Abstract is missing.
- Privacy-Preserving CCTV Analytics for Cyber-Physical Threat IntelligenceJürgen Neises, Adrien Besse, Jean-Baptiste Rouquier. 3-15 [doi]
- TLSAssistant Goes FINSEC A Security Platform Integration Extending Threat Intelligence LanguageSalvatore Manfredi, Silvio Ranise, Giada Sciarretta, Alessandro Tomasi. 16-30 [doi]
- Cyber Threat Monitoring Systems - Comparing Attack Detection Performance of Ensemble AlgorithmsEva Maia, Bruno Reis, Isabel Praça, Adrien Bécue, David Lancelin, Samantha Dauguet Demailly, Orlando Sousa. 31-47 [doi]
- FINSTIX: A Cyber-Physical Data Model for Financial Critical InfrastructuresGiorgia Gazzarata, Ernesto Troiano, Luca Verderame, Maurizio Aiello, Ivan Vaccari, Enrico Cambiaso, Alessio Merlo. 48-63 [doi]
- Inferring Anomaly Situation from Multiple Data Sources in Cyber Physical SystemsSara Baldoni, Giuseppe Celozzi, Alessandro Neri 0001, Marco Carli, Federica Battisti. 67-76 [doi]
- Fusing RGB and Thermal Imagery with Channel State Information for Abnormal Activity Detection Using Multimodal Bidirectional LSTMNikolaos Bakalos, Athanasios Voulodimos, Nikolaos Doulamis, Anastasios D. Doulamis, Kassiani Papasotiriou, Matthaios Bimpas. 77-86 [doi]
- A Cloud-Based Anomaly Detection for IoT Big DataOmri Soceanu, Allon Adir, Ehud Aharoni, Lev Greenberg, Habtamu Abie. 87-104 [doi]
- An Advanced Framework for Critical Infrastructure Protection Using Computer Vision TechnologiesKrishna Chandramouli, Ebroul Izquierdo. 107-122 [doi]
- A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning Based CPS Security ResearchChuadhry Mujeeb Ahmed, Nandha Kumar Kandasamy. 123-135 [doi]
- Cross-Domain Security Asset Management for HealthcareFederico Stirano, Francesco Lubrano, Giacomo Vitali, Fabrizio Bertone, Giuseppe Varavallo, Paolo Petrucci. 139-154 [doi]
- Towards a Global CIs' Cyber-Physical Security Management and Joint Coordination ApproachVasiliki Mantzana, Eftichia Georgiou, Anna Gazi, Ilias Gkotsis, Ioannis D. Chasiotis, Georgios Eftychidis. 155-170 [doi]
- Toward a Context-Aware Methodology for Information Security Governance Assessment ValidationMarco Angelini, Silvia Bonomi, Claudio Ciccotelli, Alessandro Palma. 171-187 [doi]
- Impact Propagation in Airport SystemsCorinna Köpke, Kushal Srivastava, Louis König, Natalie Miller, Mirjam Fehling-Kaschek, Kelly Burke, Matteo Mangini, Isabel Praça, Alda Canito, Olga Carvalho, Filipe Apolinario, Nelson Escravana, Nils Carstengerdes, Tim H. Stelkens-Kobsch. 191-206 [doi]
- A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System NetworksChih-Yuan Lin, Simin Nadjm-Tehrani. 207-223 [doi]