Abstract is missing.
- A Model for Characterizing CyberpowerAdrian Venables, Siraj Ahmed Shaikh, James Shuttleworth. 3-16 [doi]
- Cyber Attacks and Political Events: The Case of the Occupy Central CampaignKam-Pui Chow, Ken Yau, Frankie Li. 17-27 [doi]
- On the Sharing of Cyber Security InformationEric A. M. Luiijf, Marieke H. A. Klaver. 29-46 [doi]
- Modeling Message Sequences for Intrusion Detection in Industrial Control SystemsMarco Caselli, Emmanuele Zambon, Jonathan Petit, Frank Kargl. 49-71 [doi]
- Industrial Control System Fingerprinting and Anomaly DetectionYong Peng, Chong Xiang, Haihui Gao, Dongqing Chen, Wang Ren. 73-85 [doi]
- Traffic-Locality-Based Creation of Flow Whitelists for SCADA NetworksSeungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim. 87-102 [doi]
- A Symbolic Honeynet Framework for SCADA System Threat IntelligenceW. Owen Redwood, Joshua Lawrence, Mike Burmester. 103-118 [doi]
- Enhancing a Virtual SCADA Laboratory Using SimulinkZach Thornton, Thomas Morris. 119-133 [doi]
- How Industrial Control System Security Training is Falling ShortJonathan Butts, Michael Glover. 135-149 [doi]
- Runtime Integrity for Cyber-Physical InfrastructuresJonathan Jenkins, Mike Burmester. 153-167 [doi]
- Security Challenges of Additive Manufacturing with Metals and AlloysMark Yampolskiy, Lena Schutzle, Uday Vaidya, Alec Yasinsac. 169-183 [doi]
- Using Information Flow Methods to Secure Cyber-Physical SystemsGerry Howser. 185-205 [doi]
- Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure AssetsChristopher W. Badenhop, Jonathan Fuller, Joseph Hall, Benjamin W. P. Ramsey, Mason Rice. 209-227 [doi]
- Implementing Cyber Security Requirements and Mechanisms in MicrogridsApurva Mohan, Himanshu Khurana. 229-244 [doi]
- A Cyber Security Architecture for Microgrid DeploymentsApurva Mohan, Gregory Brainard, Himanshu Khurana, Scott Fischer. 245-259 [doi]
- Allocation and Scheduling of Firefighting Units in Large Petrochemical ComplexesKhaled Al-Utaibi, Abdullah Alsubaie, José R. MartÃ. 263-279 [doi]
- Situational Awareness Using Distributed Data Fusion with Evidence DiscountingAntonio Di Pietro, Stefano Panzieri, Andrea Gasparri. 281-296 [doi]
- Using Centrality Measures in Dependency Risk Graphs for Efficient Risk MitigationGeorge Stergiopoulos, Marianthi Theocharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis. 299-314 [doi]
- Assessing Cyber Risk Using the CISIApro SimulatorChiara Foglietta, Cosimo Palazzo, Riccardo Santini, Stefano Panzieri. 315-331 [doi]