Abstract is missing.
- Predicting the severity and exploitability of vulnerability reports using convolutional neural netsAhmet Okutan, Mehdi Mirakhorli. 1-8 [doi]
- Building a hardware-in-the-loop (HiL) digital energy station infrastructure for cyber operation resiliency testingPer-Arne Jørgensen, André Waltoft-Olsen, Siv Hilde Houmb, Aleksander Lygren Toppe, Tore Geir Soltvedt, Hans Kristian Muggerud. 9-16 [doi]
- A survey of security vulnerabilities in Android automotive appsAbdul Moiz, Manar H. Alalfi. 17-24 [doi]
- A reimagined catalogue of software security patternsAlexander van den Berghe, Koen Yskout, Wouter Joosen. 25-32 [doi]
- Standardized cyber security risk assessment for unmanned offshore facilitiesBálint Z. Téglásy, Sokratis K. Katsikas, Mary Ann Lundteigen. 33-40 [doi]
- Relationship-based threat modelingStef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen. 41-48 [doi]
- Better security assessment communication: combining ISO 27002 controls with UML sequence diagramsFabien Sechi, Bjørn Axel Gran, Per-Arne Jørgensen, Oleh Kilyukh. 49-56 [doi]