Author of the publication

Cybersecurity Information Sharing: a Framework for Sustainable Information Security Management in UK SME Supply Chains.

, , , , and . ECIS, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research., , , , and . ICS-CSR, BCS, (2013)A Forensic Taxonomy of SCADA Systems and Approach to Incident Response., , , , and . ICS-CSR, BCS, (2015)Adversarial Machine Learning Beyond the Image Domain., , , and . DAC, page 176. ACM, (2019)The continuing evolution of the C-130 environmental control system, and . 29th International Conference on Environmental Systems, Denver, Society of Automotive Engineers, (July 1999)Automated Asset Discovery in Industrial Control Systems - Exploring the Problem., and . ICS-CSR, BCS, (2015)A Plausible Solution to SCADA Security Honeypot Systems., , and . BWCCA, page 443-448. IEEE, (2013)Cross-domain situational awareness and collaborative working for cyber security., , and . CyberSA, page 1-8. IEEE, (2015)Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design., , , , , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 51-66. Springer, (2020)Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems., , , and . TrustCom, page 899-910. IEEE, (2020)Combined Danger Signal and Anomaly-Based Threat Detection in Cyber-Physical Systems., , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 27-39. (2015)