An analysis of cyber security attack taxonomies R Derbyshire, B Green, D Prince, A Mauthe, D Hutchison 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2018 | 53 | 2018 |
“Talking a Different Language”: Anticipating Adversary Attack Cost for Cyber Risk Assessment R Derbyshire, B Green, D Hutchison Computers & Security, 102163, 2020 | 32 | 2020 |
PCaaD: Towards Automated Determination and Exploitation of Industrial Systems B Green, R Derbyshire, M Krotofil, W Knowles, D Price, N Suri Computers & Security, 102424, 2021 | 30 | 2021 |
ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource B Green, R Derbyshire, W Knowles, J Boorman, P Ciholas, D Prince, ... 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020 | 26 | 2020 |
Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool S Maesschalck, A Staves, R Derbyshire, B Green, D Hutchison Computers & Security 127, 103116, 2023 | 12* | 2023 |
Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment RJ Derbyshire PQDT-Global, 2022 | 6 | 2022 |
Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and Guidelines A Staves, S Maesschalck, R Derbyshire, B Green, D Hutchison 2023 IFIP Networking Conference (IFIP Networking), 1-6, 2023 | 3 | 2023 |
To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source Initiative R Derbyshire, S Maesschalck, A Staves, B Green, D Hutchison 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023 | 1 | 2023 |
Dead Man’s PLC: Towards Viable Cyber Extortion for Operational Technology R Derbyshire, B Green, C Walt, D Hutchison Digital Threats: Research and Practice, 2023 | | 2023 |