Abstract is missing.
- Optimize Your Efforts: How to Tailor PhD Research to Real-World Needs - Industrial Perspective on Academic CPS/IoT ResearchMarina Krotofil. 1 [doi]
- Towards a High-Fidelity Network Emulation of IEC 104 SCADA SystemsLuis Salazar, Neil Ortiz Silva, Xi Qin, Alvaro A. Cárdenas. 3-12 [doi]
- Hazard Driven Threat Modelling for Cyber Physical SystemsLuca Maria Castiglione, Emil C. Lupu. 13-24 [doi]
- A Statistical Analysis Framework for ICS Process DatasetsFederico Turrin, Alessandro Erba, Nils Ole Tippenhauer, Mauro Conti. 25-30 [doi]
- Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and RetrainingAnand Agrawal, Marios Sazos, Ahmed Al-Durra, Michail Maniatakos. 31-36 [doi]
- A (in)Secure-by-Design IoT Protocol: the ESP Touch Protocol and a Case Study Analysis from the Real MarketGiovanni Salzillo, Massimiliano Rak. 37-48 [doi]
- Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical InfrastructuresRichard J. Thomas, Joseph Gardiner, Tom Chothia, Emmanouil Samanis, Joshua Perrett, Awais Rashid. 49-60 [doi]
- Privacy in the Mobile World: An Analysis of Bluetooth Scan TracesHeng Zhang, Amiya Kumar Maji, Saurabh Bagchi. 61-65 [doi]
- DEMO: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIsJoseph Gardiner, Awais Rashid. 67 [doi]
- DEMO: Trustworthy Cyberphysical Energy Systems: Time-Delay Attacks in a Real-Time Co-Simulation EnvironmentJuan Ospina, Ioannis Zografopoulos, Xiaorui Liu, Charalambos Konstantinou. 69 [doi]
- MAC-Layer Spoofing Detection and Prevention in IoT Systems: Randomized Moving Target ApproachPooria Madani, Natalija Vlajic, shadi sadeghpour. 71-80 [doi]
- Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped ExecutionsSunandan Adhikary, Ipsita Koley, Saurav Kumar Ghosh, Sumana Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay. 81-86 [doi]
- Voice Command Fingerprinting with Locality Sensitive HashesBatyr Charyyev, Mehmet Hadi Gunes. 87-92 [doi]