关注
Dr Cherdantseva Yulia
标题
引用次数
引用次数
年份
A review of cyber security risk assessment methods for SCADA systems
Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ...
Computers & security 56, 1-27, 2016
7352016
A reference model of information assurance & security
Y Cherdantseva, J Hilton
2013 international conference on availability, reliability and security, 546-555, 2013
3742013
Information security and information assurance: discussion about the meaning, scope, and goals
Y Cherdantseva, J Hilton
Standards and Standardization: Concepts, Methodologies, Tools, and …, 2015
1122015
Challenges and performance metrics for security operations center analysts: a systematic review
E Agyepong, Y Cherdantseva, P Reinecke, P Burnap
Journal of Cyber Security Technology 4 (3), 125-152, 2020
662020
A forensic taxonomy of SCADA systems and approach to incident response
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby
3rd International Symposium for ICS & SCADA Cyber Security Research 2015 …, 2015
492015
SCADA system forensic analysis within IIoT
P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ...
Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 73-101, 2017
442017
Towards secureBPMN-aligning BPMN with the information assurance and security domain
Y Cherdantseva, J Hilton, O Rana
Business Process Model and Notation: 4th International Workshop, BPMN 2012 …, 2012
252012
Forensic readiness for SCADA/ICS incident response
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ...
4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
242016
A multifaceted evaluation of the reference model of information assurance & security
Y Cherdantseva, J Hilton, O Rana, W Ivins
Computers & Security 63, 45-66, 2016
232016
Towards gender equality in software engineering: the NSA approach
H De Ribaupierre, K Jones, F Loizides, Y Cherdantseva
Proceedings of the 1st International Workshop on Gender Equality in Software …, 2018
212018
A cyber forensic taxonomy for scada systems in critical infrastructure
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ...
Critical Information Infrastructures Security: 10th International Conference …, 2016
202016
Towards a framework for measuring the performance of a security operations center analyst
E Agyepong, Y Cherdantseva, P Reinecke, P Burnap
2020 international conference on cyber security and protection of digital …, 2020
192020
A systematic method for measuring the performance of a cyber security operations centre analyst
E Agyepong, Y Cherdantseva, P Reinecke, P Burnap
Computers & Security 124, 102959, 2023
172023
Understanding information assurance and security
Y Cherdantseva, J Hilton
J. Organ. End User Comput 16 (3), 1, 2015
162015
Secure* BPMN-a graphical extension for BPMN 2.0 based on a reference model of information assurance & security
Y Cherdantseva
Cardiff University, 2014
142014
A Configurable Dependency Model of a SCADA System for Goal-Oriented Risk Assessment
Y Cherdantseva, P Burnap, S Nadjm-Tehrani, K Jones
Applied Sciences 12 (4880), 1-29, 2022
132022
Determining and sharing risk data in distributed interdependent systems
P Burnap, Y Cherdantseva, A Blyth, P Eden, K Jones, H Soulsby, ...
Computer 50 (4), 72-79, 2017
132017
Security architecture in a collaborative de-perimeterised environment: Factors of success
Y Cherdantseva, O Rana, J Hilton
ISSE 2011 Securing Electronic Business Processes: Highlights of the …, 2011
112011
The Evolution of Information Security Goals from the 1960s to today
Y Cherdantseva, J Hilton
Unpublished. February, 2012
102012
Model-based incident response playbooks
A Shaked, Y Cherdantseva, P Burnap
Proceedings of the 17th International Conference on Availability …, 2022
72022
系统目前无法执行此操作,请稍后再试。
文章 1–20