1

Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis

COTS Drone Detection using Video Streaming Characteristics

vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation

Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems

A Statistical Analysis Framework for ICS Process Datasets

BIAS: Bluetooth Impersonation AttackS

Co-Simulating Physical Processes and Network Data for High-Fidelity Cyber-Security Experiments

PAtt: Physics-based Attestation of Control Systems

The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices