Abstract is missing.
- Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA SystemsRima Asmar Awad, Saeed Beztchi, Jared M. Smith, Bryan Lyles, Stacy Prowell. 1-8 [doi]
- Graph-Based Data-Collection Policies for the Internet of ThingsMaribel Fernández, Jenjira Jaimunk, Bhavani M. Thuraisingham. 9-16 [doi]
- The Nuts and Bolts of Deploying Process-Level IDS in Industrial Control SystemsMagnus Almgren, Wissam Aoudi, Robert Gustafsson, Robin Krahl, Andreas Lindhé. 17-24 [doi]
- A Virtual Environment for Industrial Control Systems: A Nonlinear Use-Case in Attack Detection, Identification, and ResponseAndrés Felipe Murillo-Piedrahita, Luis Francisco Cómbita, Andrea Calderón Gonzalez, Sandra Rueda, Alvaro A. Cárdenas, Nicanor Quijano. 25-32 [doi]
- Securing Your ICS Software with the AttackSurface Host Analyzer (AHA)Adam Hahn, Ali Tamimi, Dave Anderson. 33-39 [doi]