Abstract is missing.
- The Use of Differential Privacy for Energy DataAnna Scaglione. 1 [doi]
- Robust Anomaly based Attack Detection in Smart Grids under Data Poisoning AttacksShameek Bhattacharjee, Mohammad Jaminur Islam, Sahar Abedzadeh. 3-14 [doi]
- Private and Secure Smart Meter BillingMohammed Ababneh, Kartick Kolachala, Roopa Vishwanathan. 15-25 [doi]
- Detecting Secure Memory Deallocation Violations with CBMCVinayak S. Prabhu, Mohit Singh, Indrajit Ray, Indrakshi Ray, Sudipto Ghosh. 27-38 [doi]
- Fighting IoT Cyberattacks: Device Discovery, Attack Observation and Security NotificationKatsunari Yoshioka. 39-40 [doi]
- Robust, Effective and Resource Efficient Deep Neural Network for Intrusion Detection in IoT NetworksIdris Zakariyya, Harsha K. Kalutarage, M. Omar Al-Kadri. 41-51 [doi]
- 3D-Mold'ed In-Security: Mapping Out Security of Indirect Additive ManufacturingGrant Parker, Eric MacDonald, Theo Zinner, Mark Yampolskiy. 53-61 [doi]
- Context-Aware Drone DetectionGabriele Oligeri, Savio Sciancalepore. 63-71 [doi]
- A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion DetectionDominik Kus, Eric Wagner 0003, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze. 73-84 [doi]
- An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M DevicesAntonio Ken Iannillo, Sean Rivera, Darius Suciu, Radu Sion, Radu State. 85-94 [doi]