Correction to: Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild (Englisch)
Freier Zugriff
- Neue Suche nach: Tsiatsikas, Zisis
- Weitere Informationen zu Tsiatsikas, Zisis:
- https://orcid.org/http://orcid.org/0000-0002-9481-0906
- Neue Suche nach: Karopoulos, Georgios
- Weitere Informationen zu Karopoulos, Georgios:
- https://orcid.org/http://orcid.org/0000-0002-0142-7503
- Neue Suche nach: Kambourakis, Georgios
- Weitere Informationen zu Kambourakis, Georgios:
- https://orcid.org/http://orcid.org/0000-0001-6455-502X
- Neue Suche nach: Katsikas, Sokratis
- Weitere Informationen zu Katsikas, Sokratis:
- https://orcid.org/https://orcid.org/0000-0003-2966-9683
- Neue Suche nach: Cuppens, Frédéric
- Weitere Informationen zu Cuppens, Frédéric:
- https://orcid.org/https://orcid.org/0000-0003-1124-2200
- Neue Suche nach: Kalloniatis, Christos
- Weitere Informationen zu Kalloniatis, Christos:
- https://orcid.org/https://orcid.org/0000-0002-8844-2596
- Neue Suche nach: Mylopoulos, John
- Neue Suche nach: Pallas, Frank
- Weitere Informationen zu Pallas, Frank:
- https://orcid.org/https://orcid.org/0000-0002-5543-0265
- Neue Suche nach: Pohle, Jörg
- Weitere Informationen zu Pohle, Jörg:
- https://orcid.org/https://orcid.org/0000-0001-6201-5011
- Neue Suche nach: Sasse, M. Angela
- Weitere Informationen zu Sasse, M. Angela:
- https://orcid.org/https://orcid.org/0000-0003-1823-5505
- Neue Suche nach: Abie, Habtamu
- Weitere Informationen zu Abie, Habtamu:
- https://orcid.org/https://orcid.org/0000-0003-0866-5050
- Neue Suche nach: Ranise, Silvio
- Weitere Informationen zu Ranise, Silvio:
- https://orcid.org/https://orcid.org/0000-0001-7269-9285
- Neue Suche nach: Verderame, Luca
- Weitere Informationen zu Verderame, Luca:
- https://orcid.org/https://orcid.org/0000-0001-7155-7429
- Neue Suche nach: Cambiaso, Enrico
- Weitere Informationen zu Cambiaso, Enrico:
- https://orcid.org/https://orcid.org/0000-0002-6932-1975
- Neue Suche nach: Maestre Vidal, Jorge
- Weitere Informationen zu Maestre Vidal, Jorge:
- https://orcid.org/https://orcid.org/0000-0002-4131-5100
- Neue Suche nach: Sotelo Monge, Marco Antonio
- Weitere Informationen zu Sotelo Monge, Marco Antonio:
- https://orcid.org/https://orcid.org/0000-0001-6392-0216
- Neue Suche nach: Albanese, Massimiliano
- Weitere Informationen zu Albanese, Massimiliano:
- https://orcid.org/https://orcid.org/0000-0002-2675-5810
- Neue Suche nach: Katt, Basel
- Weitere Informationen zu Katt, Basel:
- https://orcid.org/https://orcid.org/0000-0002-0177-9496
- Neue Suche nach: Pirbhulal, Sandeep
- Weitere Informationen zu Pirbhulal, Sandeep:
- https://orcid.org/https://orcid.org/0000-0003-0843-8974
- Neue Suche nach: Shukla, Ankur
- Weitere Informationen zu Shukla, Ankur:
- https://orcid.org/https://orcid.org/0000-0002-6737-2031
- Neue Suche nach: Tsiatsikas, Zisis
- Weitere Informationen zu Tsiatsikas, Zisis:
- https://orcid.org/http://orcid.org/0000-0002-9481-0906
- Neue Suche nach: Karopoulos, Georgios
- Weitere Informationen zu Karopoulos, Georgios:
- https://orcid.org/http://orcid.org/0000-0002-0142-7503
- Neue Suche nach: Kambourakis, Georgios
- Weitere Informationen zu Kambourakis, Georgios:
- https://orcid.org/http://orcid.org/0000-0001-6455-502X
In:
Computer Security. ESORICS 2022 International Workshops
: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers
;
Kapitel: 40
;
C1
;
2023
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Correction to: Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Katsikas, Sokratis ( Herausgeber:in ) / Cuppens, Frédéric ( Herausgeber:in ) / Kalloniatis, Christos ( Herausgeber:in ) / Mylopoulos, John ( Herausgeber:in ) / Pallas, Frank ( Herausgeber:in ) / Pohle, Jörg ( Herausgeber:in ) / Sasse, M. Angela ( Herausgeber:in ) / Abie, Habtamu ( Herausgeber:in ) / Ranise, Silvio ( Herausgeber:in ) / Verderame, Luca ( Herausgeber:in )
-
Kongress:European Symposium on Research in Computer Security ; 2022 ; Copenhagen, Denmark
-
Erschienen in:Computer Security. ESORICS 2022 International Workshops : CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers ; Kapitel: 40 ; C1Lecture Notes in Computer Science ; 13785 ; C1
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:29.12.2023
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Towards Comprehensive Modeling of CPSs to Discover and Study InterdependenciesAkbarzadeh, Aida / Katsikas, Sokratis et al. | 2023
- 2
-
Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case StudySaifuddin, Muhammad Ramadan / Wei, Lin / Tan, Heng Chuan / Chen, Binbin et al. | 2023
- 3
-
Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous VehiclesZhu, Yuqing / Adepu, Sridhar / Dixit, Kushagra / Yang, Ying / Lou, Xin et al. | 2023
- 4
-
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutionsde Vos, Adriaan / Brighente, Alessandro / Conti, Mauro et al. | 2023
- 5
-
The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGPTsiatsikas, Zisis / Karopoulos, Georgios / Kambourakis, Georgios et al. | 2023
- 6
-
Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness ResourcesChaudhary, Sunil / Gkioulos, Vasileios / Goodman, David et al. | 2023
- 7
-
A Framework for Developing Tabletop Cybersecurity ExercisesChowdhury, Nabin / Gkioulos, Vasileios et al. | 2023
- 8
-
A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical SystemsLyvas, Christos / Maliatsos, Konstantinos / Menegatos, Andreas / Giannakopoulos, Thrasyvoulos / Lambrinoudakis, Costas / Kalloniatis, Christos / Kanatas, Athanasios et al. | 2023
- 9
-
OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber SecurityHeydari, Mohammad / Mouratidis, Haralambos / Tafreshi, Vahid Heydari Fami et al. | 2023
- 10
-
Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the WildTsiatsikas, Zisis / Karopoulos, Georgios / Kambourakis, Georgios et al. | 2023
- 11
-
Influencing Factors for Users’ Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User StudyEbbers, Frank / Karaboga, Murat et al. | 2023
- 12
-
Towards a Security Impact Analysis Framework: A Risk-Based and MITRE Attack ApproachBelfadel, Abdelhadi / Boyer, Martin / Letailleur, Jérôme / Petiot, Yohann / Yaich, Reda et al. | 2023
- 13
-
Data Protection Officers’ Perspectives on Privacy Challenges in Digital EcosystemsWiefling, Stephan / Tolsdorf, Jan / Lo Iacono, Luigi et al. | 2023
- 14
-
Rebooting IT Security Awareness – How Organisations Can Encourage and Sustain Secure BehavioursSasse, M. Angela / Hielscher, Jonas / Friedauer, Jennifer / Buckmann, Annalina et al. | 2023
- 15
-
Towards Reverse Engineering of Industrial Physical ProcessesCeccato, Mariano / Driouich, Youssef / Lanotte, Ruggero / Lucchese, Marco / Merro, Massimo et al. | 2023
- 16
-
Solutions for Protecting the Space Ground Segments: From Risk Assessment to Emergency ResponseGkotsis, Ilias / Perlepes, Leonidas / Aggelis, Aggelos / Valouma, Katerina / Kostaridis, Antonis / Georgiou, Eftichia / Lalazisis, Nikolaos / Mantzana, Vasiliki et al. | 2023
- 17
-
Modelling and Simulation of Railway Networks for Resilience AnalysisSrivastava, Kushal / Köpke, Corinna / Walter, Johannes / Faist, Katja / Berry, John Marschalk / Porretti, Claudio / Stolz, Alexander et al. | 2023
- 18
-
HoneyChart: Automated Honeypot Management over KubernetesKokolakis, George / Ntousakis, Grigoris / Karatsoris, Irodotos / Antonatos, Spiros / Athanatos, Manos / Ioannidis, Sotiris et al. | 2023
- 19
-
ComSEC: Secure Communications for Baggage Handling SystemsApolinário, Filipe / Guiomar, João / Hervé, Éric / Hrastnik, Sven / Escravana, Nelson / Pardal, Miguel L. / Correia, Miguel et al. | 2023
- 20
-
Methodology for Resilience Assessment for Rail Infrastructure Considering Cyber-Physical ThreatsKöpke, Corinna / Walter, Johannes / Cazzato, Eros / Linguraru, Catalin / Siebold, Uli / Stolz, Alexander et al. | 2023
- 21
-
Coverage-Guided Fuzzing of Embedded Systems Leveraging Hardware TracingBeckmann, Maximilian / Steffan, Jan et al. | 2023
- 22
-
Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security ResearchMitseva, Asya / Thierse, Paul / Hoffmann, Harald / Er, Devran / Panchenko, Andriy et al. | 2023
- 23
-
Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference ArchitectureDe Pascale, Daniel / Sangiovanni, Mirella / Cascavilla, Giuseppe / Tamburri, Damian A. / Van Den Heuvel, Willem-Jan et al. | 2023
- 24
-
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use CaseSpegni, Francesco / Sabatelli, Antonio / Merlo, Alessio / Pepa, Lucia / Spalazzi, Luca / Verderame, Luca et al. | 2023
- 25
-
A Revisitation of Clausewitz’s Thinking from the Cyber Situational Awareness PerspectiveRamón y Cajal Ramo, Pedro / Arias, Claudia Castillo / Manzanares Martínez, Jorge Carlos / Vidal, Jorge Maestre et al. | 2023
- 26
-
Examining 5G Technology-Based Applications for Military CommunicationsPortilla-Figueras, Antonio / Llopis-Sánchez, Salvador / Jiménez-Fernández, Silvia / Salcedo-Sanz, Sancho et al. | 2023
- 27
-
Design of a Validation Model of the Cognitive State in Military Operations in CyberspaceLeón Murillo, Juan / Sotelo Monge, Marco Antonio / Villagrá, Víctor et al. | 2023
- 28
-
Design and Validation of a Threat Model Based on Cyber Kill Chain Applied to Human FactorsHernández San Román, Inés / Sotelo Monge, Marco Antonio / Villagra, Víctor A. et al. | 2023
- 29
-
The Cloud Continuum for Military Deployable Networks: Challenges and OpportunitiesRojas, Elisa / Lopez-Pajares, Diego / Alvarez-Horcajo, Joaquin / Llopis Sánchez, Salvador et al. | 2023
- 30
-
Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree ModelEverest, Floyd / Blom, Michelle / Stark, Philip B. / Stuckey, Peter J. / Teague, Vanessa / Vukcevic, Damjan et al. | 2023
- 31
-
Non(c)esuch Ballot-Level Comparison Risk-Limiting AuditsStark, Philip B. et al. | 2023
- 32
-
Why Is Online Voting Still Largely a Black Box?Kirsten, Michael / Volkamer, Melanie / Beckert, Bernhard et al. | 2023
- 33
-
Connecting Incident Reporting Infrastructure to Election Day ProceedingsParker, Kamryn / Mehrpouyan, Hoda / Kettler, Jaclyn / Houck, Chad et al. | 2023
- 34
-
Council of Europe Guidelines on the Use of ICT in Electoral ProcessesDriza Maurer, Ardita / Volkamer, Melanie / Krimmer, Robert et al. | 2023
- 35
-
SAEOn: An Ontological Metamodel for Quantitative Security Assurance EvaluationWen, Shao-Fang / Katt, Basel et al. | 2023
- 36
-
A Comparison-Based Methodology for the Security Assurance of Novel SystemsLaud, Peeter / Vakarjuk, Jelizaveta et al. | 2023
- 37
-
Automation of Vulnerability Information Extraction Using Transformer-Based Language ModelsHashemi Chaleshtori, Fateme / Ray, Indrakshi et al. | 2023
- 38
-
Product Incremental Security Risk Assessment Using DevSecOps PracticesDupont, Sébastien / Yautsiukhin, Artsiom / Ginis, Guillaume / Iadarola, Giacomo / Fagnano, Stefano / Martinelli, Fabio / Ponsard, Christophe / Legay, Axel / Massonet, Philippe et al. | 2023
- 39
-
SLIME: State Learning in the Middle of Everything for Tool-Assisted Vulnerability DetectionLesiuta, Eric / Bandur, Victor / Lawford, Mark et al. | 2023
- 40
-
Correction to: Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the WildTsiatsikas, Zisis / Karopoulos, Georgios / Kambourakis, Georgios et al. | 2023
- 41
-
Correction to: The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGPTsiatsikas, Zisis / Karopoulos, Georgios / Kambourakis, Georgios et al. | 2024