Abstract is missing.
- On-premises Analysis of Advanced Threat Prevention AppliancesAkira Fujita, Tao Ban, Takeshi Takahashi, Daisuke Inoue. 1-8 [doi]
- Combat Security Alert Fatigue with AI-Assisted TechniquesTao Ban, Ndichu Samuel, Takeshi Takahashi, Daisuke Inoue. 9-16 [doi]
- D2U: Data Driven User Emulation for the Enhancement of Cyber Testing, Training, and Data Set GenerationSean Oesch, Robert A. Bridges, Miki E. Verma, Brian Weber, Oumar Diallo. 17-26 [doi]
- Getting to the HART of the Matter: An Evaluation of Real-World Safety System OT/IT Interfaces, Attacks, and CountermeasuresLaura Tinnel, Mike Cochrane. 27-35 [doi]
- Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS TestbedHyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, Byung-gil Min. 36-40 [doi]
- Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS DatasetsSeungoh Choi, Jeong-Han Yun, Byung-gil Min. 41-48 [doi]
- Towards Labeling On-Demand IoT TrafficDaniel Campos, T. J. OConnor. 49-57 [doi]
- Through the Spyglass: Towards IoT Companion App Man-in-the-Middle AttacksT. J. OConnor, Dylan Jessee, Daniel Campos. 58-62 [doi]
- Comparing reproduced cyber experimentation studies across different emulation testbedsThomas D. Tarman, Trevor Rollins, Laura P. Swiler, Jerry Cruz, Eric D. Vugrin, Hao Huang, Abhijeet Sahu, Patrick Wlazlo, Ana E. Goulart, Kate Davis. 63-71 [doi]
- User Experiences on Network TestbedsJelena Mirkovic, Portia Pusey. 72-82 [doi]
- Case Studies in Experiment Design on a minimega Based Network Emulation TestbedBrian Kocoloski, Alefiya Hussain, Matthew Troglia, Calvin Ardi, Steven Cheng, Dave DeAngelis, Christopher Symonds, Michael Collins, Ryan Goodfellow, Stephen Schwab. 83-90 [doi]
- Building Reproducible Video Streaming Traffic GeneratorsCalvin Ardi, Alefiya Hussain, Stephen Schwab. 91-95 [doi]