Abstract is missing.
- On The Limits of Detecting Process Anomalies in Critical InfrastructureAditya Mathur. 1 [doi]
- SARA: Security Automotive Risk Analysis MethodJean Philippe Monteuuis, Aymen Boudguiga, Jun Zhang 0019, Houda Labiod, Alain Servel, Pascal Urien. 3-14 [doi]
- On Practical Threat Scenario Testing in an Electric Power ICS TestbedAhnaf Siddiqi, Nils Ole Tippenhauer, Daisuke Mashima, Binbin Chen. 15-21 [doi]
- Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around)Mauro Conti. 23-24 [doi]
- Control Theory for Practical Cyber-Physical Security: Extended AbstractHenrik Sandberg. 25-26 [doi]
- Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed EnvironmentsFabio Martinelli, Christina Michailidou, Paolo Mori, Andrea Saracino. 27-37 [doi]
- An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data SpaceGerd Stefan Brost, Manuel Huber 0001, Michael Weiß, Mykolai Protsenko, Julian Schütte, Sascha Wessel. 39-50 [doi]
- Understanding IEC-60870-5-104 Traffic Patterns in SCADA NetworksChih-Yuan Lin, Simin Nadjm-Tehrani. 51-60 [doi]
- Towards Security-Aware Virtual Environments for Digital TwinsMatthias Eckhart, Andreas Ekelhart. 61-72 [doi]