Abstract is missing.
- Attack-driven Test Case Generation Approach using Model-checking Technique for Collaborating SystemsZelalem Mihret, Lingjun Liu. 1-8 [doi]
- 'Under-reported' Security Defects in Kubernetes ManifestsDibyendu Brinto Bose, Akond Rahman, Md. Shazibul Islam Shamim. 9-12 [doi]
- Security Risk Analysis of Multi-Stage Attacks based on Data CriticalityCharilaos Skandylas, Luyuan Zhou, Narges Khakpour, Simon Roe. 13-20 [doi]
- A Systematic Literature Review on Malicious Use of Reinforcement LearningTorstein Meyer, Nektaria Kaloudi, Jingyue Li. 21-28 [doi]
- Asset-driven Security Assurance Cases with Built-in Quality AssuranceMazen Mohamad, Örjan Askerdal, Rodi Jolak, Jan-Philipp Steghöfer, Riccardo Scandariato. 29-36 [doi]
- Understanding Developer Security ArchetypesIta Ryan, Utz Roedig, Klaas-Jan Stol. 37-40 [doi]
- Practitioner Perception of Vulnerability Discovery StrategiesFarzana Ahamed Bhuiyan, Justin Murphy, Patrick Morrison, Akond Rahman. 41-44 [doi]