Abstract is missing.
- On the Disappearing Boundary Between Digital, Physical, and Social Spaces: Who, What, Where and When?Bashar Nuseibeh. 1 [doi]
- Cyber-Physical System Discovery: Reverse Engineering Physical ProcessesAlexander Winnicki, Marina Krotofil, Dieter Gollmann. 3-14 [doi]
- Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse EngineeringNektarios Georgios Tsoutsos, Homer Gamil, Michail Maniatakos. 15-20 [doi]
- Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple PayGareth Haken, Konstantinos Markantonakis, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram. 21-32 [doi]
- Detecting Phishing Websites using Automation of Human BehaviorRouthu Srinivasa Rao, Alwyn R. Pais. 33-42 [doi]
- A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical SystemsYuexin Zhang, Yang Xiang, Xinyi Huang. 43-53 [doi]
- Cyber Security of the Autonomous ShipSokratis K. Katsikas. 55-56 [doi]
- SIPHON: Towards Scalable High-Interaction Physical HoneypotsJuan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici. 57-68 [doi]
- ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object CapabilityHajoon Ko, Jiong Jin, Sye Loong Keoh. 69-80 [doi]
- A Functional Co-Design towards Safe and Secure Vehicle PlatooningJiafa Liu, Di Ma, André Weimerskirch, Haojin Zhu. 81-90 [doi]
- Towards Improving Data Validity of Cyber-Physical Systems through Path RedundancyZhiyuan Zheng, A. L. Narasimha Reddy. 91-102 [doi]
- Spatio-Temporal Correlations in Cyber-Physical Systems: A Defense Against Data Availability AttacksBiplab Sikdar. 103-110 [doi]