ESSoS 2014 Feb. 26, 2014 to Feb. 28, 2014, Munich,Germany

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Tutorial 1: Risk analysis -- Main challenges and how they can be handled Bjornar Solhaug The tutorial consists of two main parts: The first part gives a general introduction to ...
Tutorial 2: Empirical Validation of Vulnerability Discovery Models Fabio Massacci A Vulnerability Discovery Model estimates the number of vulnerabilities that will be reported after a ...
Tutorial 3: Web Application Security Martin Johns The Web has won -- Web applications are ubiquitous nowadays. Consequently, the significance of Web ...
Privacy in Residential Demand Side Management Applications Markus Strüker N/A
KEDS: Decentralised network security for the smart home environment Justin Martin N/A
Privacy-preserving Vehicle-to-Grid Interactions Cristina Rottondi , Simone Verticale N/A
Reactive Security for Smart Grids using Models@run.time-Based Simulation and Reasoning Jacques Klein , Thomas Hartmann , Francois Fouquet , Gregory Traon N/A
CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot Mark Felegyhazi , Tamás Holczer , Dániel Buza , Ferenc Miru N/A
Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid Henrich Karwe N/A
Architectural Design for Secure Smart Grids Denis Bytschkow , Jean Quilbeuf , Georgeta Ruess N/A
A Threat Analysis Methodology for Smart Home Scenarios Kristian Beckers , Stephan Faßbender , Maritta Suppan N/A
Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements Kristian Beckers , Francisco Moyano , Carmen Fernández-gago , And Maritta Heisel N/A
Security and Privacy in Smart Grid Demand Response Systems Andrew Paverd N/A
Selective release of smart metering data in multi-domain smart grids Alessandro Armando , Roberto Carbone , Eyasu Getahun Chekole , Claudio Petrazzuolo , Andrea Ranise N/A
Considering Attacker Motivation in Attack Graphs Analysis using Smart Grids as an Example Kristian Beckers , Maritta Heisel , Leanid Krautsevich , Fabio Yautsiukhin N/A
A New Intrusion Detection Mechanism for Protecting Smart Grid from ICMPv6 Vulnerabilities Manali Chaki N/A
The psychology of security Ross Anderson A fascinating dialogue is developing between psychologists and security engineers. At the macro scale, societal ...
SCION: Scalability, Control, and Isolation On Next-Generation Networks Adrian Perrig We present an Internet architecture designed to provide route control, failure isolation, and explicit trust ...