M.M.Keupp: Introduction and Overview.- Speed: S. Gillard, T. Maillart, M.M.Keupp: Reducing Time to Response in Cyber Defense: An Agent-based Model.- K Su, Ch Ahmed, J. Zhou: Unsupervised Attack Isolation in Cyber-physical Systems: A Competitive Test of Clustering Algorithms.- P. Fischer, S. Gillard: Next Generation ISACs: Simulating Crowdsourced Intelligence for Faster Incident Response.- Foresight: D. P. David, W. Blonay, S. Gillard, T. Maillart, A. Mermoud, L. Maréchal, M. Tsesmelis: Identification of Future Cyberdefense Technology by Text Mining.- A. Mezzetti, L. Maréchal, D. P. David, W. Blonay, S. Gillard, M. Tsesmelis, T. Maillart, A. Mermoud: A Novel Algorithm for Informed Investment in Cybersecurity Companies and Technologies.- M. Tsesmelis, L. Dolamic, M. M. Keupp, D. P. David, A. Mermoud: Identifying Emerging Technologies and Influential Companies Using Network Dynamics of Patent Clusters.- C. Aeschlimann, K. Cuche, A. Mermoud: Cybersecurity Ecosystems: A Network Study from Switzerland.- S. A. Moreno, D. P. David, A. Mermoud, T. Maillart, A. Mezzetti: Anticipating Cyberdefense Capability Requirements by Link Prediction Analysis.- Effectiveness: P. Fischer, F. Muhly, M. M. Keupp: Drawing with Limited Resources: Statistical Modeling of Computer Network Exploitation and Prevention.- D. Baschung, S. Gillard, J.-C. Metzger, M. M. Keupp: Individual Career Versus Corporate Security: A Simulation of CSO Investment Choices.- F. Muhly: Improving Human Responses to Cyberdefense by Serious Gaming.- S. Shrivastava, A. P. Mathur: Next Generation Cyber-physical Architecture and Training.- S. Gillard, C. Aeschlimann: Improving the Effectiveness of Cyberdefense Measures.- S. Pangrazzi, F. Muhly: International Law and Cyber Defense Best Practices: A Normative Proposal.