Journal: DTRAP

Volume 3, Issue 4

0 -- 0Adam Zibak, Clemens Sauerwein, Andrew C. Simpson. Threat Intelligence Quality Dimensions for Research and Practice
0 -- 0Louise Axon, Katherine Fletcher, Arianna Schuler Scott, Marcel Stolz, Robert Hannigan, Ali El Kaafarani, Michael Goldsmith, Sadie Creese. Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda
0 -- 0Karl Mozurkewich. Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments
0 -- 0Allen D. Householder, Jonathan M. Spring. Are We Skillful or Just Lucky? Interpreting the Possible Histories of Vulnerability Disclosures
0 -- 0Éireann Leverett, Matilda Rhode, Adam Wedgbury. Vulnerability Forecasting: Theory and Practice
0 -- 0Jinxin Liu 0001, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew J. Malton, Andrew Walenstein. Risk-aware Fine-grained Access Control in Cyber-physical Contexts
0 -- 0Pooria Madani, Natalija Vlajic, Ivo Maljevic. Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems
0 -- 0Johannes Düsing, Ben Hermann. Analyzing the Direct and Transitive Impact of Vulnerabilities onto Different Artifact Repositories
0 -- 0Paul Shomo, Sebastián Echeverría, Jesse Sowell. Introduction to the Special Issue on the Lifecycle of IoT (In)security
0 -- 0Ming Li, Peter J. Hawrylak, John Hale. Strategies for Practical Hybrid Attack Graph Generation and Analysis
0 -- 0Paul-David Jarvis, Amalia Damianou, Cosmin Ciobanu, Vasilis Katos. Vulnerability Exposure Driven Intelligence in Smart, Circular Cities
0 -- 0Fabio Massacci, Nick Nikiforakis, Ivan Pashchenko, Antonino Sabetta, Victoria Wang. Introduction to the Special Issue on Vulnerabilities