author: christos kalloniatis

Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers

... Modbus “read” query by a “write” query (which is the usual way to implement commands)—simply because a “write” message is longer, due to the additional written-values payload. However our tool is not totally stateless: As we shell see ...

Security Enhanced Applications for Information Systems

... collection. In particular, eleven face-to-face semi-structured interviews ... System. Four semi-structured interviews were also conducted with managers and IT ... interview questions were of an exploratory nature. More specifically, open ...

Security and Privacy From a Legal, Ethical, and Technical Perspective

... login attempt in Telnet. A typical data packet includes several fields such as: (i) the source Internet protocol (IP) address, (ii) the destination IP address, (iii) the source port number for transmission control protocol (TCP) or user ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.