Abstract is missing.
- Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farmingSharad Agarwal, Awais Rashid, Joseph Gardiner. 1-9 [doi]
- Building an Avionics Laboratory for Cybersecurity TestingMartin Strohmeier, Giorgio Tresoldi, Leeloo Granger, Vincent Lenders. 10-18 [doi]
- VET5G: A Virtual End-to-End Testbed for 5G Network Security ExperimentationZhixin Wen, Harsh Sanjay Pacherkar, Guanhua Yan. 19-29 [doi]
- Courses as Code: The Aquinas Learning SystemW. Michael Petullo. 30-38 [doi]
- JUGAAD: Comprehensive Malware Behavior-as-a-ServiceSareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti Veezhinathan. 39-48 [doi]
- PowerDuck: A GOOSE Data Set of Cyberattacks in SubstationsSven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner 0003, Martin Henze, Martin Serror. 49-53 [doi]
- Dataflow-based Control Process Identification for ICS Dataset DevelopmentSeungoh Choi, Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, Byung-gil Min. 54-58 [doi]
- The DARPA SEARCHLIGHT Dataset of Application Network TrafficCalvin Ardi, Connor Aubry, Brian Kocoloski, Dave DeAngelis, Alefiya Hussain, Matthew Troglia, Stephen Schwab. 59-64 [doi]
- Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity ArtifactsDavid Balenson, Terry Benzel, Eric Eide, David Emmerich, David Johnson 0004, Jelena Mirkovic, Laura Tinnel. 65-70 [doi]
- Verification of Cyber Emulation Experiments Through Virtual Machine and Host MetricsJamie Thorpe, Laura P. Swiler, Seth Hanson, Gerardo Cruz, Thomas D. Tarman, Trevor Rollins, Bert J. Debusschere. 71-80 [doi]
- Measuring and Analyzing DoS Flooding ExperimentsAmir Farhat, Samuel DeLaughter, Karen R. Sollins. 81-90 [doi]
- Context Matters: Accurately Measuring the Efficacy of Denial-of-Service MitigationsSamuel DeLaughter, Karen R. Sollins. 91-99 [doi]
- Generating Representative Video Teleconferencing TrafficDavid DeAngelis, Alefiya Hussain, Brian Kocoloski, Calvin Ardi, Stephen Schwab. 100-104 [doi]
- Position Paper: Certificate Root Stores - An Area of Unity or Disparity?Jegan Purushothaman, Ethan Thompson, AbdelRahman Abdou. 105-110 [doi]
- The Distributed Digital Body Farm: Enabling the Analysis of Deleted File Decay PatternsOmoche Cheche Agada, James H. Jones Jr., Kevin D. Fairbanks. 111-119 [doi]
- Toward the Detection of Polyglot FilesLuke Koch, Sean Oesch, Amul Chaulagain, Mary Adkisson, Samantha Erwin, Brian Weber. 120-128 [doi]
- A Broad Comparative Evaluation of x86-64 Binary RewritersEric Schulte, Michael D. Brown, Vlad Folts. 129-144 [doi]
- Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology OrganizationsBen Lazarine, Zhong Zhang, Agrim Sachdeva, Sagar Samtani, Hongyi Zhu. 145-150 [doi]