Abstract is missing.
- Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural NetworksJonguk Kim, Jeong-Han Yun, HyoungChun Kim. 3-18 [doi]
- Reflective Attenuation of Cyber-Physical AttacksMariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquín García-Alfaro. 19-34 [doi]
- Distributed UCON in CoAP and MQTT ProtocolsAthanasios Rizos, Daniel Bastos, Andrea Saracino, Fabio Martinelli. 35-52 [doi]
- Towards the Creation of a Threat Intelligence Framework for Maritime InfrastructuresNikolaos Pitropakis, Marios Logothetis, Gennady Andrienko, Jason Stefanatos, Eirini Karapistoli, Costas Lambrinoudakis. 53-68 [doi]
- Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger TransportationAhmed Amro, Vasileios Gkioulos, Sokratis K. Katsikas. 69-85 [doi]
- Simulation-Based Evaluation of DDoS Against Smart Grid SCADAsDamjan Gogic, Bojan Jelacic, Imre Lendák. 86-97 [doi]
- Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRISAmna Altaf, Shamal Faily, Huseyin Dogan, Alexios Mylonas, Eylem Thron. 98-107 [doi]
- How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting ApplicationJan Willemson. 111-121 [doi]
- A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational CharacteristicsEleni-Laskarina Makri, Zafeiroula Georgiopoulou, Costas Lambrinoudakis. 122-139 [doi]
- A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare SystemsMyrsini Athinaiou, Haralambos Mouratidis, Theo Fotis, Michalis Pavlidis. 140-158 [doi]
- Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy ConcernsThanos Papaioannou, Aggeliki Tsohou, Maria Karyda 0001. 159-180 [doi]
- GDPR Compliance: Proposed Technical and Organizational Measures for Cloud ProvidersZafeiroula Georgiopoulou, Eleni-Laskarina Makri, Costas Lambrinoudakis. 181-194 [doi]
- On the Applicability of Security and Privacy Threat Modeling for Blockchain ApplicationsDimitri Van Landuyt, Laurens Sion, Emiel Vandeloo, Wouter Joosen. 195-203 [doi]
- Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance PlatformAggeliki Tsohou, Manos Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo. 204-223 [doi]
- Uncertainty-Aware Authentication Model for IoTMohammad Heydari, Alexios Mylonas, Vasilis Katos, Emili Balaguer-Ballester, Amna Altaf, Vahid Heydari Fami Tafreshi. 224-237 [doi]
- From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR ComplianceVasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda 0001. 238-257 [doi]
- On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative StudyYang Liu 0039, Andrew Simpson. 261-278 [doi]
- Analysis of Automation Potentials in Privacy Impact Assessment ProcessesJan Zibuschka. 279-286 [doi]
- An Insight into Decisive Factors in Cloud Provider Selection with a Focus on SecuritySebastian Pape, Jelena Stankovic. 287-306 [doi]
- Discrete Event Simulation of Jail Operations in Pursuit of Organizational Culture ChangeHugh D. Lester, Martin J. Miller. 307-322 [doi]
- A Basic Theory of Lightweight Hierarchical Key Predistribution SchemeDeepak Kumar Dalai. 325-340 [doi]
- Adversarial Examples for Hardware-Trojan Detection at Gate-Level NetlistsKohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa. 341-359 [doi]
- Selective Forwarding Attack on IoT Home Security KitsAli Hariri, Nicolas Giannelos, Budi Arief. 360-373 [doi]
- Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of ThingsPhilokypros P. Ioulianou, Vassilios G. Vassilakis. 374-390 [doi]
- Study of DNS Rebinding Attacks on Smart Home DevicesDennis Tatang, Tim Suurland, Thorsten Holz. 391-401 [doi]
- Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven ApproachEvgenia Novikova, Mikhail Bestuzhev, Igor V. Kotenko. 402-418 [doi]
- Secure Location Verification: Why You Want Your Verifiers to Be MobileMatthias Schäfer 0002, Carolina Nogueira, Jens B. Schmitt, Vincent Lenders. 419-437 [doi]