A review of cyber security risk assessment methods for SCADA systems Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ... Computers & security 56, 1-27, 2016 | 715 | 2016 |
ICT in health care: sociotechnical approaches M Berg, J Aarts, J van der Lei Methods of information in medicine 42 (04), 297-301, 2003 | 412 | 2003 |
Legal, regulatory, and ethical frameworks for development of standards in artificial intelligence (AI) and autonomous robotic surgery S O'Sullivan, N Nevejans, C Allen, A Blyth, S Leonard, U Pagallo, ... The international journal of medical robotics and computer assisted surgery …, 2019 | 363 | 2019 |
Antecedents of the people and organizational aspects of medical informatics: review of the literature NM Lorenzi, RT Riley, AJC Blyth, G Southon, BJ Dixon Journal of the American Medical Informatics Association 4 (2), 79-93, 1997 | 349 | 1997 |
The ORDIT approach to organisational requirements JE Dobson, AJC Blyth, J Chudge, R Strens Requirements engineering: Social and technical issues, 87-106, 1994 | 73 | 1994 |
Acquiring volatile operating system data tools and techniques I Sutherland, J Evans, T Tryfonas, A Blyth ACM SIGOPS Operating Systems Review 42 (3), 65-73, 2008 | 71 | 2008 |
ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements AJC Blyth, J Chudge, JE Dobson, MR Strens Proceedings of the conference on Organizational computing systems, 216-227, 1993 | 58 | 1993 |
What is Information Assurance? A Blyth, GL Kovacich Information Assurance: Security in the Information Environment, 3-15, 2006 | 51* | 2006 |
A forensic taxonomy of SCADA systems and approach to incident response P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby 3rd International Symposium for ICS & SCADA Cyber Security Research 2015 …, 2015 | 49 | 2015 |
SCADA system forensic analysis within IIoT P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ... Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 73-101, 2017 | 43 | 2017 |
Penetration testing and vulnerability assessments: A professional approach K Xynos, I Sutherland, H Read, E Everitt, AJC Blyth School of Computer and Information Science, Security Research Centre, Edith …, 2010 | 37 | 2010 |
An empirical examination of the reverse engineering process for binary files I Sutherland, GE Kalb, A Blyth, G Mulley Computers & Security 25 (3), 221-228, 2006 | 36 | 2006 |
Cost effective management frameworks for intrusion detection systems C Iheagwara, A Blyth, M Singhal Journal of Computer Security 12 (5), 777-798, 2004 | 28 | 2004 |
Modelling the business process to derive organisational requirements for information technology A Blyth ACM SIGOIS Bulletin 16 (1), 25-33, 1995 | 25 | 1995 |
The ORDIT approach to requirements identification JE Dobson, AJC Blyth, J Chudge, MR Strens 1992 Proceedings. The Sixteenth Annual International Computer Software and …, 1992 | 25 | 1992 |
Forensic readiness for SCADA/ICS incident response P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ... 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016 | 24 | 2016 |
Information assurance: surviving in the information environment A Blyth, GL Kovacich Springer Science & Business Media, 2013 | 24 | 2013 |
Outcomes, standards and benchmarks A Blyth Deakin University, 2002 | 23 | 2002 |
A socio-technical approach to cyber risk management and impact assessment K Charitoudi, A Blyth Scientific Research Publishing, 2013 | 21 | 2013 |
Xbox 360: A digital forensic investigation of the hard disk drive K Xynos, S Harries, I Sutherland, G Davies, A Blyth Digital Investigation 6 (3-4), 104-111, 2010 | 21 | 2010 |