Browse Results

Showing 12,876 through 12,900 of 61,884 results

Computer Security – ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part I (Lecture Notes in Computer Science #13554)

by Weizhi Meng Christian D. Jensen Roberto Di Pietro Vijayalakshmi Atluri

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Computer Security – ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II (Lecture Notes in Computer Science #13555)

by Weizhi Meng Christian D. Jensen Roberto Di Pietro Vijayalakshmi Atluri

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows:Part I: Blockchain security; privacy; crypto; attacks; sidechannels;Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications;Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Computer Security – ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part III (Lecture Notes in Computer Science #13556)

by Weizhi Meng Christian D. Jensen Roberto Di Pietro Vijayalakshmi Atluri

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows:Part I: Blockchain security; privacy; crypto; attacks; sidechannels;Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications;Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14344)

by Mauro Conti Georgios Smaragdakis Kaitai Liang Gene Tsudik

The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.

Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II (Lecture Notes in Computer Science #14345)

by Mauro Conti Georgios Smaragdakis Kaitai Liang Gene Tsudik

The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.

Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part III (Lecture Notes in Computer Science #14346)

by Mauro Conti Georgios Smaragdakis Kaitai Liang Gene Tsudik

The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.

Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part IV (Lecture Notes in Computer Science #14347)

by Mauro Conti Georgios Smaragdakis Kaitai Liang Gene Tsudik

The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.

Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16–20, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14982)

by Sokratis Katsikas Joaquin Garcia-Alfaro Michał Choraś Rafał Kozik

This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.

Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16–20, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14983)

by Sokratis Katsikas Joaquin Garcia-Alfaro Michał Choraś Rafał Kozik

This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.

Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16–20, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14984)

by Sokratis Katsikas Joaquin Garcia-Alfaro Michał Choraś Rafał Kozik

This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.

Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16–20, 2024, Proceedings, Part IV (Lecture Notes in Computer Science #14985)

by Sokratis Katsikas Joaquin Garcia-Alfaro Michał Choraś Rafał Kozik

This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.

Computer Security. ESORICS 2021 International Workshops: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13106)

by John Mylopoulos Steven Furnell Sokratis Katsikas Costas Lambrinoudakis Silvio Ranise Nora Cuppens Christos Kalloniatis Weizhi Meng Frank Pallas Jörg Pohle Habtamu Abie Luca Verderame Enrico Cambiaso M. Angela Sasse Jorge Maestre Vidal Marco Antonio Sotelo Monge

This book constitutes the refereed proceedings of six International Workshops that were held in conjunction with the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-6, 2021. The conference was initially planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic.The 32 papers included in these proceedings stem from the following workshops:the 7th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2021, which accepted 7 papers from 16 submissions;the 5th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2021, which accepted 5 papers from 8 submissions;the 4th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2021, which accepted 6 full and 1 short paper out of 15 submissions; the 3rd Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2021, which accepted 5 full and 1 short paper out of 13 submissions.the 2nd Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2021, which accepted 3 full and 1 short paper out of 6 submissions; and the 1st International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2021, which accepted 3 papers out of 7 submissions.The following papers are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com:Why IT Security Needs Therapy by Uta Menges, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, and Imogen VerretTransferring Update Behavior from Smartphones to Smart Consumer Devices by Matthias Fassl, Michaela Neumayr, Oliver Schedler, and Katharina Krombholz Organisational Contexts of Energy Cybersecurity by Tania Wallis, Greig Paul, and James Irvine SMILE - Smart eMaIl Link domain Extractor by Mattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, and Melanie Volkamer A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things by Salatiel Ezennaya-Gomez, Claus Vielhauer, and Jana Dittmann Data Protection Impact Assessments in Practice - Experiences from Case Studies by Michael Friedewald, Ina Schiering, Nicholas Martin, and Dara Hallinan

Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13785)

by John Mylopoulos Massimiliano Albanese Frédéric Cuppens Sokratis Katsikas Silvio Ranise Christos Kalloniatis Frank Pallas Jörg Pohle Habtamu Abie Luca Verderame Enrico Cambiaso M. Angela Sasse Jorge Maestre Vidal Marco Antonio Sotelo Monge Basel Katt Sandeep Pirbhulal Ankur Shukla

This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022. The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2022, which accepted 4 full papers out of 13 submissions; Third Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2022, which accepted 9 full and 1 short paper out of 19 submissions; Second International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2022, which accepted 5 papers out of 8 submissions; First International Workshop on Election Infrastructure Security, EIS 2022, which accepted 5 papers out of 10 submissions; and First International Workshop on System Security Assurance, SecAssure 2022, which accepted 5 papers out of 10 submissions.

Computer Security. ESORICS 2023 International Workshops: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II (Lecture Notes in Computer Science #14399)

by Steven Furnell Sokratis Katsikas Silvio Ranise Kim-Kwang Raymond Choo Weizhi Meng Habtamu Abie Luca Verderame Enrico Cambiaso Rita Ugarelli Isabel Praça Wenjuan Li Basel Katt Sandeep Pirbhulal Ankur Shukla Abhishta Abhishta Naoto Yanai Michele Ianni Mila Dalla Preda Miguel Pupo Correia Giovanni Sileno Mina Alishahi Harsha Kalutarage

This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023. The 22 regular papers included in these proceedings stem from the following workshops:9th International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2023, which accepted 8 papers from 18 submissions;18th International Workshop on Data Privacy Management, DPM 2023, which accepted 11 papers from 18 submissions;7th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2023, which accepted 6 papers from 20 submissions;7th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2023, which accepted 4 papers from 7 submissions.4th International Workshop onCyber-Physical Security for Critical Infrastructures Protection, CSPS4CIP 2023, which accepted 11 papers from 15 submissions.6th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2023, which accepted 6 papers from 10 submissions;Second International Workshop on System Security Assurance, SecAssure 2023, which accepted 5 papers from 8 submissions;First International Workshop on Attacks and Software Protection, WASP 2023, which accepted 7 papers from 13 submissionsInternational Workshop on Transparency, Accountability and User Control for a Responsible Internet, TAURIN 2023, which accepted 3 papers from 4 submissions;International Workshop on Private, Secure, and Trustworthy AI, PriST-AI 2023, which accepted 4 papers from 8 submissions;International Workshop on Security and Artificial Intelligence, SECAI 2023, which accepted 5 papers from 10 submissions.

Computer Security. ESORICS 2023 International Workshops: CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I (Lecture Notes in Computer Science #14398)

by John Mylopoulos Nora Cuppens-Boulahia Frédéric Cuppens Sokratis Katsikas Costas Lambrinoudakis Joaquin Garcia-Alfaro Guillermo Navarro-Arribas Christos Kalloniatis Annie Antón Stefanos Gritzalis Pantaleone Nespoli

This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023. The 22 regular papers included in these proceedings stem from the following workshops:9th International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2023, which accepted 8 papers from 18 submissions;18th International Workshop on Data Privacy Management, DPM 2023, which accepted 11 papers from 18 submissions;7th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2023, which accepted 6 papers from 20 submissions;7th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2023, which accepted 4 papers from 7 submissions.4th International Workshop onCyber-Physical Security for Critical Infrastructures Protection, CSPS4CIP 2023, which accepted 11 papers from 15 submissions.6th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2023, which accepted 6 papers from 10 submissions;Second International Workshop on System Security Assurance, SecAssure 2023, which accepted 5 papers from 8 submissions;First International Workshop on Attacks and Software Protection, WASP 2023, which accepted 7 papers from 13 submissionsInternational Workshop on Transparency, Accountability and User Control for a Responsible Internet, TAURIN 2023, which accepted 3 papers from 4 submissions;International Workshop on Private, Secure, and Trustworthy AI, PriST-AI 2023, which accepted 4 papers from 8 submissions;International Workshop on Security and Artificial Intelligence, SECAI 2023, which accepted 5 papers from 10 submissions.

Computer Security. ESORICS 2024 International Workshops: DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part I (Lecture Notes in Computer Science #15263)

by Nora Cuppens-Boulahia Frédéric Cuppens Sokratis Katsikas Costas Lambrinoudakis Joaquin Garcia-Alfaro Guillermo Navarro-Arribas Michał Choraś Cristina Pérez-Solà Ken Barker Marek Pawlicki Sergi Delgado-Segura

This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The papers included in these proceedings stem from the following workshops: 19th International Workshop on Data Privacy Management, DPM 2024, which accepted 7 full papers and 6 short papers out of 24 submissions; 8th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024, which accepted 9 full papers out of 17 submissions; 10th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024, which accepted 9 full papers out of 17 submissions; International Workshop on Security and Artificial Intelligence, SECAI 2024, which accepted 10 full papers and 5 short papers out of 42 submissions; Workshop on Computational Methods for Emerging Problems in Disinformation Analysis, DisA 2024, which accepted 4 full papers out of 8 submissions; 5th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2024, which accepted 4 full papers out of 9 submissions; 3rd International Workshop on System Security Assurance, SecAssure 2024, which accepted 8 full papers out of 14 submissions.

Computer Security. ESORICS 2024 International Workshops: SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II (Lecture Notes in Computer Science #15264)

by Joaquin Garcia-Alfaro Silvio Ranise Michał Woźniak Michał Choraś Habtamu Abie Luca Verderame Enrico Cambiaso Rita Ugarelli Isabel Praça Basel Katt Sandeep Pirbhulal Ankur Shukla Naoto Yanai Rafał Kozik Paweł Ksieniewicz Harsha Kalutarage Marek Pawlicki

This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The papers included in these proceedings stem from the following workshops: 19th International Workshop on Data Privacy Management, DPM 2024, which accepted 7 full papers and 6 short papers out of 24 submissions; 8th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024, which accepted 9 full papers out of 17 submissions; 10th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024, which accepted 9 full papers out of 17 submissions; International Workshop on Security and Artificial Intelligence, SECAI 2024, which accepted 10 full papers and 5 short papers out of 42 submissions; Workshop on Computational Methods for Emerging Problems in Disinformation Analysis, DisA 2024, which accepted 4 full papers out of 8 submissions; 5th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2024, which accepted 4 full papers out of 9 submissions; 3rd International Workshop on System Security Assurance, SecAssure 2024, which accepted 8 full papers out of 14 submissions.

Computer Security: 14th International Conference, Isc 2011, Xi'an, China, October 26-29, 2011, Proceedings (Lecture Notes In Computer Science / Security And Cryptology Ser. #3650)

by Javier Lopez Jianying Zhou Miguel Soriano

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Computer Security: 14th International Conference, Isc 2011, Xi'an, China, October 26-29, 2011, Proceedings (Lecture Notes In Computer Science / Security And Cryptology Ser. #3650)

by Javier Lopez Jianying Zhou Miguel Soriano

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Computer Security: A Hands-on Approach

by Wenliang Du

This book is a part of another book titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition" (687 pages). It is created to lower the cost on students, as many courses only need this part. It covers 17 of the 26 chapters. This book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Computer Security, including software security, hardware security, web security, and cryptography. Its goal is to help readers understand how various attacks work, what their fundamental causes are, how to defend against them, and how various defense mechanisms work. The book can be used as a textbook for undergraduate and graduate courses. The author strongly believes in "learning by doing", so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). Readers can learn better from such hands-on activities. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.

Computer Security: A Hands-on Approach

by Wenliang Du

Teaching computer security principles via hands-on activities. <p><p> Unique among computer security texts, this book, in its third edition, builds on the author’s long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can "touch," play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.

Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10683)

by John Mylopoulos Frédéric Cuppens Costas Lambrinoudakis Sokratis K. Katsikas Nora Cuppens Christos Kalloniatis Annie Antón Stefanos Gritzalis

In this e-book, authors address aspects of security and privacy issues of IT outsourcing. Paper 1 describes the fundamental aspects of IS/IT security outsourcing and introduces the specific organizational, technical and legal issues that should be considered for making an outsourcing arrangement. It also examines privacy issues and suggests how outsourcing arrangements can comply with these requirements. Paper 2 describes a process for outsourcing a security information management platform. Paper 3 discusses the problems of client-generated digital signatures and proposes a framework for outsourcing digital signatures to a Trusted Third Party.

Computer Security: ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11387)

by John Mylopoulos Frédéric Cuppens Costas Lambrinoudakis Sokratis K. Katsikas Nora Cuppens Christos Kalloniatis Annie Antón Stefanos Gritzalis

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.

Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers (Lecture Notes in Computer Science #11980)

by John Mylopoulos Steven Furnell Frédéric Cuppens Sokratis Katsikas Costas Lambrinoudakis Joaquin Garcia-Alfaro Nora Cuppens Christos Kalloniatis Annie Antón Stefanos Gritzalis Weizhi Meng Frank Pallas Jörg Pohle Angela Sasse

This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The CyberICPS Workshop received 13 submissions from which 5 full papers and 2 short papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 9 full papers out of 14 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. The SPOSE Workshop received 7 submissions from which 3 full papers and 1 demo paper were accepted for publication. They demonstrate the possible spectrum for fruitful research at the intersection of security, privacy, organizational science, and systems engineering.From the ADIoT Workshop 5 full papers and 2 short papers out of 16 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Computer Security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11981)

by Joaquin Garcia-Alfaro Silvio Ranise Ernesto Damiani Sotiris Ioannidis Apostolos P. Fournaris Konstantinos Lampropoulos Manos Athanatos George Hatzivasilis Habtamu Abie Luca Verderame Alberto Siena

This book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The IOSec Workshop received 17 submissions from which 7 full papers were selected for presentation. They cover topics related to security architectures and frameworks for enterprises, SMEs, public administration or critical infrastructures, threat models for IT & OT systems and communication networks, cyber-threat detection, classification and pro ling, incident management, security training and awareness, risk assessment safety and security, hardware security, cryptographic engineering, secure software development, malicious code analysis as well as security testing platforms. From the MSTEC Workshop 7 full papers out of 15 submissions are included. The selected papers deal focus on the verification and validation (V&V) process, which provides the operational community with confidence in knowing that cyber models represent the real world, and discuss how defense training may benefit from cyber models. The FINSEC Workshop received 8 submissions from which 3 full papers and 1 short paper were accepted for publication. The papers reflect the objective to rethink cyber-security in the light of latest technology developments (e.g., FinTech, cloud computing, blockchain, BigData, AI, Internet-of-Things (IoT), mobile-first services, mobile payments).

Refine Search

Showing 12,876 through 12,900 of 61,884 results