default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2024
- Hassan Onsori Delicheh, Tom Mens:
Mitigating Security Issues in GitHub Actions. EnCyCriS/SVM 2024: 6-11 - Paolo Falcarin, Fabio Dainese:
Building a Cybersecurity Knowledge Graph with CyberGraph. EnCyCriS/SVM 2024: 29-36 - Roberto Filippini, Sara Spiller:
Cybersecurity and Medical Devices: a Bull in a china Shop : Cybersecurity Challenges in Medical Devices from the Experience of a Manufacturer. EnCyCriS/SVM 2024: 61-67 - Vahiny Gnanasekaran, Maria Bartnes, Tor Olav Grøtan, Poul Einar Heegaard:
Cyber-incident Response in Industrial Control Systems: Practices and Challenges in the Petroleum Industry. EnCyCriS/SVM 2024: 53-60 - Jessica B. Heluany, Ahmed Amro, Vasileios Gkioulos, Sokratis K. Katsikas:
Interplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancements. EnCyCriS/SVM 2024: 20-28 - Xhesika Ramaj, Mary Sánchez-Gordón, Vasileios Gkioulos, Ricardo Colomo Palacios:
On DevSecOps and Risk Management in Critical Infrastructures: Practitioners' Insights on Needs and Goals. EnCyCriS/SVM 2024: 45-52 - Ita Ryan, Utz Roedig, Klaas-Jan Stol:
Training Developers to Code Securely: Theory and Practice. EnCyCriS/SVM 2024: 37-44 - Boming Xia, Dawen Zhang, Yue Liu, Qinghua Lu, Zhenchang Xing, Liming Zhu:
Trust in Software Supply Chains: Blockchain-Enabled SBOM and the AIBOM Future. EnCyCriS/SVM 2024: 12-19 - Xiangwei Zhang, Junjie Wang, Xiaoning Du, Shuang Liu:
WasmCFuzz: Structure-aware Fuzzing for Wasm Compilers. EnCyCriS/SVM 2024: 1-5 - IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems and Second IEEE/ACM International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, Lisbon, Portugal, April 15, 2024. ACM / IEEE 2024, ISBN 979-8-4007-0565-6 [contents]
- 2023
- Alex Brown, Tze-Wen Lee, Jin B. Hong:
Evaluating Moving Target Defenses against Realistic Attack Scenarios. EnCyCriS@ICSE 2023: 1-8 - Johannes de Haan:
Functional Cyber-Resilience - Extending the Cybersecurity Paradigm in Critical Infrastructures. EnCyCriS@ICSE 2023: 17-22 - Johannes de Haan, Abdel Youssouf:
Cryptography Based Security for the ATM Surveillance Chain. EnCyCriS@ICSE 2023: 31-36 - Ita Ryan, Klaas-Jan Stol, Utz Roedig:
Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who? EnCyCriS@ICSE 2023: 23-30 - Ita Ryan, Klaas-Jan Stol, Utz Roedig:
The State of Secure Coding Practice: Small Organisations and "Lone, Rogue Coders". EnCyCriS@ICSE 2023: 37-44 - Kayode Yakub Saheed, Sanjay Misra, Sabarathinam Chockalingam:
Autoencoder via DCNN and LSTM Models for Intrusion Detection in Industrial Control Systems of Critical Infrastructures. EnCyCriS@ICSE 2023: 9-16 - 4th IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical System, EnCyCriS@ICSE 2023, Melbourne, Australia, May 15, 2023. IEEE 2023, ISBN 979-8-3503-3814-0 [contents]
- 2022
- Alexander van Den Berghe, Koen Yskout, Wouter Joosen:
A reimagined catalogue of software security patterns. EnCyCriS@ICSE 2022: 25-32 - Per-Arne Jørgensen, André Waltoft-Olsen, Siv Hilde Houmb, Aleksander Lygren Toppe, Tore Geir Soltvedt, Hans Kristian Muggerud:
Building a hardware-in-the-loop (HiL) digital energy station infrastructure for cyber operation resiliency testing. EnCyCriS@ICSE 2022: 9-16 - Abdul Moiz, Manar H. Alalfi:
A survey of security vulnerabilities in Android automotive apps. EnCyCriS@ICSE 2022: 17-24 - Ahmet Okutan, Mehdi Mirakhorli:
Predicting the severity and exploitability of vulnerability reports using convolutional neural nets. EnCyCriS@ICSE 2022: 1-8 - Fabien Sechi, Bjørn Axel Gran, Per-Arne Jørgensen, Oleh Kilyukh:
Better security assessment communication: combining ISO 27002 controls with UML sequence diagrams. EnCyCriS@ICSE 2022: 49-56 - Bálint Z. Téglásy, Sokratis K. Katsikas, Mary Ann Lundteigen:
Standardized cyber security risk assessment for unmanned offshore facilities. EnCyCriS@ICSE 2022: 33-40 - Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen:
Relationship-based threat modeling. EnCyCriS@ICSE 2022: 41-48 - Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2022, Pittsburgh, Pennsylvania, 16 May 2022. ACM 2022, ISBN 978-1-4503-9290-7 [contents]
- 2021
- Farzana Ahamed Bhuiyan, Justin Murphy, Patrick Morrison, Akond Rahman:
Practitioner Perception of Vulnerability Discovery Strategies. EnCyCriS@ICSE 2021: 41-44 - Dibyendu Brinto Bose, Akond Rahman, Md. Shazibul Islam Shamim:
'Under-reported' Security Defects in Kubernetes Manifests. EnCyCriS@ICSE 2021: 9-12 - Torstein Meyer, Nektaria Kaloudi, Jingyue Li:
A Systematic Literature Review on Malicious Use of Reinforcement Learning. EnCyCriS@ICSE 2021: 21-28 - Zelalem Mihret, Lingjun Liu:
Attack-driven Test Case Generation Approach using Model-checking Technique for Collaborating Systems. EnCyCriS@ICSE 2021: 1-8 - Mazen Mohamad, Örjan Askerdal, Rodi Jolak, Jan-Philipp Steghöfer, Riccardo Scandariato:
Asset-driven Security Assurance Cases with Built-in Quality Assurance. EnCyCriS@ICSE 2021: 29-36
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-11 10:25 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint