Abstract is missing.
- Digital Transformation and emerging ICS/OT cyber attacks - Imminent Threats to Our SocietySanjay Chhillar, Dale Geach. 1 [doi]
- vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic AggregationNils Ole Tippenhauer, Binbin Chen, Daisuke Mashima, David M. Nicol. 3-14 [doi]
- Shared Reality: Detecting Stealthy Attacks Against Autonomous VehiclesRaul Quinonez, Sleiman Safaoui, Tyler H. Summers, Bhavani M. Thuraisingham, Alvaro A. Cárdenas. 15-26 [doi]
- Internet of Things (IoT) Security and Forensics: Challenges and OpportunitiesKim-Kwang Raymond Choo. 27-28 [doi]
- Balancing Security and Usability of Zero-interaction Pairing and Authentication for the Internet-of-ThingsKyuin Lee, Younghyun Kim 0001. 29-34 [doi]
- Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine LearningMuhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur. 35-40 [doi]
- PEDRO: Secure Pedestrian Mobility Verification in V2P Communication using Commercial Off-the-shelf Mobile DevicesYucheng Yang, Kyuin Lee, Younghyun Kim 0001, Kassem Fawaz. 41-46 [doi]
- CatchAll: A Robust Multivariate Intrusion Detection System for Cyber-Physical Systems using Low Rank MatrixAneet Kumar Dutta, Bhaskar Mukhoty, Sandeep K. Shukla. 47-56 [doi]
- TooLate: Cryptographic Data Access Control for Offline Devices through Efficient Key RotationLorenzo Bracciale, Pierpaolo Loreti, Emanuele Raso, Giuseppe Bianchi 0001. 57-62 [doi]
- Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control SystemsJoseph Gardiner, Adam Eiffert, Peter Garraghan, Nicholas J. P. Race, Shishir Nagaraja, Awais Rashid. 63-68 [doi]