Abstract is missing.
- Resilience of Electrical Distribution Systems with Critical Load PrioritizationZejun Yang, Jose R. Marti. 1-12 [doi]
- Public Tolerance Levels of Transportation Resilience: A Focus on the Oresund Region Within the IMPROVER ProjectLaura Petersen, Laure Fallou, Elisabete Carreira, Andrei Utkin. 13-24 [doi]
- Towards a Common Vocabulary for Crisis Management ScenariosJingquan Xie, Betim Sojeva, Erich Rome, Daniel Lückerath. 25-36 [doi]
- Analysis and Classification of Adaptation Tools for Transport Sector Adaptation PlanningGeorgia Lykou, George Iakovakis, George Chronis, Dimitris Gritzalis. 37-47 [doi]
- Timing-Based Anomaly Detection in SCADA NetworksChih-Yuan Lin, Simin Nadjm-Tehrani, Mikael Asplund. 48-59 [doi]
- Operational Resilience Metrics for a Complex Electrical NetworkAlberto Tofani, Gregorio D'Agostino, Antonio Di Pietro, Giacomo Onori, Maurizio Pollino, Silvio Alessandroni, Vittorio Rosato. 60-71 [doi]
- The Influence of Load Characteristics on Early Warning Signs in Power SystemsSteffen O. P. Blume, Giovanni Sansavini. 72-83 [doi]
- DMA Optimal Layout for Protection of Water Distribution Networks from Malicious AttackSimeone Chianese, Armando Di Nardo, Michele Di Natale, Carlo Giudicianni, Dino Musmarra, Giovanni Francesco Santonastaso. 84-96 [doi]
- Role of Urban Interactions and Damage in Seismic Resilience of Historical CentersAnna Bozza, Domenico Asprone, Fulvio Parisi, Gaetano Manfredi. 97-106 [doi]
- Towards Blockchain-Based Collaborative Intrusion Detection SystemsNikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natália Réka Ivánkó, Max Mühlhäuser. 107-118 [doi]
- Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion DetectionJuan Enrique Rubio, Rodrigo Roman, Javier López. 119-130 [doi]
- De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation ProtocolJames G. Wright, Stephen D. Wolthusen. 131-143 [doi]
- Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction ModelsStefano Starita, Annunziata Esposito Amideo, Maria Paola Scaparra. 144-155 [doi]
- Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment OptionsMichael Rausch, Ken Keefe, Brett Feddersen, William H. Sanders. 156-167 [doi]
- A Gamified Approach to Participatory Modelling of Water System RisksAlex Coletti, Antonio De Nicola 0001, Giordano Vicoli, Maria Luisa Villani. 168-180 [doi]
- Managing Gas and Electric Power Network Dependencies to secure Energy Supply: Application to the UK SystemDominique Wassermann, Andrea Antenucci, Giovanni Sansavini. 181-184 [doi]
- What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive SystemsAljoscha Lautenbach, Magnus Almgren, Tomas Olovsson. 185-193 [doi]
- Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social ApproachMohamad Gharib, Paolo Lollini, Andrea Ceccarelli, Andrea Bondavalli. 194-206 [doi]
- Side-Channel Based Intrusion Detection for Industrial Control SystemsPol Van Aubel, Kostas Papagiannopoulos, Lukasz Chmielewski, Christian Doerr. 207-224 [doi]
- Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack TreesLaurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens. 225-228 [doi]
- Faulty or Malicious Anchor Detection Criteria for Distance-Based LocalizationFederica Inderst, Gabriele Oliva, Stefano Panzieri, Federica Pascucci, Roberto Setola. 229-240 [doi]
- One Step More: Automatic ICS Protocol Field AnalysisYeop Chang, Seungoh Choi, Jeong-Han Yun, Sin-Kyu Kim. 241-252 [doi]
- Motion Magnification for Urban BuildingsVincenzo Fioriti, Ivan Roselli, Angelo Tati, Roberto Romano, Gerardo De Canio. 253-260 [doi]
- Reputation Systems to Mitigate DoS Attack in Vehicular NetworkGianpiero Costantino, Fabio Martinelli, Ilaria Matteucci. 261-265 [doi]
- On the Security of Aircraft Communication NetworksPaul Berthier, Corentin Bresteau, José Fernandez. 266-269 [doi]