Abstract is missing.
- Trust-but-Verify in Cyber-Physical SystemsKalyan S. Perumalla. 1-2 [doi]
- Capturing Autonomy in its Multiple Facets: A Digital Twin ApproachRichard Heininger, Chris Stary. 3-12 [doi]
- Trustworthy Data Analysis and Sensor Data Protection in Cyber-Physical SystemsDenis A. Ulybyshev, Ibrahim Yilmaz, Bradley Northern, Vadim Kholodilo, Michael Rogers. 13-22 [doi]
- A Flexible Security Analytics Service for the Industrial IoTPhilip Empl, Günther Pernul. 23-32 [doi]
- Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine LearningIbrahim Yilmaz, Kavish Kapoor, Ambareen Siraj, Mahmoud Abouyoussef. 33-38 [doi]
- The HABAC Model for Smart Home IoT and Comparison to EGRBACSafwa Ameer, Ravi S. Sandhu. 39-48 [doi]
- Role-Based Administration of Role-Based Smart Home IoTMehrnoosh Shakarami, Ravi S. Sandhu. 49-58 [doi]
- Ontology driven AI and Access Control Systems for Smart FisheriesSai Sree Laya Chukkapalli, Shaik Barakhat Aziz, Nouran Alotaibi, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam. 59-68 [doi]
- A Data-based Protocol for One-way Trust in Inter-vehicular CommunicationStephen Ly, Yuan Cheng. 69-74 [doi]
- Artificial Intelligence Assisted Malware AnalysisMahmoud Abdelsalam, Maanak Gupta, Sudip Mittal. 75-77 [doi]
- Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical SystemsMarkus Dahlmanns, Jan Pennekamp, Ina Berenice Fink, Bernd Schoolmann, Klaus Wehrle, Martin Henze. 78-87 [doi]
- A Matrix for Systematic Selection of Authentication Mechanisms in Challenging Healthcare related EnvironmentsMichael Grabatin, Michael Steinke, Daniela Pöhn, Wolfgang Hommel. 88-97 [doi]
- Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description LanguageEngla Rencelj Ling, Mathias Ekstedt. 98-103 [doi]
- Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator - Work in ProgressLoïc France, Maria Mushtaq, Florent Bruguier, David Novo, Pascal Benoit. 104-109 [doi]