Abstract is missing.
- Towards End-to-End Data Protection in Low-Power NetworksVasily Mikhalev, Laurent Gomez, Frederik Armknecht, José Márquez. 3-18 [doi]
- Development of an Embedded Platform for Secure CPS ServicesVincent Raes, Jan Vossaert, Vincent Naessens. 19-34 [doi]
- Introducing Usage Control in MQTTAntonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino. 35-43 [doi]
- Towards Security Threats that MatterKatja Tuma, Riccardo Scandariato, Mathias Widman, Christian Sandberg. 47-62 [doi]
- A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval SystemBastien Sultan, Fabien Dagnat, Caroline Fontaine. 63-76 [doi]
- STRIDE to a Secure Smart Grid in a Hybrid CloudBojan Jelacic, Daniela Rosic, Imre Lendak, Marina Stanojevic, Sebastijan Stoja. 77-90 [doi]
- Stealthy Deception Attacks Against SCADA SystemsAmit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev. 93-109 [doi]
- On Ladder Logic Bombs in Industrial Control SystemsNaman Govil, Anand Agrawal, Nils Ole Tippenhauer. 110-126 [doi]
- Enforcing Memory Safety in Cyber-Physical SystemsEyasu Getahun Chekole, John Henry Castellanos, Martín Ochoa, David K. Y. Yau. 127-144 [doi]
- Supporting the Human in Cyber DefenceKirsi Helkala, Benjamin J. Knox, Øyvind Jøsok, Ricardo G. Lugo, Stefan Sütterlin, Geir Olav Dyrkolbotn, Nils Kalstad Svendsen. 147-162 [doi]
- CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack PatternsAmbika Shrestha Chitrakar, Slobodan Petrovic. 163-176 [doi]
- Multistage Downstream Attack Detection in a Cyber Physical SystemRizwan Qadeer, Carlos Murguia, Chuadhry Mujeeb Ahmed, Justin Ruths. 177-185 [doi]
- A UML Profile for Privacy-Aware Data Lifecycle ModelsMajed Alshammari, Andrew Simpson. 189-209 [doi]
- Evaluation of a Security and Privacy Requirements Methodology Using the Physics of NotationVasiliki Diamantopoulou, Michalis Pavlidis, Haralambos Mouratidis. 210-225 [doi]
- What Users Want: Adapting Qualitative Research Methods to Security Policy ElicitationVivien M. Rooney, Simon N. Foley. 229-249 [doi]
- An Anti-pattern for Misuse CasesMohammad Torabi Dashti, Sasa Radomirovic. 250-261 [doi]
- Decision-Making in Security Requirements Engineering with Constrained Goal ModelsNikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish. 262-280 [doi]