A review of cyber security risk assessment methods for SCADA systems Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ... computers & security 56, 1-27, 2016 | 713 | 2016 |
A survey of cyber security management in industrial control systems W Knowles, D Prince, D Hutchison, JFP Disso, K Jones International Journal of Critical Infrastructure Protection 9, 52-80, 2015 | 383 | 2015 |
Early-stage malware prediction using recurrent neural networks M Rhode, P Burnap, K Jones Computers & Security 77, 578-594, 2018 | 299 | 2018 |
Cyber warfare: Issues and challenges M Robinson, K Jones, H Janicke Computers & security 49, 70-94, 2015 | 212 | 2015 |
Malware classification using self organising feature maps and machine activity data P Burnap, R French, F Truner, K Jones Computers & Security, 2017 | 151 | 2017 |
Internet of Clouds: Security and Privacy Issues HJ A.Cook, M.Robinson, M.Ferrag, L.Maglaras, Y.He, K.Jones Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018 | 87* | 2018 |
Internet of Cloud: Security and Privacy Issues A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018 | 87 | 2018 |
Towards a SCADA forensics architecture T Wu, JFP Disso, K Jones, A Campos Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security …, 2013 | 61 | 2013 |
Developing cyber forensics for SCADA industrial control systems J Stirland, K Jones, H Janicke, T Wu The International Conference on Information Security and Cyber Forensics …, 2014 | 54 | 2014 |
Exploring the role of work identity and work locus of control in information security awareness L Hadlington, M Popovac, H Janicke, I Yevseyeva, K Jones Computers & Security, 2018 | 50 | 2018 |
On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge JM Ahrend, M Jirotka, K Jones Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016 …, 2016 | 50 | 2016 |
A forensic taxonomy of SCADA systems and approach to incident response P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ... Proceedings of the 3rd International Symposium for ICS & SCADA Cyber …, 2015 | 49 | 2015 |
SCADA System Forensic Analysis Within IIoT P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ... Cybersecurity for Industry 4.0, 73-101, 2017 | 44 | 2017 |
Automated asset discovery in industrial control systems: exploring the problem A Wedgbury, K Jones Proceedings of the 3rd International Symposium for ICS & SCADA Cyber …, 2015 | 43 | 2015 |
An introduction to cyber peacekeeping M Robinson, K Jones, H Janicke, L Maglaras Journal of Network and Computer Applications 114, 70-87, 2018 | 42 | 2018 |
Adversarial Machine Learning Beyond the Image Domain. G Zizzo, C Hankin, S Maffeis, K Jones DAC, 176:1-176:4, 2019 | 41 | 2019 |
A Plausible Solution to SCADA Security Honeypot Systems JP Disso, K Jones, S Bailey Broadband and Wireless Computing, Communication and Applications (BWCCA …, 2013 | 39 | 2013 |
Developing Cyber Peacekeeping: Observation, Monitoring and Reporting M Robinson, K Jones, H Janicke, L Maglaras arXiv preprint arXiv:1806.02608, 2018 | 31 | 2018 |
CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems B Hallaq, A Nicholson, R Smith, L Maglaras, H Janicke, K Jones Security Solutions and Applied Cryptography in Smart Grid Communications …, 2016 | 30 | 2016 |
Analysis and run-time verification of dynamic security policies H Janicke, F Siewe, K Jones, A Cau, H Zedan Lecture Notes in Computer Science 3890, 92, 2006 | 30 | 2006 |