Abstract is missing.
- A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel PerspectiveWissam Aoudi, Albin Hellqvist, Albert Overland, Magnus Almgren. 1-10 [doi]
- Use of an SDN Switch in Support of NIST ICS Security Recommendations and Least Privilege NetworkingVarsha Venugopal, Jim Alves-Foss, Sandeep Gogineni Ravindrababu. 11-20 [doi]
- An Distributed Cyberattack Diagnosis Scheme for Malicious Protection Operation based on IEC 61850Md Touhiduzzaman, Adam Hahn, Saeed Lotfifard. 21-29 [doi]
- Gas what?: I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wildMohammad-Reza Zamiri-Gourabi, Ali Razmjoo-Qalaei, Babak Amin Azad. 30-37 [doi]
- A Strategy for Security Testing Industrial FirewallsThuy D. Nguyen, Steve C. Austin, Cynthia E. Irvine. 38-47 [doi]
- If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation TrafficCeline Irvene, Tohid Shekari, David Formby, Raheem Beyah. 48-59 [doi]
- ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICSEyasu Getahun Chekole, Huaqun Guo. 60-69 [doi]