Abstract is missing.
- Improving SIEM for Critical SCADA Water Infrastructures Using Machine LearningHanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Xavier J. A. Bellekens. 3-19 [doi]
- Cyber-Attacks Against the Autonomous ShipGeorgios Kavallieratos, Sokratis K. Katsikas, Vasileios Gkioulos. 20-36 [doi]
- EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems SecuritySridhar Adepu, Nandha Kumar Kandasamy, Aditya Mathur. 37-52 [doi]
- A Hardware Based Solution for Freshness of Secure Onboard Communication in VehiclesSigrid Gürgens, Daniel Zelle. 53-68 [doi]
- Enhancing Usage Control for Performance: An Architecture for Systems of SystemsVasileios Gkioulos, Athanasios Rizos, Christina Michailidou, Paolo Mori, Andrea Saracino. 69-84 [doi]
- Comparative Study of Machine Learning Methods for In-Vehicle Intrusion DetectionIvo Berger, Roland Rieke, Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko. 85-101 [doi]
- SDN-Enabled Virtual Data DiodeMiguel Borges de Freitas, Luís Rosa, Tiago Cruz, Paulo Simões 0001. 102-118 [doi]
- Realistic Data Generation for Anomaly Detection in Industrial Settings Using SimulationsPeter Schneider, Alexander Giehl. 119-134 [doi]
- Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud ComputingLamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson. 137-152 [doi]
- Understanding Challenges to Adoption of the Protection Poker Software Security GameInger Anne Tøndel, Martin Gilje Jaatun, Daniela Cruzes, Tosin Daniel Oyetoyan. 153-172 [doi]
- An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity RequirementsPer Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre. 173-191 [doi]
- Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTIFabio Martinelli, Oleksii Osliak, Andrea Saracino. 192-212 [doi]
- Run-Time Monitoring of Data-Handling ViolationsJassim Happa, Nick Moffat, Michael Goldsmith, Sadie Creese. 213-232 [doi]