Abstract is missing.
- Cyber Security Requirements in the Norwegian Energy SectorJanne Hagen, Øyvind Anders Arntzen Toftegaard. 3-21 [doi]
- Cyber Security Awareness Requirements for Operational Technology SystemsTim Ellis, David Balenson, Michael Locasto. 23-44 [doi]
- Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature ReviewRajesh Kumar 0012, Siddhant Singh, Rohan Kela. 45-69 [doi]
- Attacking the IEC 61131 Logic Engine in Programmable Logic ControllersSyed Ali Qasim, Adeen Ayub, Jordan Johnson, Irfan Ahmed 0001. 73-95 [doi]
- Anomaly Detection in Automation ControllersRobert Mellish, Scott Graham, Stephen Dunlap, Patrick Sweeney. 97-118 [doi]
- Detecting Anomalous Programmable Logic Controller Events Using Process MiningKen Yau, Kam-Pui Chow, Siu-Ming Yiu. 119-133 [doi]
- Simulating Measurement Attacks in a Scada System TestbedBrandt Reutimann, Indrakshi Ray. 135-153 [doi]
- A Communications Validity Detector for SCADA NetworksPrashant Anantharaman, Anmol Chachra, Shikhar Sinha, Michael C. Millian, Bogdan Copos, Sean W. Smith, Michael E. Locasto. 155-183 [doi]
- InfiniBand Network Monitoring: Challenges and PossibilitiesKyle Hintze, Scott Graham, Stephen Dunlap, Patrick Sweeney. 187-208 [doi]
- GPS Signal Authentication Using a Chameleon Hash KeychainYu-Han Chu, Sye Loong Keoh, Chee Kiat Seow, Qi Cao, Kai Wen, Soon Yim Tan. 209-226 [doi]
- Security Analysis of Software Updates for Industrial RobotsChun-Fai Chan, Kam-Pui Chow, Tim Tang. 229-245 [doi]
- A Security Framework for Railway System DeploymentsRaymond Chan. 247-253 [doi]