Abstract is missing.
- A Theory of Homeland SecurityRichard White. 3-21 [doi]
- An Evidence Quality Assessment Model for Cyber Security PolicymakingAtif Hussain, Siraj Shaikh, Alex Chung, Sneha Dawda, Madeline Carr. 23-38 [doi]
- Liability Exposure when 3D-Printed Parts Fall from the SkyLynne Graves, Mark Yampolskiy, Wayne E. King, Sofia Belikovetsky, Yuval Elovici. 39-64 [doi]
- Error Propagation after Reordering Attacks on Hierarchical State EstimationAmmara Gul, Stephen D. Wolthusen. 67-79 [doi]
- Securing Data in Power-Limited Sensor Networks Using Two-Channel CommunicationsClark Wolfe, Scott Graham, Robert Mills, Scott Nykl, Paul Simon. 81-90 [doi]
- Reversing a Lattice ECP3 FPGA for Bitstream ProtectionDaniel Celebucki, Scott Graham, Sanjeev Gunawardena. 91-111 [doi]
- Protecting Infrastructure Data via Enhanced Access Control, Blockchain and Differential PrivacyAsma Alnemari, Suchith Arodi, Valentina Rodriguez Sosa, Soni Pandey, Carol J. Romanowski, Rajendra K. Raj, Sumita Mishra. 113-125 [doi]
- A New SCAP Information and Data Model for Content AuthorsJoshua Lubell. 127-146 [doi]
- Modeling a Midstream Oil Terminal for Cyber Security Risk EvaluationRishabh Das, Thomas Morris. 149-175 [doi]
- A Cyber-Physical Testbed for Measuring the Impacts of Cyber Attacks on Urban Road NetworksMarielba Urdaneta, Antoine Lemay, Nicolas Saunier, José M. Fernandez. 177-196 [doi]
- Persistent Human Control in a Reservation-Based Autonomous Intersection ProtocolKarl Bentjen, Scott Graham, Scott Nykl. 197-212 [doi]
- A History of Cyber Incidents and Threats Involving Industrial Control SystemsKevin Hemsley, Ronald Fisher. 215-242 [doi]
- An Integrated Control and Intrusion Detection System for Smart Grid SecurityEniye Tebekaemi, Duminda Wijesekera, Paulo Cesar G. da Costa. 243-264 [doi]
- Generating Abnormal Industrial Control Network Traffic for Intrusion Detection System TestingJoo-Yeop Song, Woomyo Lee, Jeong-Han Yun, Hyunjae Park, Sin-Kyu Kim, Young-June Choi. 265-281 [doi]
- Variable Speed Simulation for Accelerated Industrial Control System Cyber TrainingLuke Bradford, Barry E. Mullins, Stephen Dunlap, Timothy H. Lacey. 283-306 [doi]