TY - BOOK AU - Ait Wakrime,Abderrahim AU - Navarro-Arribas,Guillermo AU - Cuppens,Frédéric AU - Cuppens,Nora AU - Benaini,Redouane ED - CRiSIS (Conference) TI - Risks and security of internet and systems: 18th International Conference, CRiSIS 2023, Rabat, Morocco, December 6-8, 2023, Revised selected papers T2 - Lecture notes in computer science, SN - 9783031612312 AV - QA76.9.A25 U1 - 005.8 23/eng/20240621 PY - 2024/// CY - Cham PB - Springer KW - Internet KW - Security measures KW - Congresses KW - Sécurité KW - Mesures KW - Congrès N1 - Intro -- Preface -- Organization -- Contents -- Keynote Talks -- A Review of the Progressive Odyssey of AI-Driven Intrusion Detection Within Embedded Systems -- 1 Introduction -- 2 Background -- 3 Review of Recent IDSs for ES -- 3.1 Host-Based IDS -- 3.2 Network-Based IDS -- 4 Current State of IDS in ES -- 5 Key Challenges and Trends in IDS for ES -- 6 Research Gaps and Opportunities -- 7 Conclusion -- References -- Securing Autonomous Vehicles: Fundamentals, Challenges, and Perspectives -- 1 Introduction -- 2 Fundamentals -- 3 Challenges -- 3.1 Modeling and Communication Challenges; 3.2 Security and Safety Challenges -- 4 Perspectives -- 5 Conclusion -- References -- Towards a B-Method Framework for Smart Contract Verification: The Case of ACTUS Financial Contracts -- 1 Introduction -- 2 Smart Contracts Scalability and the Rationale Behind the FeverTokens Open-Source Package-Oriented Framework -- 3 Overview of the Actus Standard and Financial Contracts -- 4 A Preliminary B-Method Framework for Financial Smart Contracts Under the Actus Standard -- 5 Conclusion and Perspectives -- References -- Security and Transportation Systems; FERROMOBILE and Security for Low Moment of Traffic Level Crossing -- 1 Introduction -- 2 Objectives of the ``Ferromobile'' Project -- 3 A Solution to Ensure Safe Crossing for ``Ferromobiles'' -- 3.1 Overview of the Global Architecture -- 3.2 Wireless Communication Abilities and Contributions -- 3.3 Cryptography -- 4 Conclusion and Perspectives -- References -- Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System -- 1 Introduction -- 2 Related Work -- 2.1 Cyber-Attacks on Adaptive Cruise Control; 2.2 Cyber-Resilience of Adaptive Cruise Control -- 3 Extending Adaptive Cruise Control with ML-Based Intrusion Detection System -- 3.1 Overview of the Adaptive Cruise Control -- 3.2 Architecture of the Extended Adaptive Cruise Control -- 4 Evaluation of the ACC-IDS Using CARLA Simulation -- 4.1 Simulation Setup -- 4.2 Result and Analysis of the Simulation Experiments -- 4.3 Impacts and Limitations of the Study -- 5 Conclusion -- References -- A New Efficient PUF-Based Mutual Authentication Scheme for Drones -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 The Proposed Scheme; 4.1 System Model -- 4.2 Description of the Proposed Scheme -- 5 Security Analysis -- 5.1 Privacy Model -- 5.2 Formal Security Analysis -- 5.3 Informal Security Analysis -- 6 Practical Results and Comparison -- 7 Conclusion -- References -- Formalizing for Proving the System Safety of the Software Component for a Small Sized Guided Transport System -- 1 Introduction -- 2 Autonomous Train Control -- 3 Railway Signalling Systems -- 3.1 Danger Related to Train Movements -- 3.2 The Protective Safety Distance in an ATP System -- 4 Hybrid System Modeling with Event-B N2 - This book constitutes the revised selected papers of the 18th International Conference on Risks and Security of Internet and Systems, CRiSIS 2023, which took place in Rabat, Morocco, during December 6-8, 2023. The 13 full papers and 2 short papers included in this volume were carefully reviewed and selected from 25 submissions. The papers detail security issues in internet-related applications, networks and systems. UR - https://link.springer.com/10.1007/978-3-031-61231-2 ER -