1

Hide and Seek: An Architecture for Improving Attack Visibility in Industrial Control Systems

Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots

Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android

Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures

Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies

On Practical Threat Scenario Testing in an Electric Power ICS Testbed

WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic

Design and Large-Scale Evaluation of WiFi Proximity Metrics

State-Aware Anomaly Detection for Industrial Control Systems

Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3