Abstract is missing.
- Communication and Cybersecurity Testbed for Autonomous Passenger ShipAhmed Amro, Vasileios Gkioulos. 5-22 [doi]
- A Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical SystemsChristos Grigoriadis, Adamantios Marios Berzovitis, Ioannis Stellios, Panayiotis Kotzanikolaou. 23-39 [doi]
- GLASS: Towards Secure and Decentralized eGovernance Services Using IPFSChristos Chrysoulas, Amanda Thomson, Nikolaos Pitropakis, Pavlos Papadopoulos, Owen Lo, William J. Buchanan, George Domalis, Nikos I. Karacapilidis, Dimitris Tsakalidis, Dimitrios Tsolis. 40-57 [doi]
- Integrated Design Framework for Facilitating Systems-Theoretic Process AnalysisAmna Altaf, Shamal Faily, Huseyin Dogan, Eylem Thron, Alexios Mylonas. 58-73 [doi]
- Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysical SystemsGeorgios P. Spathoulas, Georgios Kavallieratos, Sokratis K. Katsikas, Alessio Baiocco. 74-90 [doi]
- Analysis of Cyber Security Features in Industry 4.0 Maturity ModelsAntonio João Gonçalves de Azambuja, Alexander Kern, Reiner Anderl. 91-106 [doi]
- Cybersafety Analysis of a Natural Language User Interface for a Consumer Robotic SystemAntonio Roque, Melvin Lin, Suresh Damodaran. 107-121 [doi]
- Integrating Privacy-By-Design with Business Process RedesignVasiliki Diamantopoulou, Maria Karyda 0001. 127-137 [doi]
- Disclosing Social and Location Attributes on Social Media: The Impact on Users' PrivacyKaterina Vgena, Angeliki Kitsiou, Christos Kalloniatis, Dimitris Kavroudakis. 138-157 [doi]
- BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication SystemIoannis Stylios, Andreas Skalkos, Spyros Kokolakis, Maria Karyda 0001. 158-170 [doi]
- Privacy and Informational Self-determination Through Informed Consent: The Way ForwardMohamad Gharib. 171-184 [doi]
- Building a Privacy Testbed: Use Cases and Design ConsiderationsJoseph Gardiner, Partha Das Chowdhury, Jacob Halsey, Mohammad Tahaei, Tariq Elahi, Awais Rashid. 185-193 [doi]
- Assessing Vulnerabilities and IoT-Enabled Attacks on Smart Lighting SystemsIoannis Stellios, Kostas Mokos, Panayiotis Kotzanikolaou. 199-217 [doi]
- TAESim: A Testbed for IoT Security Analysis of Trigger-Action EnvironmentXinbo Ban, Ming Ding 0001, Shigang Liu, Chao Chen 0015, Jun Zhang 0010, Yang Xiang 0001. 218-237 [doi]
- Adversarial Command Detection Using Parallel Speech Recognition SystemsPeng Cheng, M. S. Arun Sankar, Ibrahim Ethem Bagci, Utz Roedig. 238-255 [doi]
- Security Measuring System for IoT DevicesElena Doynikova, Evgenia Novikova, Ivan Murenin, Maxim Kolomeec, Diana Gaifulina, Olga Tushkanova, Dmitry Levshun, Alexey Meleshko, Igor V. Kotenko. 256-275 [doi]
- Battery Depletion Attacks on NB-IoT Devices Using InterferenceVlad Ionescu, Utz Roedig. 276-295 [doi]
- Security- and Privacy-Aware IoT Application Placement and User AssignmentZoltán Ádám Mann. 296-316 [doi]
- Room Identification with Personal Voice Assistants (Extended Abstract)Mohammadreza Azimi, Utz Roedig. 317-327 [doi]
- Why IT Security Needs TherapyUta Menges, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, Imogen Verret. 335-356 [doi]
- Transferring Update Behavior from Smartphones to Smart Consumer DevicesMatthias Fassl, Michaela Neumayr, Oliver Schedler, Katharina Krombholz. 357-383 [doi]
- Organisational Contexts of Energy CybersecurityTania Wallis, Greig Paul, James Irvine 0001. 384-402 [doi]
- SMILE - Smart eMaIl Link Domain ExtractorMattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, Melanie Volkamer. 403-412 [doi]
- A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things (Short Paper)Salatiel Ezennaya-Gomez, Claus Vielhauer, Jana Dittmann. 413-423 [doi]
- Data Protection Impact Assessments in Practice - Experiences from Case StudiesMichael Friedewald, Ina Schiering, Nicholas Martin, Dara Hallinan. 424-443 [doi]
- Resilience Quantification for Critical Infrastructure: Exemplified for Airport OperationsCorinna Köpke, Kushal Srivastava, Natalie Miller, Elena Branchini. 451-460 [doi]
- Severity Level Assessment from Semantically Fused Video Content Analysis for Physical Threat Detection in Ground Segments of Space SystemsGerasimos Antzoulatos, Georgios Orfanidis, Panagiotis Giannakeris, Giorgos Tzanetis, Grigorios Kampilis-Stathopoulos, Nikolaos Kopalidis, Ilias Gialampoukidis, Stefanos Vrochidis, Ioannis Kompatsiaris. 461-476 [doi]
- Diminisher: A Linux Kernel Based Countermeasure for TAA VulnerabilityAmeer Hamza, Maria Mushtaq, Khurram Bhatti, David Novo, Florent Bruguier, Pascal Benoit. 477-495 [doi]
- The Rise of ICS Malware: A Comparative AnalysisYassine Mekdad, Giuseppe Bernieri, Mauro Conti, Abdeslam El Fergougui. 496-511 [doi]
- Framework Proposal to Measure the Stress as Adversarial Factor on Cyber Decision MakingDavid Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Juan Estévez Tapiador. 517-536 [doi]
- Measuring the Impact of Tactical Denial of SustainabilityPedro Ramon Y. Cajal Ramo, Jorge Maestre Vidal, Marco Antonio Sotelo Monge. 537-556 [doi]
- A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey DataSavannah Norem, Ashley E. Rice, Samantha Erwin, Robert A. Bridges, Sean Oesch, Brian Weber. 557-575 [doi]