


default search action
20th ARES 2025: Ghent, Belgium - Workshops Part I
- Bart Coppens
, Bruno Volckaert
, Vincent Naessens
, Bjorn De Sutter
:
Availability, Reliability and Security - ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I. Lecture Notes in Computer Science 15994, Springer 2025, ISBN 978-3-032-00629-5
Proceedings of the First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025)
- Francesco Marchiori
, Denis Donadel
, Alessandro Brighente
, Mauro Conti
:
Profiling Electric Vehicles via Early Charging Voltage Patterns. 5-22 - Matteo Lupinacci
, Francesco Blefari
, Francesco Romeo
, Francesco Aurelio Pironti
, Angelo Furfaro
:
ARCeR: An Agentic RAG for the Automated Definition of Cyber Ranges. 23-40 - Alberto Giaretta, Hadi Banaee:
Edge Virtual Fence for Smart Airport Physical Security: A Case Study. 41-54 - Mohammed Alquliti
, Erisa Karafili
, BooJoong Kang
:
Evaluating Explanation Quality in X-IDS Using Feature Alignment Metrics. 55-72 - Zanis Ali Khan
, Aayush Garg
, Qiang Tang
:
A Multi-dataset Evaluation of Models for Automated Vulnerability Repair. 73-87 - Javier Martínez Llamas
, Matthias Van Hoof, Davy Preuveneers
, Wouter Joosen:
Adversarial Robustness of Machine Learning-Based Access Control. 88-105 - Wissam Salhab, Darine Ameyed, Hamid Mcheick, Fehmi Jaafar:
Towards Robust Artificial Intelligence: Self-supervised Learning Approach for Out-of-Distribution Detection. 106-121
Proceedings of the Eighth International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR 2025)
- Leonie Reichert, Nicolas Coppik
, Sören Finster
:
Performance Evaluation of Quantum-Resistant Algorithms on Industrial Embedded Systems. 127-148 - Alexios Karagiozidis, Martin Gergeleit:
TADFICS: A Threat-Aware Digital Forensics Data Model for ICS. 149-171 - Hoda Mehrpouyan
:
A Robust Hybrid Framework Combining Deductive Temporal Logic and Machine Learning for Fault and Cyber-Attack Detection in the Tennessee Eastman Process. 172-190 - Nowshaba Jeelani Wani, Dirk Pesch, Utz Roedig:
KIDS: Intrusion Detection for Industrial Control Systems. 191-208
Proceedings of the First Workshop on Sustainable Security and Awareness For Next Generation Infrastructures (SAFER 2025)
- Roosa Risto, Mohit Sethi
, Mika Katara:
Effects of the Cyber Resilience Act (CRA) on Industrial Equipment Manufacturing Companies. 213-229 - Thor Kristoffersen
:
Dynamic Access Policies for Energy Cost Management of Microservices. 230-247 - Silvia Lucia Sanna
, Diego Soi
, Davide Maiorca
, Giorgio Giacinto
:
Are Trees Really Green? A Detection Approach of IoT Malware Attacks. 248-265 - Francesco Settanni
, Giuseppe Lisena, Cataldo Basile
:
Towards A Capability Model of Kubernetes Runtime Security Enforcement Mechanisms. 266-284
Proceedings of the Fourth Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025)
- Paul Tavolato, Oliver Eigner, Philipp Kreimel-Haindl, Antonella Santone, Fabio Martinelli, Francesco Mercaldo:
A Method for Explainable Anomaly Detection in Substation Networks Through Deep Learning. 289-303 - Ndeye Gagnessiry Ndiaye, Karl Waedt, Nicolas Dejon, Chrystel Gaber, Achilleas Marinakis
, Christos A. Gizelis, Gürkan Gür, Marc Rennhard, Oumayma Zeddini, Jean-Philippe Wary, Dominico Orlando, Claire Loiseaux, Vangelis Photiou, Nikolaos Koulierakis, Vasiliki Danilatou:
Safety and Cybersecurity Under Emerging EU Legislation for Industry: A Use-Case Driven Perspective. 304-321 - Francesco Mercaldo, Paul Tavolato, Antonella Santone, Fabio Martinelli:
An Explainable Method for Malware Detection Through Convolutional Neural Networks. 322-339 - Nikolai Puch
, Stefan Dopfer, Leon Birkel:
Securing the Additive Manufacturing Process Chain. 340-358

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.