007598268 100 $a20190130d2019 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security$b[electronic resource] $eESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6?7, 2018, Revised Selected Papers /$fedited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (X, 233 p. 108 illus., 78 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11387 300 $aIncludes index. 311 $a3-030-12785-0 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling. 410 0$aSecurity and Cryptology ;$v11387 606 $aSeguridad informática 606 $aDelitos por ordenador 606 $aComputers 606 $aLaw and legislation 606 $aComputer organization 606 $aSoftware engineering 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Crime$3https://scigraph.springernature.com/ontologies/product-market-codes/I28070 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 04$aSeguridad informática 615 04$aDelitos por ordenador 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aComputer organization. 615 0$aSoftware engineering. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aComputer Crime. 615 24$aLegal Aspects of Computing. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aSoftware Engineering. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aKatsikas$b Sokratis K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Frédéric$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Nora$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLambrinoudakis$b Costas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAntón$b Annie$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGritzalis$b Stefanos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMylopoulos$b John$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKalloniatis$b Christos$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466343703316 996 $aComputer & security$9878224 997 $aUNISA