Advanced Information Systems Engineering Workshops : CAiSE 2024 International Workshops, Limassol, Cyprus, June 3–7, 2024, Proceedings / / edited by João Paulo A. Almeida, Claudio Di Ciccio, Christos Kalloniatis
| Advanced Information Systems Engineering Workshops : CAiSE 2024 International Workshops, Limassol, Cyprus, June 3–7, 2024, Proceedings / / edited by João Paulo A. Almeida, Claudio Di Ciccio, Christos Kalloniatis |
| Autore | Almeida João Paulo A |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (382 pages) |
| Disciplina | 005.3 |
| Altri autori (Persone) |
CiccioClaudio Di
KalloniatisChristos |
| Collana | Lecture Notes in Business Information Processing |
| Soggetto topico |
Application software
Business information services Data protection Artificial intelligence Software engineering Information technology - Management Computer and Information Systems Applications IT in Business Data and Information Security Artificial Intelligence Software Engineering Computer Application in Administrative Data Processing Programari d'aplicació Protecció de dades Intel·ligència artificial Enginyeria de programari |
| Soggetto genere / forma |
Congressos
Llibres electrònics |
| ISBN |
9783031610035
9783031610028 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- BC4IS+B4TDS -- International Workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS) -- Organization -- BC4IS Workshop Co-chairs -- BC4IS Workshop Program Committee -- B4TDS Workshop Co-chairs -- B4TDS Workshop Program Committee -- Blockchain in E-Learning Platform to Enhance Trustworthy and Sharing of Micro-credentials -- 1 Introduction -- 2 Background, Related Work and Contribution -- 2.1 Micro-credentials -- 2.2 Blockchain -- 2.3 Related Work -- 2.4 Contribution -- 3 E-Learning Platform and Micro-credentials -- 4 Consortium Blockchain Within E-Learning Platforms -- 4.1 Institutions and Candidates Actions -- 5 Discussion -- 6 Conclusion -- References -- A Conceptual Model for Blockchain-Based Trust in Digital Ecosystems (Short Paper) -- 1 Introduction -- 2 Related Work -- 3 Conceptual model -- 3.1 N7: Running Example -- 3.2 Ontology of Trust in Digital ecosystems -- 3.3 The Problems of Third Parties and How Blockchain Can help -- 3.4 The Need for Capabilities Manifestation For Blockchain -- 4 Conclusion and Future work -- References -- High-Performance Confidentiality-Preserving Blockchain via GPU-Accelerated Fully Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 2.1 Confidentiality-Preserving Blockchains -- 2.2 GPU-Accelerated Fully Homomorphic Encryption -- 3 Overview -- 3.1 System Model -- 3.2 Threat Model -- 3.3 Gafe's Workflow Overview -- 4 Workflow Description -- 4.1 Client Key Generation -- 4.2 GPU-Accelerated Transaction Execution -- 5 Evaluation -- 5.1 Settings -- 5.2 End-to-End Performance -- 6 Conclusion -- References -- A Blockchain-Based Approach for Model Card Accountability and Regulatory Compliance -- 1 Introduction -- 2 Background -- 2.1 Model Cards -- 2.2 Tokenization of Model Cards -- 2.3 Motivating Scenario.
3 Proposed Approach: m-LUCE -- 3.1 Approach Overview -- 3.2 Modeling State Parameterization for Model Cards -- 4 Evaluation and Discussion -- 4.1 Functional Testing -- 4.2 Discussion -- 5 Conclusions and Future Work -- References -- HybridAIMS -- 2nd International Workshop on Hybrid Artificial Intelligence and Enterprise Modelling for Intelligent Information Systems (HybridAIMS 2024) -- Organization -- Workshop Chairs -- Program Committee -- A Hierarchical Knowledge Framework for Digital Twins of Buildings and Their Energy Systems (Position Paper) -- 1 Introduction -- 2 BIM, BMS and EMS and Digital Twins -- 3 Physics-Based Simulation and Artificial Intelligence -- 4 From Data to Wisdom, a Paradigm for Digital Twins -- 4.1 The NEST Demonstrator -- 4.2 An Implementation of the DIKW for Buildings and Energy Systems -- 4.3 Analysis of a Specific Application -- 5 Conclusion and Outlook -- References -- Integrating Generative Artificial Intelligence into Supply Chain Management Education Using the SCOR Model -- 1 Introduction -- 2 Background -- 3 Case Study: A SCM University Course -- 3.1 Generative AI Course Companion Requirements and Goals -- 3.2 Introduction to Vertex AI Search -- 3.3 Setting up the Vertex AI Search -- 3.4 Evaluation -- 3.5 Results -- 3.6 Enhancement Strategies -- 4 Implications and Further Research -- References -- An Explanation User Interface for a Knowledge Graph-Based XAI Approach to Process Analysis -- 1 Research Background and Objective -- 2 Basics of Human Interactions for XAI -- 3 Design Catalog for Explanation User Interfaces -- 4 Demonstration and Evaluation of an XUI -- 4.1 Current State of KBXAI-PA -- 4.2 Designing and Demonstrating of an XUI for KBXAI-PA -- 4.3 Evaluating the XUI for KBXAI-PA Through Expert Interviews -- 5 Key Findings, Research Perspectives and Implications -- References. Enhancing Research Clarity: Ontology-Based Modeling of Argumentation in RPML -- 1 Introduction -- 2 Literature Review -- 2.1 Identification of a Research-Worthy Problem -- 2.2 Conceptual Modeling for Visualization of Research Problems -- 3 Methodology -- 4 An Ontological Metamodel for Research -- 5 Application of the Modelling Language -- 6 Conclusion -- References -- Student Performance Prediction Model Based on Course Description and Student Similarity -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Data Set from Student Enrolment Process -- 5 Design and Development of the Prototypes -- 5.1 Course Description Similarity -- 5.2 Course Performance Similarity -- 5.3 Performance Prediction -- 6 Evaluation -- 7 Conclusion -- References -- Towards Explainable Public Sector AI: An Exploration of Neuro-Symbolic AI and Enterprise Modeling (Short Paper) -- 1 Introduction -- 2 XAI: The Imperative for Explainability in the Public Sector -- 3 Neuro-Symbolic AI (NSAI) for Enhanced Explainability -- 4 Enterprise Modeling (EM): Discovering Rules for the Symbolic AI -- 5 Integration: Exploring the Synergy of XAI, NSAI, and EM -- 6 Conclusion and Future Work -- References -- A Survey to Evaluate the Completeness and Correctness of a Morphological Box for AI Solutions -- 1 Introduction -- 2 Theoretical Background -- 2.1 Morphological Box for AI Solutions -- 2.2 Taxonomy Development -- 3 Research and Survey Design -- 4 Analysis of the Survey Results -- 4.1 Participants -- 4.2 Statistical Evaluation -- 4.3 Feature Analysis -- 4.4 Value Analysis -- 5 Discussion -- 5.1 Possible New Features -- 5.2 Possible New Values -- 5.3 Possible Reorganization of the Values -- 6 Summary and Future Research -- References -- KG4SDSE -- Preface: 2nd Workshop on Knowledge Graphs for Semantics-Driven Systems Engineering (KG4SDSE 2024) -- Organization -- Workshop Chairs. Web Chair -- Program Committee -- Understanding the Semantic SQL Transducer -- 1 Introduction -- 2 The Role of a Semantic SQL Transducer -- 3 Inside the Semantic SQL Transducer -- 4 Designing the Semantic SQL Transducer -- 5 Conclusions -- References -- Enhancing Complex Linguistic Tasks Resolution Through Fine-Tuning LLMs, RAG and Knowledge Graphs (Short Paper) -- 1 Introduction -- 2 Related Work -- 3 Proposed Pipeline -- 3.1 Enhancing LLMs with RAG and KGs -- 3.2 KGs Construction via Prompt Engineering -- 3.3 Guide Complex Tasks Resolution via Fine-Tuning -- 4 Conclusions and Future Work -- References -- Improving the Service Quality in Fitness Industry by Using a Knowledge Graph Based Modeling Toolkit -- 1 Introduction -- 2 Storytelling with Modeling Tools -- 3 Research Problem -- 3.1 Who -- 3.2 What -- 3.3 Why -- 3.4 How -- 3.5 Where -- 4 Conclusions -- References -- LLMs for Knowledge-Graphs Enhanced Task-Oriented Dialogue Systems: Challenges and Opportunities -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Preliminary Questions for ChatGPT -- 3.2 Ontology -- 3.3 Setup Format -- 3.4 Prompting Techniques and Examples -- 4 Results and Discussion -- 4.1 ChatGPT on the Static KGC Task -- 4.2 ChatGPT on the Temporal KGC Task -- 4.3 ChatGPT on the KGR Task -- 5 Conclusion -- References -- Property Graphs at Scale: A Roadmap and Vision for the Future (Short Paper) -- 1 Introduction -- 2 Roadmap to the Future -- 2.1 Establishing a Declarative Query Language for PGs -- 2.2 Data Integration -- 2.3 Scalable Data Processing -- 3 Conclusions -- References -- Knowledge Graph for Reusing Research Knowledge on Related Work in Data Analytics -- 1 Introduction -- 2 Research Method -- 3 Analytics Project Ontology -- 4 Real Estate Analytics Knowledge Graph -- 5 Using Knowledge Graph Based Web Application -- 6 Conclusion -- References. An Ontology-Based Meta-modelling Approach for Semantic-Driven Building Management Systems -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Focus Group Findings -- 4 The Ontology-Based Meta-modelling Approach for Building Management Systems -- 4.1 The Ontology Architecture -- 4.2 The Ontology-Based PID Language -- 5 Evaluation -- 6 Findings and Discussion -- 7 Conclusion -- References -- EOMAS -- 20 years of the EOMAS workshop -- Organization -- Steering Committee -- Customizing a Generic Digital Transformation Objectives Model onto a Telecommunication Company -- 1 Introduction -- 2 Research Approach and Method -- 3 Results -- 3.1 Preliminary Interview Round: Domain Knowledge Collection -- 3.2 Instantiated DT Strategic Objectives Representation -- 3.3 Post Interview Round: Evaluation and Validation of the Instantiated DT Objectives Representation -- 4 Discussion -- 5 Conclusion -- References -- Analyzing Customer Sentiments: A Comparative Evaluation of Large Language Models for Enhanced Business Intelligence -- 1 Introduction -- 2 Related Work -- 2.1 Customer Sentiment Analysis -- 2.2 Methods for Sentiment Analysis -- 2.3 Using Large Language Models for Sentiment Analysis -- 3 Methodology -- 3.1 Research Question Statement -- 3.2 Selection of Large Language Models -- 3.3 Dataset Preparation -- 3.4 Exploratory Phase -- 3.5 Focused Experiments -- 3.6 Observations Analysis -- 4 Observation Analysis -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Conceptual Data Normalisation from the Practical View of Using Graph Databases -- 1 Introduction -- 2 Motivation -- 3 Attempts to Overcome the Limitations of Relational Databases -- 4 Object Class Normalisation - Ambler's Approach -- 5 Frisendal's Approach to the Graph Normalisation -- 6 Our Approach to the Graph Database Normalisation -- 7 Conclusion -- References. Deriving Object Oriented Normalisation from Conceptual Normalisation. |
| Record Nr. | UNINA-9910865248403321 |
Almeida João Paulo A
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro
| Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XXIII, 440 p. 282 illus., 72 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Application software Computer communication systems Computer organization Software engineering Systems and Data Security Cryptology Information Systems Applications (incl. Internet) Computer Communication Networks Computer Systems Organization and Communication Networks Software Engineering |
| ISBN | 3-030-42048-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019). |
| Record Nr. | UNISA-996418206503316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Security : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro
| Computer Security : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XXIII, 440 p. 282 illus., 72 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Application software Computer networks Computer organization Software engineering Systems and Data Security Cryptology Information Systems Applications (incl. Internet) Computer Communication Networks Computer Systems Organization and Communication Networks Software Engineering |
| ISBN | 3-030-42048-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019). |
| Record Nr. | UNINA-9910380747703321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security [[electronic resource] ] : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis
| Computer Security [[electronic resource] ] : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (X, 233 p. 108 illus., 78 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Seguridad informática
Delitos por ordenador Computers Law and legislation Computer organization Software engineering Application software Systems and Data Security Computer Crime Legal Aspects of Computing Computer Systems Organization and Communication Networks Software Engineering Information Systems Applications (incl. Internet) |
| ISBN | 3-030-12786-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996466343703316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Security : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis
| Computer Security : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (X, 233 p. 108 illus., 78 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Seguridad informática
Delitos por ordenador Computers Law and legislation Computer organization Software engineering Application software Systems and Data Security Computer Crime Legal Aspects of Computing Computer Systems Organization and Communication Networks Software Engineering Information Systems Applications (incl. Internet) |
| ISBN | 3-030-12786-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910337578903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security [[electronic resource] ] : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis
| Computer Security [[electronic resource] ] : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XII, 281 p. 76 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Software engineering Computer organization Computers and civilization Microprogramming Systems and Data Security Cryptology Software Engineering Computer Systems Organization and Communication Networks Computers and Society Control Structures and Microprogramming |
| ISBN | 3-319-72817-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Protecting Industrial Control and Cyber-Physical Systems -- Threats, Vulnerabilities and Risks -- Cyber Attacks in Industrial Control and Cyber-Physical Systems -- Detecting Attacks in Industrial Control and Cyber-Physical Systems -- Security and Privacy Requirements Assurance and Evaluation -- Security Requirements Elicitation and Modelling. |
| Record Nr. | UNISA-996465495703316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Security : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis
| Computer Security : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XII, 281 p. 76 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Software engineering Computer organization Computers and civilization Microprogramming Systems and Data Security Cryptology Software Engineering Computer Systems Organization and Communication Networks Computers and Society Control Structures and Microprogramming |
| ISBN |
9783319728179
3319728172 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Protecting Industrial Control and Cyber-Physical Systems -- Threats, Vulnerabilities and Risks -- Cyber Attacks in Industrial Control and Cyber-Physical Systems -- Detecting Attacks in Industrial Control and Cyber-Physical Systems -- Security and Privacy Requirements Assurance and Evaluation -- Security Requirements Elicitation and Modelling. |
| Record Nr. | UNINA-9910349264103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security. ESORICS 2023 International Workshops : CyberICS, DPM, CBT, and SECPRE, the Hague, the Netherlands, September 25-29, 2023, Revised Selected Papers, Part I
| Computer Security. ESORICS 2023 International Workshops : CyberICS, DPM, CBT, and SECPRE, the Hague, the Netherlands, September 25-29, 2023, Revised Selected Papers, Part I |
| Autore | Katsikas Sokratis |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
| Descrizione fisica | 1 online resource (518 pages) |
| Altri autori (Persone) |
Cuppensédéric
Cuppens-BoulahiaNora LambrinoudakisCostas Garcia-AlfaroJoaquin Navarro-ArribasGuillermo NespoliPantaleone KalloniatisChristos MylopoulosJohn AntónAnnie |
| Collana | Lecture Notes in Computer Science Series |
| ISBN | 3-031-54204-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Contents - Part I -- Contents - Part II -- Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain -- 1 Introduction -- 2 Related Work -- 2.1 Supply Chain Cyber Security -- 2.2 Cyber Security Culture -- 3 Method -- 3.1 Problem Identification and Literature Review -- 3.2 Data Collection and Analysis -- 3.3 Data Interpretation and Reporting -- 4 Results -- 4.1 Governance -- 4.2 Preparedness and Incident Response -- 4.3 Supply Chain Challenges -- 4.4 Trust -- 4.5 Looking Towards Others and Propagation of Trust -- 4.6 The Impact of Organization Size -- 5 Discussion -- 5.1 Discussion of Main Research Questions -- 5.2 Exploration of Additional Findings -- 6 Conclusion and Future Work -- References -- METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks -- 1 Introduction -- 2 Cybersecurity Research for ICSs -- 2.1 Testbeds -- 2.2 Datasets -- 2.3 Related Work -- 2.4 Toward a Cross-Domain ICS Evaluation -- 3 METRICS: A Cybersecurity Evaluation Methodology for ICSs -- 3.1 Exchangeable Evaluation Environment -- 3.2 Adversaries and Responses -- 3.3 Cross-Domain Metrics -- 3.4 Evaluation Control -- 4 Use Case: METRICS for Power Grids -- 4.1 Evaluation Phases -- 4.2 Discussion -- 5 Toward Cross-Domain Resilience -- 6 Conclusion -- A Environment Description File Example -- B Scenario Description File Example -- References -- Threat Analysis in Dairy Farming 4.0 -- 1 Introduction -- 2 Related Work -- 3 CPSs of a Dairy Farm 4.0 -- 4 Threat Modeling and Risk Assessment -- 4.1 Methodology -- 4.2 Threats and Risks in the Dairy Farm 4.0 -- 5 Conclusions -- References -- Overview of Social Engineering Protection and Prevention Methods -- 1 Introduction -- 2 Method Selection Methodology -- 3 Analysis -- 3.1 Overview of Protection Method Categories.
3.2 Criteria for Method Evaluation -- 3.3 Evaluation Results -- 3.4 Analysis of Evaluation Results -- 4 Conclusion -- References -- Skade - A Challenge Management System for Cyber Threat Hunting -- 1 Introduction -- 2 Related Work -- 3 Hypotheses Concerning Threat Hunting Training -- 3.1 Ensuring Constructive Alignment -- 3.2 Supporting Motivating Setting -- 3.3 Providing Feedback and Assessment -- 3.4 Covering Multiple Learning Dimensions -- 4 Realization of the Challenge Manager Skade -- 4.1 Features -- 4.2 Functions -- 4.3 Example Based on the Nordic-US Exercise of 2023 -- 5 Discussion -- 5.1 Skade as a Design Science Effort -- 5.2 Trainees and Requirements on Challenges -- 5.3 Interaction with Emulators -- 5.4 Learning Objectives and Learning Activities -- 5.5 Experiment Plan and Tests of Hypotheses -- 6 Conclusion -- References -- On the Usage of NLP on CVE Descriptions for Calculating Risk -- 1 Introduction -- 2 Cybersecurity Related Background -- 2.1 Common Vulnerabilities and Exposures (CVE) -- 2.2 Common Platform Enumeration (CPE) -- 2.3 Common Weakness Enumeration (CWE) -- 2.4 Common Attack Pattern Enumeration and Classification (CAPEC) -- 2.5 National Vulnerability Database (NVD) -- 2.6 Common Vulnerability Scoring System (CVSS) -- 3 Related Work -- 4 Natural Language Processing Background -- 4.1 Text Classification -- 4.2 spaCy -- 5 Implementation -- 6 Conclusion -- References -- Evaluation of an OPC UA-Based Access Control Enforcement Architecture -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Protocol Modeling -- 4 Implementation -- 5 Experiment -- 6 Results -- 6.1 Results on Connection Experiments -- 6.2 Results on Access Resource Experiments -- 6.3 Results on Different Token Expiry Times -- 6.4 Result on Different Token Sizes -- 6.5 Results on Lowering the CPU Clock Frequency of the Resource Server. 7 Suggestions on Optimizations of Session Activation -- 8 Discussion -- 8.1 Recommendations -- 8.2 Limitations and Impact -- 9 Conclusions -- References -- HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments -- 1 Introduction -- 2 Background -- 2.1 Internet Exchange Point -- 2.2 Honeypot -- 2.3 Vehicle-to-Grid (V2G) -- 3 Related Work -- 4 HoneyEVSE Honeypot -- 4.1 Architecture -- 4.2 Physical Process -- 4.3 Services and Interaction -- 4.4 Data Logging -- 5 Results -- 5.1 Interactions Analysis -- 5.2 Interactions Origin -- 6 Conclusion -- References -- DPM 2023 -- Foreword from the DPM 2023 Program Chairs -- 18th International Workshop on Data Privacy Management - DPM 2023 -- PC Chairs -- Program Committee -- Steering Committee -- Additional Reviewers -- Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce -- 1 Introduction -- 2 Background -- 3 Methodology and Research Strategy -- 3.1 Research Questions -- 4 Results -- 4.1 The `old' Ethical Dilemmas of E-Commerce -- 4.2 The `New' Ethical Dilemmas of E-Commerce -- 5 Conclusions -- References -- Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data -- 1 Introduction -- 2 Background and Related Work -- 2.1 Synthetic Data Generation -- 2.2 Membership Inference Attacks Against Synthetic Tabular Data -- 3 Attack Scenarios -- 3.1 (S0) Auxiliary -- 3.2 (S1) Black Box -- 3.3 (S2) Published -- 3.4 (S3) Upper Bound -- 4 Experimental Setup -- 4.1 Synthetic Data Generators -- 4.2 Real World Datasets -- 4.3 Meta-classifier Methods -- 4.4 Parameters of the Attack -- 5 Results -- 5.1 Query Based Attack -- 5.2 Target Attention Attack -- 5.3 Robustness Analysis for Number of Synthetic Records m -- 6 Future Work -- 6.1 Impact of Releasing Less Synthetic Records. 6.2 Differentially Private Synthetic Generation Methods -- 6.3 Bridging the Gap with the Upper Bound -- 7 Conclusion -- References -- Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption -- 1 Introduction -- 2 Proxy Re-Encryption -- 2.1 Syntax and Basic Definitions -- 2.2 Umbral's PRE Scheme -- 3 Related Work -- 4 Patient-Centric Health Data Sovereignty -- 4.1 Proposed Solution -- 4.2 Authentication/Authorisation -- 4.3 Access Delegation Scenario -- 4.4 Break-Glass Approach -- 5 Performance Analysis -- 6 Conclusion -- References -- PrivacySmart: Automatic and Transparent Management of Privacy Policies -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution and Plan of This Paper -- 2 Proposal Description -- 2.1 System Architecture Overview -- 2.2 User Privacy Preferences -- 2.3 Pop-Up Interaction Module -- 2.4 Consent Smart Contract -- 2.5 Workflow -- 3 Discussion -- 3.1 Implementation -- 3.2 Evaluation -- 4 Conclusions and Future Work -- References -- Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Collection of VTO Providers, Websites and Apps -- 3.2 Analyzing the Sharing of Users' Images on VTO Websites/Apps -- 3.3 Analyzing Privacy Policies w.r.t VTO Feature -- 3.4 Measurement of Trackers -- 3.5 Analysing VTO Service Providers -- 4 Results -- 4.1 Sharing of Users' Images on VTO Featuring Websites -- 4.2 Privacy Policy Analysis w.r.t VTO Feature on Websites -- 4.3 Sharing of Users' Images on VTO Featuring Apps -- 4.4 Privacy Policy Analysis w.r.t VTO Feature on Apps -- 4.5 Measurement of Trackers -- 4.6 Analysis of VTO Service Providers -- 5 Conclusion -- References -- Integrally Private Model Selection for Support Vector Machine -- 1 Introduction -- 2 Preliminaries -- 2.1 Support Vector Machine (SVM). 2.2 Model Comparison Attack for SVM and Integral Privacy -- 3 Methodology -- 3.1 Overview -- 3.2 Datasets -- 3.3 Creation of Partitions -- 3.4 Integrally Private SVM (IPSVM) -- 4 Results -- 4.1 Drawbacks -- 5 Conclusion and Future Work -- References -- Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approach -- 1 Introduction -- 2 Preliminaries -- 2.1 Federated Learning -- 2.2 Differential Privacy -- 2.3 Temporal Fusion Transformers -- 3 Related Work -- 4 Differentially Private Federated Traffic Flow Prediction Using Temporal Fusion Transformers -- 4.1 Client-Side Training -- 4.2 Model Perturbation -- 4.3 Aggregation Algorithm -- 5 Dataset and Experimental Settings -- 6 Results and Analysis -- 7 Conclusion and Future Works -- References -- Analyzing Continuous Ks-Anonymization for Smart Meter Data -- 1 Introduction -- 2 Problem Statement and Related Work -- 3 ks-Anonymity and CASTLE -- 4 Evaluation -- 5 Conclusion -- References -- Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges -- 1 Introduction -- 2 Industrial Context -- 3 Background -- 4 Available Libraries -- 4.1 HElib -- 4.2 SEAL -- 4.3 PALISADE -- 4.4 OpenFHE -- 4.5 TFHE -- 4.6 Concrete -- 4.7 LATTIGO -- 5 Towards Real-World HE Applications: HELT -- 6 Related Work -- 7 Conclusion -- References -- AddShare: A Privacy-Preserving Approach for Federated Learning -- 1 Introduction -- 2 Background and Related Work -- 2.1 Federated Learning Attacks -- 2.2 Privacy in Federated Learning -- 3 The AddShare Approach -- 3.1 Threat Models -- 3.2 AddShare Algorithm -- 3.3 Implemented AddShare Variants -- 4 Empirical Evaluation -- 5 Results and Discussion -- 6 Conclusion -- References -- Secure Multiparty Sampling of a Biased Coin for Differential Privacy -- 1 Introduction -- 1.1 Other Background and Related Works. 1.2 Contribution. |
| Record Nr. | UNISA-996587860003316 |
Katsikas Sokratis
|
||
| Cham : , : Springer, , 2024 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part I / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis
| Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part I / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis |
| Autore | Katsikas Sokratis |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (342 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
XenakisChristos
KalloniatisChristos LambrinoudakisCostas |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Database management Data mining Application software Image processing - Digital techniques Computer vision Cryptography Data encryption (Computer science) Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology |
| ISBN |
9789819787982
981978798X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Attacks. -- How to Design Honey Vault Schemes. -- New Result for Breaking NTRU Encryption with Multiple Keys in Polynomial Time. -- Improving Differential-Neural Cryptanalysis for Large-State SPECK. -- Evasion attempt for the malicious PowerShell detector considering feature weights. -- A Fast Framework for Efficiently Constructing Valuable Cubes. -- A Survey on Acoustic Side Channel Attacks on Keyboards. -- Trust. -- Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics. -- DMA: Mutual Attestation Framework for Distributed Enclaves. -- Cabin: Confining Untrusted Programs within Confidential VM. -- Anomaly detection. -- UARC:Unsupervised Anomalous Traffic Detection with Improved U-shaped Autoencoder and RetNet based Multi-Clustering. -- An Investigation into the Performance of Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection. -- Impact of Recurrent Neural Networks and Deep Learning Frameworks on Adaptive Real-time Lightweight Time Series Anomaly Detection. -- Privacy. -- Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource. -- Privacy-preserving Logistic Regression Model Training Scheme by Homomorphic Encryption. -- Privacy preserving and verifiable outsourcing of AI processing for cyber-physical systems. -- Investigating the Privacy Risk of using Robot Vacuum Cleaners in Smart Environments. |
| Record Nr. | UNISA-996636771803316 |
Katsikas Sokratis
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis
| Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis |
| Autore | Katsikas Sokratis |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (344 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
XenakisChristos
KalloniatisChristos LambrinoudakisCostas |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Database management Data mining Application software Image processing - Digital techniques Computer vision Cryptography Data encryption (Computer science) Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology |
| ISBN |
9789819788019
9819788013 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Crypto & Applied crypto. -- TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic through Unsupervised Pre-training. -- Two-round Post-quantum Private Equality Test and OT from RLWE-encryption. -- Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing. -- FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection. -- Homomorphic encryption. -- X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts. -- Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions. - Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM. -- Key agreement protocols and digital signature schemes. -- CoDPoC IP:A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme. -- Formal analysis of Julia Key Agreement Protocol. -- New Construction of Code-Based Signature Schemes. -- Identity-Based Signature from Lattices without Trapdoors. -- Defences. -- The Emperor is Now Clothed: A Secure Web Governance Framework for User Authentication Between Password Managers and Web Apps. -- HoneyLLM: A Large Language Model-Powered Medium-interaction Honeypot. -- TSR-jack: An In-Browser Crypto-jacking Detection Method Based on Time Series Representation Learning. -- Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases. -- FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting. |
| Record Nr. | UNISA-996636771503316 |
Katsikas Sokratis
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||