Abstract is missing.
- Evaluating Moving Target Defenses against Realistic Attack ScenariosAlex Brown, Tze-Wen Lee, Jin B. Hong. 1-8 [doi]
- Autoencoder via DCNN and LSTM Models for Intrusion Detection in Industrial Control Systems of Critical InfrastructuresKayode Yakub Saheed, Sanjay Misra, Sabarathinam Chockalingam. 9-16 [doi]
- Functional Cyber-Resilience - Extending the Cybersecurity Paradigm in Critical InfrastructuresJohannes de Haan. 17-22 [doi]
- Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who?Ita Ryan, Klaas-Jan Stol, Utz Roedig. 23-30 [doi]
- Cryptography Based Security for the ATM Surveillance ChainJohannes de Haan, Abdel Youssouf. 31-36 [doi]
- The State of Secure Coding Practice: Small Organisations and "Lone, Rogue Coders"Ita Ryan, Klaas-Jan Stol, Utz Roedig. 37-44 [doi]