


default search action
ESORICS 2023: The Hague, The Netherlands, Workshops - Part I
- Sokratis K. Katsikas
, Frédéric Cuppens, Nora Cuppens-Boulahia
, Costas Lambrinoudakis, Joaquín García-Alfaro
, Guillermo Navarro-Arribas
, Pantaleone Nespoli
, Christos Kalloniatis
, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14398, Springer 2024, ISBN 978-3-031-54203-9
CyberICPS 2023
- Susanne Barkhald Sandberg
, Aida Akbarzadeh
, Vasileios Gkioulos
:
Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain. 5-24 - Lennart Bader
, Eric Wagner
, Martin Henze
, Martin Serror
:
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks. 25-45 - Karl Jonatan Due Vatn
, Georgios Kavallieratos
, Sokratis K. Katsikas
:
Threat Analysis in Dairy Farming 4.0. 46-63 - Konstantinos Kontogeorgopoulos
, Kyriakos Kritikos
:
Overview of Social Engineering Protection and Prevention Methods. 64-83 - Teodor Sommestad, Henrik Karlzén, Hanna Kvist, Hanna Gustafsson:
Skade - A Challenge Management System for Cyber Threat Hunting. 84-103 - Thrasyvoulos Giannakopoulos
, Konstantinos N. Maliatsos
:
On the Usage of NLP on CVE Descriptions for Calculating Risk. 104-123 - Björn Leander
, Aida Causevic
, Hans Hansson
, Tomas Lindström:
Evaluation of an OPC UA-Based Access Control Enforcement Architecture. 124-144 - Massimiliano Baldo
, Tommaso Bianchi
, Mauro Conti
, Alessio Trevisan, Federico Turrin
:
HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments. 145-159
DPM 2023
- Michal Choras, Aleksandra Pawlicka, Dagmara Jaroszewska-Choras, Marek Pawlicki:
Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce. 167-181 - Florent Guépin
, Matthieu Meeus
, Ana-Maria Cretu
, Yves-Alexandre de Montjoye
:
Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data. 182-198 - Bruno Rodrigues
, Ivone Amorim
, Ivan Silva
, Alexandra Mendes
:
Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption. 199-215 - Cristòfol Daudén-Esmel
, Jordi Castellà-Roca
, Alexandre Viejo
, Eduard Josep Bel-Ribes:
PrivacySmart: Automatic and Transparent Management of Privacy Policies. 216-231 - Abdelrahman Ragab
, Mohammad Mannan
, Amr M. Youssef
:
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps. 232-248 - Saloni Kwatra
, Ayush K. Varshney
, Vicenç Torra
:
Integrally Private Model Selection for Support Vector Machine. 249-259 - Sargam Gupta
, Vicenç Torra
:
Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approach. 260-271 - Carolin Brunn, Saskia Nuñez von Voigt, Florian Tschorsch:
Analyzing Continuous Ks-Anonymization for Smart Meter Data. 272-282 - Michela Iezzi, Carsten Maple, Andrea Leonetti:
Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges. 283-298 - Bernard Asare, Paula Branco, Iluju Kiringa, Tet Hin Yeap:
AddShare: A Privacy-Preserving Approach for Federated Learning. 299-309 - Amir Zarei
, Staal Amund Vinterbo
:
Secure Multiparty Sampling of a Biased Coin for Differential Privacy. 310-320
CBT 2023
- Mohammad Sadegh Nourbakhsh
, Feng Hao
, Arshad Jhumka
:
Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications. 327-343 - Vincent Happersberger
, Frank-Walter Jäkel
, Thomas Knothe, Yvonne-Anne Pignolet
, Stefan Schmid
:
Comparison of Ethereum Smart Contract Analysis and Verification Methods. 344-358 - Vincent Jacquot
, Benoit Donnet
:
Chaussette: A Symbolic Verification of Bitcoin Scripts. 359-375 - Francesco D'Amato
, Luca Zanolini
:
A Simple Single Slot Finality Protocol for Ethereum. 376-393 - Bahareh Parhizkari
, Antonio Ken Iannillo
, Christof Ferreira Torres
, Sebastian Banescu
, Joseph Jiaqi Xu
, Radu State
:
Timely Identification of Victim Addresses in DeFi Attacks. 394-410 - Charmaine Ndolo, Florian Tschorsch:
On the (Not So) Surprising Impact of Multi-Path Payments on Performance And Privacy in the Lightning Network. 411-427
SECPRE 2023
- Jens Leicht, Marvin Wagner, Maritta Heisel:
Creating Privacy Policies from Data-Flow Diagrams. 433-453 - Mario Raciti
, Giampaolo Bella
:
Up-to-Date Threat Modelling for Soft Privacy on Smart Cars. 454-473 - Cihan Eryonucu, Panos Papadimitratos
:
Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy. 474-493 - Stavros Simou
, Aikaterini-Georgia Mavroeidi
, Christos Kalloniatis
:
Review on Privacy and Trust Methodologies in Cloud Computing. 494-505

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.