A review of cyber security risk assessment methods for SCADA systems Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ... Computers & security 56, 1-27, 2016 | 735 | 2016 |
A reference model of information assurance & security Y Cherdantseva, J Hilton 2013 international conference on availability, reliability and security, 546-555, 2013 | 374 | 2013 |
Information security and information assurance: discussion about the meaning, scope, and goals Y Cherdantseva, J Hilton Standards and Standardization: Concepts, Methodologies, Tools, and …, 2015 | 112 | 2015 |
Challenges and performance metrics for security operations center analysts: a systematic review E Agyepong, Y Cherdantseva, P Reinecke, P Burnap Journal of Cyber Security Technology 4 (3), 125-152, 2020 | 66 | 2020 |
A forensic taxonomy of SCADA systems and approach to incident response P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby 3rd International Symposium for ICS & SCADA Cyber Security Research 2015 …, 2015 | 49 | 2015 |
SCADA system forensic analysis within IIoT P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ... Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 73-101, 2017 | 44 | 2017 |
Towards secureBPMN-aligning BPMN with the information assurance and security domain Y Cherdantseva, J Hilton, O Rana Business Process Model and Notation: 4th International Workshop, BPMN 2012 …, 2012 | 25 | 2012 |
Forensic readiness for SCADA/ICS incident response P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ... 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016 | 24 | 2016 |
A multifaceted evaluation of the reference model of information assurance & security Y Cherdantseva, J Hilton, O Rana, W Ivins Computers & Security 63, 45-66, 2016 | 23 | 2016 |
Towards gender equality in software engineering: the NSA approach H De Ribaupierre, K Jones, F Loizides, Y Cherdantseva Proceedings of the 1st International Workshop on Gender Equality in Software …, 2018 | 21 | 2018 |
A cyber forensic taxonomy for scada systems in critical infrastructure P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ... Critical Information Infrastructures Security: 10th International Conference …, 2016 | 20 | 2016 |
Towards a framework for measuring the performance of a security operations center analyst E Agyepong, Y Cherdantseva, P Reinecke, P Burnap 2020 international conference on cyber security and protection of digital …, 2020 | 19 | 2020 |
A systematic method for measuring the performance of a cyber security operations centre analyst E Agyepong, Y Cherdantseva, P Reinecke, P Burnap Computers & Security 124, 102959, 2023 | 17 | 2023 |
Understanding information assurance and security Y Cherdantseva, J Hilton J. Organ. End User Comput 16 (3), 1, 2015 | 16 | 2015 |
Secure* BPMN-a graphical extension for BPMN 2.0 based on a reference model of information assurance & security Y Cherdantseva Cardiff University, 2014 | 14 | 2014 |
A Configurable Dependency Model of a SCADA System for Goal-Oriented Risk Assessment Y Cherdantseva, P Burnap, S Nadjm-Tehrani, K Jones Applied Sciences 12 (4880), 1-29, 2022 | 13 | 2022 |
Determining and sharing risk data in distributed interdependent systems P Burnap, Y Cherdantseva, A Blyth, P Eden, K Jones, H Soulsby, ... Computer 50 (4), 72-79, 2017 | 13 | 2017 |
Security architecture in a collaborative de-perimeterised environment: Factors of success Y Cherdantseva, O Rana, J Hilton ISSE 2011 Securing Electronic Business Processes: Highlights of the …, 2011 | 11 | 2011 |
The Evolution of Information Security Goals from the 1960s to today Y Cherdantseva, J Hilton Unpublished. February, 2012 | 10 | 2012 |
Model-based incident response playbooks A Shaked, Y Cherdantseva, P Burnap Proceedings of the 17th International Conference on Availability …, 2022 | 7 | 2022 |