Towards Security Transparency of Autonomous Systems on the Internet

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

23 Downloads (Pure)

Abstract

The use of the Internet is not just limited to daily activities such as communication, entertainment, and shopping, but many critical services including finance, healthcare, and the modern versions of infrastructures (e.g., power grids, transportation systems, water, oil, and gas pipelines) [19] increasingly use the Internet for their operations as well. This makes Internet paths a factor that must be considered a part of supply chain security.
Original languageEnglish
Title of host publicationComputer Security. ESORICS 2023 International Workshops
Subtitle of host publicationCPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II
EditorsSokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Place of PublicationCham
PublisherSpringer Nature
Pages510-513
Number of pages4
ISBN (Electronic)978-3-031-54129-2
ISBN (Print)978-3-031-54129-2
DOIs
Publication statusPublished - 12 Mar 2024
Event28th European Symposium on Research in Computer Security, ESORICS 2023 - The Hague, Netherlands
Duration: 25 Sept 202329 Sept 2023
Conference number: 28

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume14399
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference28th European Symposium on Research in Computer Security, ESORICS 2023
Abbreviated titleESORICS 2023
Country/TerritoryNetherlands
CityThe Hague
Period25/09/2329/09/23

Keywords

  • 2024 OA procedure

Fingerprint

Dive into the research topics of 'Towards Security Transparency of Autonomous Systems on the Internet'. Together they form a unique fingerprint.

Cite this