Abstract is missing.
- Bank of Models: Sensor Attack Detection and Isolation in Industrial Control SystemsChuadhry Mujeeb Ahmed, Jianying Zhou 0001. 3-23 [doi]
- Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control SystemsMadhumitha Balaji, Siddhant Shrivastava, Sridhar Adepu, Aditya Mathur. 24-43 [doi]
- Optimal Man-In-The-Middle Stealth AttackLuca Faramondi, Gabriele Oliva, Roberto Setola. 44-59 [doi]
- GNSS Positioning Security: Automatic Anomaly Detection on Reference StationsStéphanie Lebrun, Stéphane Kaloustian, Raphaël Rollier, Colin Barschel. 60-76 [doi]
- Model-Based Risk Analysis Approach for Network Vulnerability and Security of the Critical Railway InfrastructureHimanshu Neema, Leqiang Wang, Xenofon D. Koutsoukos, Chee Yee Tang, Keith Stouffer. 79-98 [doi]
- A Survey on Applications of Formal Methods in Analysis of SCADA SystemsMihael Marovic, Ante Derek, Stjepan Gros. 99-115 [doi]
- The Cost of Incidents in Essential Services - Data from Swedish NIS ReportingUlrik Franke, Johan Turell, Ivar Johansson. 116-129 [doi]
- Impact Analysis of PLC Performance When Applying Cyber Security Solutions Using Active Information GatheringYeop Chang, Taeyeon Kim, Woonyon Kim. 133-151 [doi]
- Multi-categorical Risk Assessment for Urban Critical InfrastructuresSandra König, Stefan Schauer, Stefan Rass. 152-167 [doi]
- Use-Case Informed Task Analysis for Secure and Usable Design Solutions in RailAmna Altaf, Shamal Faily, Huseyin Dogan, Alexios Mylonas, Eylem Thron. 168-185 [doi]
- Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot ResponsesMartin Strohmeier, James Pavur, Ivan Martinovic, Vincent Lenders. 186-203 [doi]
- Tableau: Future-Proof Zoning for OT NetworksPiet De Vaere, Claude Hähni, Franco Monti, Adrian Perrig. 207-227 [doi]
- Link Prediction for Cybersecurity Companies and Technologies: Towards a Survivability ScoreSantiago Anton Moreno, Anita Mezzetti, William Lacube. 228-233 [doi]