Stepping-Stone Intrusion Detection via Estimating Numbers of Upstream and Downstream Connections using Packet CrossoverEfficient Lattice based (H)IB-DREGuest Editorial: Special Issue on Interdisciplinary CybersecurityAnomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project HistoryImproved Concept and Implementation of a Fountain Code Covert ChannelHiding Data in a Switched NetworkDetection of Steganographic Threats Targeting Digital Images in Heterogeneous Ecosystems Through Machine LearningUse of smart devices by the elderly: Nursing home residents in SloveniaThe supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategiesHunting cyberattacks: experience from the real backbone network