| 0 | -- | 0 | Adam Zibak, Clemens Sauerwein, Andrew C. Simpson. Threat Intelligence Quality Dimensions for Research and Practice |
| 0 | -- | 0 | Louise Axon, Katherine Fletcher, Arianna Schuler Scott, Marcel Stolz, Robert Hannigan, Ali El Kaafarani, Michael Goldsmith, Sadie Creese. Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda |
| 0 | -- | 0 | Karl Mozurkewich. Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments |
| 0 | -- | 0 | Allen D. Householder, Jonathan M. Spring. Are We Skillful or Just Lucky? Interpreting the Possible Histories of Vulnerability Disclosures |
| 0 | -- | 0 | Éireann Leverett, Matilda Rhode, Adam Wedgbury. Vulnerability Forecasting: Theory and Practice |
| 0 | -- | 0 | Jinxin Liu 0001, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew J. Malton, Andrew Walenstein. Risk-aware Fine-grained Access Control in Cyber-physical Contexts |
| 0 | -- | 0 | Pooria Madani, Natalija Vlajic, Ivo Maljevic. Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems |
| 0 | -- | 0 | Johannes Düsing, Ben Hermann. Analyzing the Direct and Transitive Impact of Vulnerabilities onto Different Artifact Repositories |
| 0 | -- | 0 | Paul Shomo, Sebastián Echeverría, Jesse Sowell. Introduction to the Special Issue on the Lifecycle of IoT (In)security |
| 0 | -- | 0 | Ming Li, Peter J. Hawrylak, John Hale. Strategies for Practical Hybrid Attack Graph Generation and Analysis |
| 0 | -- | 0 | Paul-David Jarvis, Amalia Damianou, Cosmin Ciobanu, Vasilis Katos. Vulnerability Exposure Driven Intelligence in Smart, Circular Cities |
| 0 | -- | 0 | Fabio Massacci, Nick Nikiforakis, Ivan Pashchenko, Antonino Sabetta, Victoria Wang. Introduction to the Special Issue on Vulnerabilities |