Computer Security. ESORICS 2023 International Workshops
CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I
Chapter and Conference Paper
Cyberattacks have become more complex and analysts need help managing all alerts promptly. Many organizations implement Security, Orchestration, Automation, and Response (SOAR) tools to automate Incident Respo...
Living Reference Work Entry In depth
Chapter and Conference Paper
Attack graphs represent the possible actions of adversaries to attack a system. Cybersecurity experts use them to make decisions concerning remediation and recovery plans. There are different attack graph-buil...
Chapter and Conference Paper
The increasing complexity of cyberattacks has prompted researchers to keep pace with this trend by proposing automated cyberattack classification methods. Current research directions favor supervised learning ...
Book and Conference Proceedings
CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I
Chapter and Conference Paper
As the sophistication and occurrence of cyberattacks continues to rise, it is increasingly crucial for organizations to invest in threat intelligence. In this research, we propose a way to automate some part o...
Book and Conference Proceedings
18th International Conference, CRiSIS 2023, Rabat, Morocco, December 6–8, 2023, Revised Selected Papers
Article
Article
Chapter and Conference Paper
As mobile networks grow, managing the security of communication between all its internal components becomes more challenging because of the increasing number of services, network functions, and stakeholders in...
Book and Conference Proceedings
CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers
Book and Conference Proceedings
17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers
Article
As machine learning models are increasingly integrated into critical cybersecurity tools, their security issues become a priority. Particularly after the rise of adversarial examples, original data to which a ...
Chapter and Conference Paper
Increasingly, the computer networks supporting the operations of organizations face a higher quantity and sophistication of cyber-incidents. Due to the evolving complexity of these attacks, detection alone is ...
Book and Conference Proceedings
16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12–13, 2021, Revised Selected Papers
Chapter and Conference Paper
Network Function Virtualization (NFV) is introduced as a new methodology that offers several advantages such as the optimization of the resources and the improvement of network efficiency and performance. Howe...
Chapter and Conference Paper
The a posteriori access control is a particular type of access control in which security auditors tend to verify policy compliance by analyzing logs. However, in this type of access control, the investigations...
Chapter and Conference Paper
During the last decade, machine learning algorithms have massively integrated the defense arsenal made available to security professionals, especially for intrusion detection. However, and despite the progress...
Chapter and Conference Paper
The a posteriori access control is being more and more deployed especially in environments where more flexibility is needed when requesting access to information resources. To check if the security rules are b...
Book and Conference Proceedings
14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings