Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10683)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
- CyberICPS: International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems
- SECPRE: International Workshop on Security and Privacy Requirements Engineering
Conference proceedings info: CyberICPS 2017, SECPRE 2017.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017.
The CyberICPS Workshop received 32 submissions from which 10 full and 2 short papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 14 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.
Similar content being viewed by others
Keywords
- Cyber-physical systems security
- industrial control networks security
- SCADA security
- cyberattacks
- threats
- vulnerabilities
- risks
- Requirements Engineering
- Security Requirements Engineering
- Privacy Requirements Engineering
- Software Engineering
- Security and Privacy by Design
- Requirements Verification and Modelling
- data security
- access control
- HCI
- security systems
- authentication
- internet
- embedded systems
Table of contents (18 papers)
-
Protecting Industrial Control and Cyber-Physical Systems
-
Threats, Vulnerabilities and Risks
-
Cyber Attacks in Industrial Control and Cyber-Physical Systems
-
Detecting Attacks in Industrial Control and Cyber-Physical Systems
-
Security and Privacy Requirements Assurance and Evaluation
Other volumes
-
Computer Security
Editors and Affiliations
Bibliographic Information
Book Title: Computer Security
Book Subtitle: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers
Editors: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, … Stefanos Gritzalis
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-72817-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2018
Softcover ISBN: 978-3-319-72816-2Published: 22 December 2017
eBook ISBN: 978-3-319-72817-9Published: 03 January 2018
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 281
Number of Illustrations: 76 b/w illustrations
Topics: Systems and Data Security, Cryptology, Software Engineering, Computer Systems Organization and Communication Networks, Computers and Society, Control Structures and Microprogramming