↓ Skip to main content

Computer Security. ESORICS 2023 International Workshops

Overview of attention for book
Cover of 'Computer Security. ESORICS 2023 International Workshops'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 An Opportunity-Based Approach to Information Security Risk
  3. Altmetric Badge
    Chapter 2 A Methodology for Cybersecurity Risk Assessment in Supply Chains
  4. Altmetric Badge
    Chapter 3 IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations
  5. Altmetric Badge
    Chapter 4 Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework
  6. Altmetric Badge
    Chapter 5 Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT
  7. Altmetric Badge
    Chapter 6 User Behavior Analysis for Malware Detection
  8. Altmetric Badge
    Chapter 7 Balancing XAI with Privacy and Security Considerations
  9. Altmetric Badge
    Chapter 8 Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection
  10. Altmetric Badge
    Chapter 9 Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges
  11. Altmetric Badge
    Chapter 10 C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving
  12. Altmetric Badge
    Chapter 11 The VOCODES Kill Chain for Voice Controllable Devices
  13. Altmetric Badge
    Chapter 12 DETONAR-Light : An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network
  14. Altmetric Badge
    Chapter 13 Firmware-Based DoS Attacks in Wireless Sensor Network
  15. Altmetric Badge
    Chapter 14 Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime
  16. Altmetric Badge
    Chapter 15 SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language
  17. Altmetric Badge
    Chapter 16 Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms
  18. Altmetric Badge
    Chapter 17 Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing
  19. Altmetric Badge
    Chapter 18 Trust Assumptions in Voting Systems
  20. Altmetric Badge
    Chapter 19 Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle
  21. Altmetric Badge
    Chapter 20 Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis
  22. Altmetric Badge
    Chapter 21 Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86
  23. Altmetric Badge
    Chapter 22 Execution at RISC: Stealth JOP Attacks on RISC-V Applications
  24. Altmetric Badge
    Chapter 23 Modeling Obfuscation Stealth Through Code Complexity
  25. Altmetric Badge
    Chapter 24 ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal Approach
  26. Altmetric Badge
    Chapter 25 FedREVAN: R eal-time D E tection of  V ulnerable A ndroid Source Code Through Fed erated N eural Network with XAI
  27. Altmetric Badge
    Chapter 26 Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScript
  28. Altmetric Badge
    Chapter 27 The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse
  29. Altmetric Badge
    Chapter 28 Internet Transparency Through Multi-party Computation
  30. Altmetric Badge
    Chapter 29 DNS Dependencies as an Expression of the Digital Divide: The Example of Australia
  31. Altmetric Badge
    Chapter 30 Towards Security Transparency of Autonomous Systems on the Internet
  32. Altmetric Badge
    Chapter 31 Privacy-Preserving Object Recognition with Explainability in Smart Systems
  33. Altmetric Badge
    Chapter 32 An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework
  34. Altmetric Badge
    Chapter 33 Pixels Who Violate Our Privacy! Deep Learning for Identifying Images’ Key Pixels
  35. Altmetric Badge
    Chapter 34 Verifiable Fairness: Privacy–preserving Computation of Fairness for Machine Learning Systems
  36. Altmetric Badge
    Chapter 35 NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios
  37. Altmetric Badge
    Chapter 36 On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers
  38. Altmetric Badge
    Chapter 37 CO-DECYBER: Co-operative Decision Making for Cybersecurity Using Deep Multi-agent Reinforcement Learning
  39. Altmetric Badge
    Chapter 38 Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models
  40. Altmetric Badge
    Chapter 39 Can Inputs’ Reconstruction Information Be Coded into Machine Learning Model’s Outputs?
  41. Altmetric Badge
    Chapter 41 Backdoor Attacks Leveraging Latent Representation in Competitive Learning
  42. Altmetric Badge
    Chapter 42 Simulating Deception for Web Applications Using Reinforcement Learning
  43. Altmetric Badge
    Chapter 43 The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments
  44. Altmetric Badge
    Chapter 44 Mitigating Gradient Inversion Attacks in Federated Learning with Frequency Transformation
  45. Altmetric Badge
    Chapter 45 Network Intrusion Detection by Variational Component-Based Feature Saliency Gaussian Mixture Clustering
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
3 X users
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Computer Security. ESORICS 2023 International Workshops
Published by
Springer Nature Switzerland, March 2024
DOI 10.1007/978-3-031-54129-2
ISBNs
978-3-03-154128-5, 978-3-03-154129-2
Editors

Katsikas, Sokratis, Abie, Habtamu, Ranise, Silvio, Verderame, Luca, Cambiaso, Enrico, Ugarelli, Rita, Praça, Isabel, Li, Wenjuan, Meng, Weizhi, Furnell, Steven, Katt, Basel, Pirbhulal, Sandeep, Shukla, Ankur, Ianni, Michele, Dalla Preda, Mila, Choo, Kim-Kwang Raymond, Pupo Correia, Miguel, Abhishta, Abhishta, Sileno, Giovanni, Alishahi, Mina, Kalutarage, Harsha, Yanai, Naoto

X Demographics

X Demographics

The data shown below were collected from the profiles of 3 X users who shared this research output. Click here to find out more about how the information was compiled.