default search action
Search dblp for Publications
export results for "stream:conf/icse-encycris:"
@inproceedings{DBLP:conf/icse-encycris/DelichehM24, author = {Hassan Onsori Delicheh and Tom Mens}, title = {Mitigating Security Issues in GitHub Actions}, booktitle = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems and Second {IEEE/ACM} International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024}, pages = {6--11}, publisher = {{ACM} / {IEEE}}, year = {2024}, url = {https://doi.org/10.1145/3643662.3643961}, doi = {10.1145/3643662.3643961}, timestamp = {Tue, 15 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/DelichehM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/FalcarinD24, author = {Paolo Falcarin and Fabio Dainese}, title = {Building a Cybersecurity Knowledge Graph with CyberGraph}, booktitle = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems and Second {IEEE/ACM} International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024}, pages = {29--36}, publisher = {{ACM} / {IEEE}}, year = {2024}, url = {https://doi.org/10.1145/3643662.3643962}, doi = {10.1145/3643662.3643962}, timestamp = {Tue, 15 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/FalcarinD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/FilippiniS24, author = {Roberto Filippini and Sara Spiller}, title = {Cybersecurity and Medical Devices: a Bull in a china Shop : Cybersecurity Challenges in Medical Devices from the Experience of a Manufacturer}, booktitle = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems and Second {IEEE/ACM} International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024}, pages = {61--67}, publisher = {{ACM} / {IEEE}}, year = {2024}, url = {https://doi.org/10.1145/3643662.3643960}, doi = {10.1145/3643662.3643960}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/FilippiniS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/GnanasekaranBGH24, author = {Vahiny Gnanasekaran and Maria Bartnes and Tor Olav Gr{\o}tan and Poul Einar Heegaard}, title = {Cyber-incident Response in Industrial Control Systems: Practices and Challenges in the Petroleum Industry}, booktitle = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems and Second {IEEE/ACM} International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024}, pages = {53--60}, publisher = {{ACM} / {IEEE}}, year = {2024}, url = {https://doi.org/10.1145/3643662.3643958}, doi = {10.1145/3643662.3643958}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/GnanasekaranBGH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/HeluanyAGK24, author = {Jessica B. Heluany and Ahmed Amro and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {Interplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancements}, booktitle = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems and Second {IEEE/ACM} International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024}, pages = {20--28}, publisher = {{ACM} / {IEEE}}, year = {2024}, url = {https://doi.org/10.1145/3643662.3643955}, doi = {10.1145/3643662.3643955}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/HeluanyAGK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/RamajSGP24, author = {Xhesika Ramaj and Mary S{\'{a}}nchez{-}Gord{\'{o}}n and Vasileios Gkioulos and Ricardo Colomo Palacios}, title = {On DevSecOps and Risk Management in Critical Infrastructures: Practitioners' Insights on Needs and Goals}, booktitle = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems and Second {IEEE/ACM} International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024}, pages = {45--52}, publisher = {{ACM} / {IEEE}}, year = {2024}, url = {https://doi.org/10.1145/3643662.3643954}, doi = {10.1145/3643662.3643954}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/RamajSGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/RyanRS24, author = {Ita Ryan and Utz Roedig and Klaas{-}Jan Stol}, title = {Training Developers to Code Securely: Theory and Practice}, booktitle = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems and Second {IEEE/ACM} International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024}, pages = {37--44}, publisher = {{ACM} / {IEEE}}, year = {2024}, url = {https://doi.org/10.1145/3643662.3643956}, doi = {10.1145/3643662.3643956}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/RyanRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/XiaZLLXZ24, author = {Boming Xia and Dawen Zhang and Yue Liu and Qinghua Lu and Zhenchang Xing and Liming Zhu}, title = {Trust in Software Supply Chains: Blockchain-Enabled {SBOM} and the {AIBOM} Future}, booktitle = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems and Second {IEEE/ACM} International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024}, pages = {12--19}, publisher = {{ACM} / {IEEE}}, year = {2024}, url = {https://doi.org/10.1145/3643662.3643957}, doi = {10.1145/3643662.3643957}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/XiaZLLXZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/ZhangWDL24, author = {Xiangwei Zhang and Junjie Wang and Xiaoning Du and Shuang Liu}, title = {WasmCFuzz: Structure-aware Fuzzing for Wasm Compilers}, booktitle = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems and Second {IEEE/ACM} International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024}, pages = {1--5}, publisher = {{ACM} / {IEEE}}, year = {2024}, url = {https://doi.org/10.1145/3643662.3643959}, doi = {10.1145/3643662.3643959}, timestamp = {Tue, 15 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/ZhangWDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse-encycris/2024, title = {{IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems and Second {IEEE/ACM} International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024}, publisher = {{ACM} / {IEEE}}, year = {2024}, url = {https://doi.org/10.1145/3643662}, doi = {10.1145/3643662}, isbn = {979-8-4007-0565-6}, timestamp = {Wed, 09 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/BrownLH23, author = {Alex Brown and Tze{-}Wen Lee and Jin B. Hong}, title = {Evaluating Moving Target Defenses against Realistic Attack Scenarios}, booktitle = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May 15, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EnCyCriS59249.2023.00005}, doi = {10.1109/ENCYCRIS59249.2023.00005}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/BrownLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/Haan23, author = {Johannes de Haan}, title = {Functional Cyber-Resilience - Extending the Cybersecurity Paradigm in Critical Infrastructures}, booktitle = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May 15, 2023}, pages = {17--22}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EnCyCriS59249.2023.00007}, doi = {10.1109/ENCYCRIS59249.2023.00007}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/Haan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/HaanY23, author = {Johannes de Haan and Abdel Youssouf}, title = {Cryptography Based Security for the {ATM} Surveillance Chain}, booktitle = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May 15, 2023}, pages = {31--36}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EnCyCriS59249.2023.00009}, doi = {10.1109/ENCYCRIS59249.2023.00009}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/HaanY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/RyanSR23, author = {Ita Ryan and Klaas{-}Jan Stol and Utz Roedig}, title = {Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who?}, booktitle = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May 15, 2023}, pages = {23--30}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EnCyCriS59249.2023.00008}, doi = {10.1109/ENCYCRIS59249.2023.00008}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/RyanSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/RyanSR23a, author = {Ita Ryan and Klaas{-}Jan Stol and Utz Roedig}, title = {The State of Secure Coding Practice: Small Organisations and "Lone, Rogue Coders"}, booktitle = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May 15, 2023}, pages = {37--44}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EnCyCriS59249.2023.00010}, doi = {10.1109/ENCYCRIS59249.2023.00010}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/RyanSR23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/SaheedMC23, author = {Kayode Yakub Saheed and Sanjay Misra and Sabarathinam Chockalingam}, title = {Autoencoder via {DCNN} and {LSTM} Models for Intrusion Detection in Industrial Control Systems of Critical Infrastructures}, booktitle = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May 15, 2023}, pages = {9--16}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EnCyCriS59249.2023.00006}, doi = {10.1109/ENCYCRIS59249.2023.00006}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/SaheedMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse-encycris/2023, title = {4th {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May 15, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EnCyCriS59249.2023}, doi = {10.1109/ENCYCRIS59249.2023}, isbn = {979-8-3503-3814-0}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/BergheYJ22, author = {Alexander van Den Berghe and Koen Yskout and Wouter Joosen}, title = {A reimagined catalogue of software security patterns}, booktitle = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022}, pages = {25--32}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524489.3527301}, doi = {10.1145/3524489.3527301}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/BergheYJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/JorgensenWHTSM22, author = {Per{-}Arne J{\o}rgensen and Andr{\'{e}} Waltoft{-}Olsen and Siv Hilde Houmb and Aleksander Lygren Toppe and Tore Geir Soltvedt and Hans Kristian Muggerud}, title = {Building a hardware-in-the-loop (HiL) digital energy station infrastructure for cyber operation resiliency testing}, booktitle = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022}, pages = {9--16}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524489.3527299}, doi = {10.1145/3524489.3527299}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/JorgensenWHTSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/MoizA22, author = {Abdul Moiz and Manar H. Alalfi}, title = {A survey of security vulnerabilities in Android automotive apps}, booktitle = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022}, pages = {17--24}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524489.3527300}, doi = {10.1145/3524489.3527300}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/MoizA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/OkutanM22, author = {Ahmet Okutan and Mehdi Mirakhorli}, title = {Predicting the severity and exploitability of vulnerability reports using convolutional neural nets}, booktitle = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022}, pages = {1--8}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524489.3527298}, doi = {10.1145/3524489.3527298}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/OkutanM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/SechiGJK22, author = {Fabien Sechi and Bj{\o}rn Axel Gran and Per{-}Arne J{\o}rgensen and Oleh Kilyukh}, title = {Better security assessment communication: combining {ISO} 27002 controls with {UML} sequence diagrams}, booktitle = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022}, pages = {49--56}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524489.3527304}, doi = {10.1145/3524489.3527304}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/SechiGJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/TeglasyKL22, author = {B{\'{a}}lint Z. T{\'{e}}gl{\'{a}}sy and Sokratis K. Katsikas and Mary Ann Lundteigen}, title = {Standardized cyber security risk assessment for unmanned offshore facilities}, booktitle = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022}, pages = {33--40}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524489.3527302}, doi = {10.1145/3524489.3527302}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/TeglasyKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/VerreydtSYJ22, author = {Stef Verreydt and Laurens Sion and Koen Yskout and Wouter Joosen}, title = {Relationship-based threat modeling}, booktitle = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022}, pages = {41--48}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524489.3527303}, doi = {10.1145/3524489.3527303}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/VerreydtSYJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse-encycris/2022, title = {Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524489}, doi = {10.1145/3524489}, isbn = {978-1-4503-9290-7}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/BhuiyanMMR21, author = {Farzana Ahamed Bhuiyan and Justin Murphy and Patrick Morrison and Akond Rahman}, title = {Practitioner Perception of Vulnerability Discovery Strategies}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {41--44}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00014}, doi = {10.1109/ENCYCRIS52570.2021.00014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/BhuiyanMMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/BoseRS21, author = {Dibyendu Brinto Bose and Akond Rahman and Md. Shazibul Islam Shamim}, title = {'Under-reported' Security Defects in Kubernetes Manifests}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {9--12}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00009}, doi = {10.1109/ENCYCRIS52570.2021.00009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/BoseRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/MeyerKL21, author = {Torstein Meyer and Nektaria Kaloudi and Jingyue Li}, title = {A Systematic Literature Review on Malicious Use of Reinforcement Learning}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {21--28}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00011}, doi = {10.1109/ENCYCRIS52570.2021.00011}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/MeyerKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/MihretL21, author = {Zelalem Mihret and Lingjun Liu}, title = {Attack-driven Test Case Generation Approach using Model-checking Technique for Collaborating Systems}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00008}, doi = {10.1109/ENCYCRIS52570.2021.00008}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/MihretL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/MohamadAJSS21, author = {Mazen Mohamad and {\"{O}}rjan Askerdal and Rodi Jolak and Jan{-}Philipp Stegh{\"{o}}fer and Riccardo Scandariato}, title = {Asset-driven Security Assurance Cases with Built-in Quality Assurance}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {29--36}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00012}, doi = {10.1109/ENCYCRIS52570.2021.00012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/MohamadAJSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/RyanRS21, author = {Ita Ryan and Utz Roedig and Klaas{-}Jan Stol}, title = {Understanding Developer Security Archetypes}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {37--40}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00013}, doi = {10.1109/ENCYCRIS52570.2021.00013}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/RyanRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse-encycris/SkandylasZKR21, author = {Charilaos Skandylas and Luyuan Zhou and Narges Khakpour and Simon Roe}, title = {Security Risk Analysis of Multi-Stage Attacks based on Data Criticality}, booktitle = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, pages = {13--20}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021.00010}, doi = {10.1109/ENCYCRIS52570.2021.00010}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse-encycris/SkandylasZKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse-encycris/2021, title = {2nd {IEEE/ACM} International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS@ICSE 2021, Madrid, Spain, June 3-4, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EnCyCriS52570.2021}, doi = {10.1109/ENCYCRIS52570.2021}, isbn = {978-1-6654-4553-5}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse-encycris/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.