Abstract is missing.
- National Cyber Resilience and Roles for Public and Private Sector StakeholdersNeal Ziring. 3-46 [doi]
- Are European Security Policies Ready for Advanced Metering Systems with Cloud Back-Ends?Øyvind Anders Arntzen Toftegaard, Janne Hagen, Bernhard M. Hämmerli. 47-69 [doi]
- Importance of Cyber Security Analysis in the Operational Technology System LifecycleLaura Tinnel, Ulf Lindqvist. 73-101 [doi]
- Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit ApproachJames Cervini, Daniel Muller, Alexander Beall, Joseph Maurio, Aviel Rubin, Lanier A. Watkins. 103-117 [doi]
- Attack-Defense Modeling of Material Extrusion Additive Manufacturing SystemsAlyxandra Van Stockum, Elizabeth Kurkowski, Tiffany Potok, Curtis Taylor, Joel Dawson, Mason Rice, Sujeet Shenoi. 121-153 [doi]
- Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and MitigationsElizabeth Kurkowski, Alyxandra Van Stockum, Joel Dawson, Curtis Taylor, Tricia Schulz, Sujeet Shenoi. 155-174 [doi]
- Detecting Part Anomalies Induced by Cyber Attacks on a Powder BED Fusion Additive Manufacturing SystemElizabeth Kurkowski, Mason Rice, Sujeet Shenoi. 175-203 [doi]
- Low-Magnitude Infill Structure Manipulation Attacks on Fused Filament Fabrication 3D PrintersMuhammad Haris Rais, Muhammad Ahsan, Vaibhav Sharma, Radhika Barua, Rob Prins, Irfan Ahmed 0001. 205-232 [doi]
- Leveraging Confidential Computing to Enable Secure Information SharingSamuel Chadwick, Scott R. Graham, James Dean, Matthew Dallmeyer. 235-252 [doi]
- Evaluating the Use of Boot Image Encryption on the TALOS II ArchitectureCalvin Muramoto, Scott R. Graham, Stephen Dunlap. 253-273 [doi]
- Securing Infiniband Traffic with Bluefield-2 Data Processing UnitsNoah Diamond, Scott R. Graham, Gilbert Clark. 277-300 [doi]