Search dblp for Publications

export results for "stream:conf/icse-encycris:"

 download as .bib file

@inproceedings{DBLP:conf/icse-encycris/DelichehM24,
  author       = {Hassan Onsori Delicheh and
                  Tom Mens},
  title        = {Mitigating Security Issues in GitHub Actions},
  booktitle    = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems and Second {IEEE/ACM} International Workshop on
                  Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April
                  15, 2024},
  pages        = {6--11},
  publisher    = {{ACM} / {IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643662.3643961},
  doi          = {10.1145/3643662.3643961},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/DelichehM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/FalcarinD24,
  author       = {Paolo Falcarin and
                  Fabio Dainese},
  title        = {Building a Cybersecurity Knowledge Graph with CyberGraph},
  booktitle    = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems and Second {IEEE/ACM} International Workshop on
                  Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April
                  15, 2024},
  pages        = {29--36},
  publisher    = {{ACM} / {IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643662.3643962},
  doi          = {10.1145/3643662.3643962},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/FalcarinD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/FilippiniS24,
  author       = {Roberto Filippini and
                  Sara Spiller},
  title        = {Cybersecurity and Medical Devices: a Bull in a china Shop : Cybersecurity
                  Challenges in Medical Devices from the Experience of a Manufacturer},
  booktitle    = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems and Second {IEEE/ACM} International Workshop on
                  Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April
                  15, 2024},
  pages        = {61--67},
  publisher    = {{ACM} / {IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643662.3643960},
  doi          = {10.1145/3643662.3643960},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/FilippiniS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/GnanasekaranBGH24,
  author       = {Vahiny Gnanasekaran and
                  Maria Bartnes and
                  Tor Olav Gr{\o}tan and
                  Poul Einar Heegaard},
  title        = {Cyber-incident Response in Industrial Control Systems: Practices and
                  Challenges in the Petroleum Industry},
  booktitle    = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems and Second {IEEE/ACM} International Workshop on
                  Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April
                  15, 2024},
  pages        = {53--60},
  publisher    = {{ACM} / {IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643662.3643958},
  doi          = {10.1145/3643662.3643958},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/GnanasekaranBGH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/HeluanyAGK24,
  author       = {Jessica B. Heluany and
                  Ahmed Amro and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {Interplay of Digital Twins and Cyber Deception: Unraveling Paths for
                  Technological Advancements},
  booktitle    = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems and Second {IEEE/ACM} International Workshop on
                  Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April
                  15, 2024},
  pages        = {20--28},
  publisher    = {{ACM} / {IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643662.3643955},
  doi          = {10.1145/3643662.3643955},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/HeluanyAGK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/RamajSGP24,
  author       = {Xhesika Ramaj and
                  Mary S{\'{a}}nchez{-}Gord{\'{o}}n and
                  Vasileios Gkioulos and
                  Ricardo Colomo Palacios},
  title        = {On DevSecOps and Risk Management in Critical Infrastructures: Practitioners'
                  Insights on Needs and Goals},
  booktitle    = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems and Second {IEEE/ACM} International Workshop on
                  Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April
                  15, 2024},
  pages        = {45--52},
  publisher    = {{ACM} / {IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643662.3643954},
  doi          = {10.1145/3643662.3643954},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/RamajSGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/RyanRS24,
  author       = {Ita Ryan and
                  Utz Roedig and
                  Klaas{-}Jan Stol},
  title        = {Training Developers to Code Securely: Theory and Practice},
  booktitle    = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems and Second {IEEE/ACM} International Workshop on
                  Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April
                  15, 2024},
  pages        = {37--44},
  publisher    = {{ACM} / {IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643662.3643956},
  doi          = {10.1145/3643662.3643956},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/RyanRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/XiaZLLXZ24,
  author       = {Boming Xia and
                  Dawen Zhang and
                  Yue Liu and
                  Qinghua Lu and
                  Zhenchang Xing and
                  Liming Zhu},
  title        = {Trust in Software Supply Chains: Blockchain-Enabled {SBOM} and the
                  {AIBOM} Future},
  booktitle    = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems and Second {IEEE/ACM} International Workshop on
                  Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April
                  15, 2024},
  pages        = {12--19},
  publisher    = {{ACM} / {IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643662.3643957},
  doi          = {10.1145/3643662.3643957},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/XiaZLLXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/ZhangWDL24,
  author       = {Xiangwei Zhang and
                  Junjie Wang and
                  Xiaoning Du and
                  Shuang Liu},
  title        = {WasmCFuzz: Structure-aware Fuzzing for Wasm Compilers},
  booktitle    = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems and Second {IEEE/ACM} International Workshop on
                  Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April
                  15, 2024},
  pages        = {1--5},
  publisher    = {{ACM} / {IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643662.3643959},
  doi          = {10.1145/3643662.3643959},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/ZhangWDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse-encycris/2024,
  title        = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems and Second {IEEE/ACM} International Workshop on
                  Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April
                  15, 2024},
  publisher    = {{ACM} / {IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643662},
  doi          = {10.1145/3643662},
  isbn         = {979-8-4007-0565-6},
  timestamp    = {Wed, 09 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/BrownLH23,
  author       = {Alex Brown and
                  Tze{-}Wen Lee and
                  Jin B. Hong},
  title        = {Evaluating Moving Target Defenses against Realistic Attack Scenarios},
  booktitle    = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May
                  15, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EnCyCriS59249.2023.00005},
  doi          = {10.1109/ENCYCRIS59249.2023.00005},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/BrownLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/Haan23,
  author       = {Johannes de Haan},
  title        = {Functional Cyber-Resilience - Extending the Cybersecurity Paradigm
                  in Critical Infrastructures},
  booktitle    = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May
                  15, 2023},
  pages        = {17--22},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EnCyCriS59249.2023.00007},
  doi          = {10.1109/ENCYCRIS59249.2023.00007},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/Haan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/HaanY23,
  author       = {Johannes de Haan and
                  Abdel Youssouf},
  title        = {Cryptography Based Security for the {ATM} Surveillance Chain},
  booktitle    = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May
                  15, 2023},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EnCyCriS59249.2023.00009},
  doi          = {10.1109/ENCYCRIS59249.2023.00009},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/HaanY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/RyanSR23,
  author       = {Ita Ryan and
                  Klaas{-}Jan Stol and
                  Utz Roedig},
  title        = {Studying Secure Coding in the Laboratory: Why, What, Where, How, and
                  Who?},
  booktitle    = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May
                  15, 2023},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EnCyCriS59249.2023.00008},
  doi          = {10.1109/ENCYCRIS59249.2023.00008},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/RyanSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/RyanSR23a,
  author       = {Ita Ryan and
                  Klaas{-}Jan Stol and
                  Utz Roedig},
  title        = {The State of Secure Coding Practice: Small Organisations and "Lone,
                  Rogue Coders"},
  booktitle    = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May
                  15, 2023},
  pages        = {37--44},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EnCyCriS59249.2023.00010},
  doi          = {10.1109/ENCYCRIS59249.2023.00010},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/RyanSR23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/SaheedMC23,
  author       = {Kayode Yakub Saheed and
                  Sanjay Misra and
                  Sabarathinam Chockalingam},
  title        = {Autoencoder via {DCNN} and {LSTM} Models for Intrusion Detection in
                  Industrial Control Systems of Critical Infrastructures},
  booktitle    = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May
                  15, 2023},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EnCyCriS59249.2023.00006},
  doi          = {10.1109/ENCYCRIS59249.2023.00006},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/SaheedMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse-encycris/2023,
  title        = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May
                  15, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EnCyCriS59249.2023},
  doi          = {10.1109/ENCYCRIS59249.2023},
  isbn         = {979-8-3503-3814-0},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/BergheYJ22,
  author       = {Alexander van Den Berghe and
                  Koen Yskout and
                  Wouter Joosen},
  title        = {A reimagined catalogue of software security patterns},
  booktitle    = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May
                  2022},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524489.3527301},
  doi          = {10.1145/3524489.3527301},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/BergheYJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/JorgensenWHTSM22,
  author       = {Per{-}Arne J{\o}rgensen and
                  Andr{\'{e}} Waltoft{-}Olsen and
                  Siv Hilde Houmb and
                  Aleksander Lygren Toppe and
                  Tore Geir Soltvedt and
                  Hans Kristian Muggerud},
  title        = {Building a hardware-in-the-loop (HiL) digital energy station infrastructure
                  for cyber operation resiliency testing},
  booktitle    = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May
                  2022},
  pages        = {9--16},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524489.3527299},
  doi          = {10.1145/3524489.3527299},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/JorgensenWHTSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/MoizA22,
  author       = {Abdul Moiz and
                  Manar H. Alalfi},
  title        = {A survey of security vulnerabilities in Android automotive apps},
  booktitle    = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May
                  2022},
  pages        = {17--24},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524489.3527300},
  doi          = {10.1145/3524489.3527300},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/MoizA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/OkutanM22,
  author       = {Ahmet Okutan and
                  Mehdi Mirakhorli},
  title        = {Predicting the severity and exploitability of vulnerability reports
                  using convolutional neural nets},
  booktitle    = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May
                  2022},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524489.3527298},
  doi          = {10.1145/3524489.3527298},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/OkutanM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/SechiGJK22,
  author       = {Fabien Sechi and
                  Bj{\o}rn Axel Gran and
                  Per{-}Arne J{\o}rgensen and
                  Oleh Kilyukh},
  title        = {Better security assessment communication: combining {ISO} 27002 controls
                  with {UML} sequence diagrams},
  booktitle    = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May
                  2022},
  pages        = {49--56},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524489.3527304},
  doi          = {10.1145/3524489.3527304},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/SechiGJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/TeglasyKL22,
  author       = {B{\'{a}}lint Z. T{\'{e}}gl{\'{a}}sy and
                  Sokratis K. Katsikas and
                  Mary Ann Lundteigen},
  title        = {Standardized cyber security risk assessment for unmanned offshore
                  facilities},
  booktitle    = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May
                  2022},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524489.3527302},
  doi          = {10.1145/3524489.3527302},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/TeglasyKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/VerreydtSYJ22,
  author       = {Stef Verreydt and
                  Laurens Sion and
                  Koen Yskout and
                  Wouter Joosen},
  title        = {Relationship-based threat modeling},
  booktitle    = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May
                  2022},
  pages        = {41--48},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524489.3527303},
  doi          = {10.1145/3524489.3527303},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/VerreydtSYJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse-encycris/2022,
  title        = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May
                  2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524489},
  doi          = {10.1145/3524489},
  isbn         = {978-1-4503-9290-7},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/BhuiyanMMR21,
  author       = {Farzana Ahamed Bhuiyan and
                  Justin Murphy and
                  Patrick Morrison and
                  Akond Rahman},
  title        = {Practitioner Perception of Vulnerability Discovery Strategies},
  booktitle    = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4,
                  2021},
  pages        = {41--44},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EnCyCriS52570.2021.00014},
  doi          = {10.1109/ENCYCRIS52570.2021.00014},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/BhuiyanMMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/BoseRS21,
  author       = {Dibyendu Brinto Bose and
                  Akond Rahman and
                  Md. Shazibul Islam Shamim},
  title        = {'Under-reported' Security Defects in Kubernetes Manifests},
  booktitle    = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4,
                  2021},
  pages        = {9--12},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EnCyCriS52570.2021.00009},
  doi          = {10.1109/ENCYCRIS52570.2021.00009},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/BoseRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/MeyerKL21,
  author       = {Torstein Meyer and
                  Nektaria Kaloudi and
                  Jingyue Li},
  title        = {A Systematic Literature Review on Malicious Use of Reinforcement Learning},
  booktitle    = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4,
                  2021},
  pages        = {21--28},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EnCyCriS52570.2021.00011},
  doi          = {10.1109/ENCYCRIS52570.2021.00011},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/MeyerKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/MihretL21,
  author       = {Zelalem Mihret and
                  Lingjun Liu},
  title        = {Attack-driven Test Case Generation Approach using Model-checking Technique
                  for Collaborating Systems},
  booktitle    = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4,
                  2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EnCyCriS52570.2021.00008},
  doi          = {10.1109/ENCYCRIS52570.2021.00008},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/MihretL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/MohamadAJSS21,
  author       = {Mazen Mohamad and
                  {\"{O}}rjan Askerdal and
                  Rodi Jolak and
                  Jan{-}Philipp Stegh{\"{o}}fer and
                  Riccardo Scandariato},
  title        = {Asset-driven Security Assurance Cases with Built-in Quality Assurance},
  booktitle    = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4,
                  2021},
  pages        = {29--36},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EnCyCriS52570.2021.00012},
  doi          = {10.1109/ENCYCRIS52570.2021.00012},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/MohamadAJSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/RyanRS21,
  author       = {Ita Ryan and
                  Utz Roedig and
                  Klaas{-}Jan Stol},
  title        = {Understanding Developer Security Archetypes},
  booktitle    = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4,
                  2021},
  pages        = {37--40},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EnCyCriS52570.2021.00013},
  doi          = {10.1109/ENCYCRIS52570.2021.00013},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/RyanRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse-encycris/SkandylasZKR21,
  author       = {Charilaos Skandylas and
                  Luyuan Zhou and
                  Narges Khakpour and
                  Simon Roe},
  title        = {Security Risk Analysis of Multi-Stage Attacks based on Data Criticality},
  booktitle    = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4,
                  2021},
  pages        = {13--20},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EnCyCriS52570.2021.00010},
  doi          = {10.1109/ENCYCRIS52570.2021.00010},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/SkandylasZKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse-encycris/2021,
  title        = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity
                  of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4,
                  2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EnCyCriS52570.2021},
  doi          = {10.1109/ENCYCRIS52570.2021},
  isbn         = {978-1-6654-4553-5},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse-encycris/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}