Abstract is missing.
- Towards Comprehensive Modeling of CPSs to Discover and Study InterdependenciesAida Akbarzadeh, Sokratis K. Katsikas. 5-25 [doi]
- Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case StudyMuhammad Ramadan Saifuddin, Lin Wei, Heng Chuan Tan, Binbin Chen 0001. 26-45 [doi]
- Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous VehiclesYuqing Zhu 0009, Sridhar Adepu, Kushagra Dixit, Ying Yang, Xin Lou. 46-66 [doi]
- Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security SolutionsAdriaan de Vos, Alessandro Brighente, Mauro Conti. 67-80 [doi]
- The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGPZisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis. 81-96 [doi]
- Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness ResourcesSunil Chaudhary, Vasileios Gkioulos, David Goodman. 97-115 [doi]
- A Framework for Developing Tabletop Cybersecurity ExercisesNabin Chowdhury, Vasileios Gkioulos. 116-133 [doi]
- A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical SystemsChristos Lyvas, Konstantinos N. Maliatsos, Andreas Menegatos, Thrasyvoulos Giannakopoulos, Costas Lambrinoudakis, Christos Kalloniatis, Athanasios G. Kanatas. 134-152 [doi]
- OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber SecurityMohammad Heydari, Haralambos Mouratidis, Vahid Heydari Fami Tafreshi. 157-176 [doi]
- Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the WildZisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis. 177-190 [doi]
- Influencing Factors for Users' Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User StudyFrank Ebbers, Murat Karaboga. 195-211 [doi]
- Towards a Security Impact Analysis Framework: A Risk-Based and MITRE Attack ApproachAbdelhadi Belfadel, Martin Boyer, Jérôme Letailleur, Yohann Petiot, Reda Yaich. 212-227 [doi]
- Data Protection Officers' Perspectives on Privacy Challenges in Digital EcosystemsStephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono. 228-247 [doi]
- Rebooting IT Security Awareness - How Organisations Can Encourage and Sustain Secure BehavioursM. Angela Sasse, Jonas Hielscher, Jennifer Friedauer, Annalina Buckmann. 248-265 [doi]
- Towards Reverse Engineering of Industrial Physical ProcessesMariano Ceccato, Youssef Driouich, Ruggero Lanotte, Marco Lucchese, Massimo Merro. 273-290 [doi]
- Solutions for Protecting the Space Ground Segments: From Risk Assessment to Emergency ResponseIlias Gkotsis, Leonidas Perlepes, Aggelos Aggelis, Katerina Valouma, Antonis Kostaridis, Eftichia Georgiou, Nikolaos Lalazisis, Vasiliki Mantzana. 291-307 [doi]
- Modelling and Simulation of Railway Networks for Resilience AnalysisKushal Srivastava, Corinna Köpke, Johannes Walter, Katja Faist, John Marschalk Berry, Claudio Porretti, Alexander Stolz. 308-320 [doi]
- HoneyChart: Automated Honeypot Management over KubernetesGeorge Kokolakis, Grigoris Ntousakis, Irodotos Karatsoris, Spiros Antonatos, Manos Athanatos, Sotiris Ioannidis. 321-328 [doi]
- ComSEC: Secure Communications for Baggage Handling SystemsFilipe Apolinário, João Guiomar, Éric Hervé, Sven Hrastnik, Nelson Escravana, Miguel L. Pardal, Miguel Correia 0001. 329-345 [doi]
- Methodology for Resilience Assessment for Rail Infrastructure Considering Cyber-Physical ThreatsCorinna Köpke, Johannes Walter, Eros Cazzato, Catalin Linguraru, Uli Siebold, Alexander Stolz. 346-361 [doi]
- Coverage-Guided Fuzzing of Embedded Systems Leveraging Hardware TracingMaximilian Beckmann, Jan Steffan. 362-378 [doi]
- Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security ResearchAsya Mitseva, Paul Thierse, Harald Hoffmann, Devran Er, Andriy Panchenko 0001. 379-397 [doi]
- Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference ArchitectureDaniel De Pascale, Mirella Sangiovanni, Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan van den Heuvel. 398-408 [doi]
- A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use CaseFrancesco Spegni, Antonio Sabatelli, Alessio Merlo, Lucia Pepa, Luca Spalazzi, Luca Verderame. 409-426 [doi]
- A Revisitation of Clausewitz's Thinking from the Cyber Situational Awareness PerspectivePedro Ramon Y. Cajal Ramo, Claudia Castillo Arias, Jorge Carlos Manzanares Martínez, Jorge Maestre Vidal. 431-448 [doi]
- Examining 5G Technology-Based Applications for Military CommunicationsAntonio Portilla-Figueras, Salvador Llopis Sánchez, Silvia Jiménez-Fernández, Sancho Salcedo-Sanz. 449-465 [doi]
- Design of a Validation Model of the Cognitive State in Military Operations in CyberspaceJuan León Murillo, Marco Antonio Sotelo Monge, Víctor A. Villagrá. 466-481 [doi]
- Design and Validation of a Threat Model Based on Cyber Kill Chain Applied to Human FactorsInés Hernández San Román, Marco Antonio Sotelo Monge, Víctor A. Villagrá. 482-499 [doi]
- The Cloud Continuum for Military Deployable Networks: Challenges and OpportunitiesElisa Rojas, Diego Lopez-Pajares, Joaquin Alvarez-Horcajo, Salvador Llopis Sánchez. 500-519 [doi]
- Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree ModelFloyd Everest, Michelle L. Blom, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic. 525-540 [doi]
- Non(c)esuch Ballot-Level Comparison Risk-Limiting AuditsPhilip B. Stark. 541-554 [doi]
- Why Is Online Voting Still Largely a Black Box?Michael Kirsten, Melanie Volkamer, Bernhard Beckert. 555-567 [doi]
- Connecting Incident Reporting Infrastructure to Election Day ProceedingsKamryn Parker, Hoda Mehrpouyan, Jaclyn J. Kettler, Chad Houck. 568-584 [doi]
- Council of Europe Guidelines on the Use of ICT in Electoral ProcessesArdita Driza-Maurer, Melanie Volkamer, Robert Krimmer. 585-599 [doi]
- SAEOn: An Ontological Metamodel for Quantitative Security Assurance EvaluationShao-Fang Wen, Basel Katt. 605-624 [doi]
- A Comparison-Based Methodology for the Security Assurance of Novel SystemsPeeter Laud, Jelizaveta Vakarjuk. 625-644 [doi]
- Automation of Vulnerability Information Extraction Using Transformer-Based Language ModelsFateme Hashemi Chaleshtori, Indrakshi Ray. 645-665 [doi]
- Product Incremental Security Risk Assessment Using DevSecOps PracticesSébastien Dupont, Artsiom Yautsiukhin, Guillaume Ginis, Giacomo Iadarola, Stefano Fagnano, Fabio Martinelli, Christophe Ponsard, Axel Legay, Philippe Massonet. 666-685 [doi]
- SLIME: State Learning in the Middle of Everything for Tool-Assisted Vulnerability DetectionEric Lesiuta, Victor Bandur, Mark Lawford. 686-704 [doi]