default search action
ESORICS 2023: The Hague, The Netherlands, Workshops - Part I
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens-Boulahia, Costas Lambrinoudakis, Joaquín García-Alfaro, Guillermo Navarro-Arribas, Pantaleone Nespoli, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14398, Springer 2024, ISBN 978-3-031-54203-9
CyberICPS 2023
- Susanne Barkhald Sandberg, Aida Akbarzadeh, Vasileios Gkioulos:
Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain. 5-24 - Lennart Bader, Eric Wagner, Martin Henze, Martin Serror:
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks. 25-45 - Karl Jonatan Due Vatn, Georgios Kavallieratos, Sokratis K. Katsikas:
Threat Analysis in Dairy Farming 4.0. 46-63 - Konstantinos Kontogeorgopoulos, Kyriakos Kritikos:
Overview of Social Engineering Protection and Prevention Methods. 64-83 - Teodor Sommestad, Henrik Karlzén, Hanna Kvist, Hanna Gustafsson:
Skade - A Challenge Management System for Cyber Threat Hunting. 84-103 - Thrasyvoulos Giannakopoulos, Konstantinos N. Maliatsos:
On the Usage of NLP on CVE Descriptions for Calculating Risk. 104-123 - Björn Leander, Aida Causevic, Hans Hansson, Tomas Lindström:
Evaluation of an OPC UA-Based Access Control Enforcement Architecture. 124-144 - Massimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, Federico Turrin:
HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments. 145-159
DPM 2023
- Michal Choras, Aleksandra Pawlicka, Dagmara Jaroszewska-Choras, Marek Pawlicki:
Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce. 167-181 - Florent Guépin, Matthieu Meeus, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data. 182-198 - Bruno Rodrigues, Ivone Amorim, Ivan Silva, Alexandra Mendes:
Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption. 199-215 - Cristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Eduard Josep Bel-Ribes:
PrivacySmart: Automatic and Transparent Management of Privacy Policies. 216-231 - Abdelrahman Ragab, Mohammad Mannan, Amr M. Youssef:
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps. 232-248 - Saloni Kwatra, Ayush K. Varshney, Vicenç Torra:
Integrally Private Model Selection for Support Vector Machine. 249-259 - Sargam Gupta, Vicenç Torra:
Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approach. 260-271 - Carolin Brunn, Saskia Nuñez von Voigt, Florian Tschorsch:
Analyzing Continuous Ks-Anonymization for Smart Meter Data. 272-282 - Michela Iezzi, Carsten Maple, Andrea Leonetti:
Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges. 283-298 - Bernard Asare, Paula Branco, Iluju Kiringa, Tet Hin Yeap:
AddShare: A Privacy-Preserving Approach for Federated Learning. 299-309 - Amir Zarei, Staal Amund Vinterbo:
Secure Multiparty Sampling of a Biased Coin for Differential Privacy. 310-320
CBT 2023
- Mohammad Sadegh Nourbakhsh, Feng Hao, Arshad Jhumka:
Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications. 327-343 - Vincent Happersberger, Frank-Walter Jäkel, Thomas Knothe, Yvonne-Anne Pignolet, Stefan Schmid:
Comparison of Ethereum Smart Contract Analysis and Verification Methods. 344-358 - Vincent Jacquot, Benoit Donnet:
Chaussette: A Symbolic Verification of Bitcoin Scripts. 359-375 - Francesco D'Amato, Luca Zanolini:
A Simple Single Slot Finality Protocol for Ethereum. 376-393 - Bahareh Parhizkari, Antonio Ken Iannillo, Christof Ferreira Torres, Sebastian Banescu, Joseph Jiaqi Xu, Radu State:
Timely Identification of Victim Addresses in DeFi Attacks. 394-410 - Charmaine Ndolo, Florian Tschorsch:
On the (Not So) Surprising Impact of Multi-Path Payments on Performance And Privacy in the Lightning Network. 411-427
SECPRE 2023
- Jens Leicht, Marvin Wagner, Maritta Heisel:
Creating Privacy Policies from Data-Flow Diagrams. 433-453 - Mario Raciti, Giampaolo Bella:
Up-to-Date Threat Modelling for Soft Privacy on Smart Cars. 454-473 - Cihan Eryonucu, Panos Papadimitratos:
Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy. 474-493 - Stavros Simou, Aikaterini-Georgia Mavroeidi, Christos Kalloniatis:
Review on Privacy and Trust Methodologies in Cloud Computing. 494-505
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.