Part I: Security Requirements Engineering
1. A Taxonomy of Vulnerabilities, Attacks, and Security Solutions in Industrial PLCs
2. Natural Language Processing with Machine Learning for Security Requirements Analysis - Practical Approaches
3. Security Requirements Formalisation with RQCODE
Part II: Prevention at Development Time
4. Vulnerability Detection and Response: Current Status and New Approaches
5. Metamorphic Testing for Verification and Fault Localization in Industrial Control Systems
6. Interactive Application Security Testing with Hybrid Fuzzing and Statistical Estimators
Part III: Protection at Operations
7. CTAM: a tool for Continuous Threat Analysis and Management
8. EARLY - a tool for real-time security attack detection
9. A Stream-Based Approach to Intrusion Detection
10. Towards Anomaly Detection using Explainable AI. .