The 17 regular papers and 9 short papers presented here were carefully reviewed and selected from 43 submissions. These papers focus on Cyber security design; secure software development methodologies; formal methods, semantics, and verification of secure systems; fault tolerance, reliability, and availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery, self-stabilizing, and self-organizing systems; communication, authentication, and identification security; cyber security for mobile systems and the Internet of Things; and much more.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.








