Abstract is missing.
- Practical Cyber Threat Intelligence in the UK Energy SectorAlan Paice, Sean McKeown. 3-23 [doi]
- A Free and Community-Driven Critical Infrastructure Ransomware DatasetAunshul Rege, Rachel Bleiman. 25-37 [doi]
- Criteria for Realistic and Expedient Scenarios for Tabletop Exercises on Cyber Attacks Against Industrial Control Systems in the Petroleum IndustryAndrea Skytterholm, Guro Hotvedt. 39-54 [doi]
- Exploring the Need for a CERT for the Norwegian Construction SectorAndrea Neverdal Skytterholm, Martin Gilje Jaatun. 57-73 [doi]
- Holistic Approach of Integrated Navigation Equipment for Cybersecurity at SeaClet Boudehenn, Jean-Christophe Cexus, Ramla Abdelkader, Maxence Lannuzel, Olivier Jacq, David Brosset, Abdel Boudraa. 75-86 [doi]
- Building Maritime Cybersecurity Capacity Against Ransomware AttacksGeorgios Potamos, Savvas Theodoulou, Eliana Stavrou, Stavros Stavrou. 87-101 [doi]
- A Decade of Development of Mental Models in Cybersecurity and Lessons for the FutureRobert Murimi, Sandra Blanke, Renita Murimi. 105-132 [doi]
- Exploring the MITRE ATT&CKĀ® Matrix in SE EducationRachel Bleiman, Jamie Williams, Aunshul Rege, Katorah Williams. 133-149 [doi]
- Municipal Cybersecurity - A Neglected Research Area? A Survey of Current ResearchArnstein Vestad, Bian Yang. 151-165 [doi]
- Near-Ultrasonic Covert Channels Using Software-Defined Radio TechniquesRobert Sherry, Ethan Bayne, David McLuskie. 169-189 [doi]
- A Preventative Moving Target Defense Solution for Web Servers Using IptablesCimone Wright-Hamor, Steffanie Bisinger, Jeffrey Neel, Benjamin A. Blakely, Nathaniel Evans. 191-205 [doi]
- Hardening Containers with Static and Dynamic AnalysisSachet Rajat Kumar Patil, Neil John, Poorvi Sameep Kunja, Anushka Dwivedi, S. Suganthi, Prasad B. Honnnavali. 207-227 [doi]
- Efficient Cyber-Evidence Sharing Using Zero-Knowledge ProofsArman Zand, Eckhard Pfluegel. 229-242 [doi]
- Uncertainty and Risk: Investigating Line Graph Aesthetic for Enhanced Cybersecurity AwarenessJoel Pinney, Fiona Carroll. 245-253 [doi]
- An Explainable AI Solution: Exploring Extended Reality as a Way to Make Artificial Intelligence More Transparent and TrustworthyRichard Wheeler, Fiona Carroll. 255-276 [doi]
- A Study on the Development of Crisis Management Compliance by Personal Information Infringement Factors in Artificial Intelligence ServiceYoung-Jin Shin. 277-299 [doi]
- Threats to Journalists from the Consumer Internet of ThingsAnjuli R. K. Shere, Jason R. C. Nurse, Andrew Martin 0002. 303-326 [doi]
- The Transnational Dimension of Cybersecurity: The NIS Directive and Its Jurisdictional ChallengesPaula Contreras. 327-341 [doi]
- Refining the Mandatory Cybersecurity Incident Reporting Under the NIS Directive 2.0: Event Types and Reporting ProcessesSandra Schmitz-Berndt. 343-351 [doi]
- Assessing Cyber-Security Readiness of Nigeria to Industry 4.0Elochukwu Ukwandu, Ephraim N. C. Okafor, Charles Ikerionwu, Comfort Olebara, Celestine Ugwu. 355-374 [doi]
- Case Studies in the Socio-technical Analysis of Cybersecurity Incidents: Comparing Attacks on the UK NHS and Irish Healthcare SystemsJoseph Kaberuka, Christopher W. Johnson 0001. 375-387 [doi]
- A Study on the Impact of Gender, Employment Status, and Academic Discipline on Cyber-Hygiene: A Case Study of University of Nigeria, NsukkaCelestine Ugwu, Modesta Ezema, Uchenna Ome, Lizzy Ofusori, Comfort Olebera, Elochukwu Ukwandu. 389-407 [doi]
- Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic EncryptionAniket Agrawal, Kamalakanta Sethi, Padmalochan Bera. 411-436 [doi]
- Neutralizing Adversarial Machine Learning in Industrial Control Systems Using BlockchainNaghmeh Moradpoor, Masoud Barati, Andres Robles-Durazno, Ezra Abah, James McWhinnie. 437-451 [doi]
- A User-Centric Evaluation of Smart Contract Analysis Tools in Decentralised Finance (DeFi)Gonzalo Faura, Cezary Siewiersky, Irina Tal. 453-476 [doi]