Segui
Dr Cherdantseva Yulia
Titolo
Citata da
Citata da
Anno
A review of cyber security risk assessment methods for SCADA systems
Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ...
Computers & security 56, 1-27, 2016
6902016
A reference model of information assurance & security
Y Cherdantseva, J Hilton
2013 international conference on availability, reliability and security, 546-555, 2013
3642013
Information security and information assurance: discussion about the meaning, scope, and goals
Y Cherdantseva, J Hilton
Organizational, Legal, and Technological Dimensions of Information System …, 2014
1072014
Challenges and performance metrics for security operations center analysts: a systematic review
E Agyepong, Y Cherdantseva, P Reinecke, P Burnap
Journal of Cyber Security Technology 4 (3), 125-152, 2020
522020
A forensic taxonomy of SCADA systems and approach to incident response
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby
3rd International Symposium for ICS & SCADA Cyber Security Research 2015 …, 2015
472015
SCADA system forensic analysis within IIoT
P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ...
Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 73-101, 2017
402017
Towards secureBPMN-aligning BPMN with the information assurance and security domain
Y Cherdantseva, J Hilton, O Rana
Business Process Model and Notation: 4th International Workshop, BPMN 2012 …, 2012
252012
A multifaceted evaluation of the reference model of information assurance & security
Y Cherdantseva, J Hilton, O Rana, W Ivins
Computers & Security 63, 45-66, 2016
232016
Forensic readiness for SCADA/ICS incident response
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ...
4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
232016
A cyber forensic taxonomy for scada systems in critical infrastructure
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ...
Critical Information Infrastructures Security: 10th International Conference …, 2016
202016
Towards gender equality in software engineering: the NSA approach
H De Ribaupierre, K Jones, F Loizides, Y Cherdantseva
Proceedings of the 1st International Workshop on Gender Equality in Software …, 2018
182018
Towards a framework for measuring the performance of a security operations center analyst
E Agyepong, Y Cherdantseva, P Reinecke, P Burnap
2020 international conference on cyber security and protection of digital …, 2020
162020
Understanding information assurance and security
Y Cherdantseva, J Hilton
J. Organ. End User Comput 16 (3), 1, 2015
152015
Secure* BPMN-a graphical extension for BPMN 2.0 based on a reference model of information assurance & security
Y Cherdantseva
Cardiff University, 2014
142014
Determining and sharing risk data in distributed interdependent systems
P Burnap, Y Cherdantseva, A Blyth, P Eden, K Jones, H Soulsby, ...
Computer 50 (4), 72-79, 2017
122017
A Configurable Dependency Model of a SCADA System for Goal-Oriented Risk Assessment
Y Cherdantseva, P Burnap, S Nadjm-Tehrani, K Jones
Applied Sciences 12 (4880), 1-29, 2022
112022
Security architecture in a collaborative de-perimeterised environment: Factors of success
Y Cherdantseva, O Rana, J Hilton
ISSE 2011 Securing Electronic Business Processes: Highlights of the …, 2011
112011
The evolution of information security goals from the 1960s to today
Y Cherdantseva, J Hilton
Unpublished. February, 2012
102012
A systematic method for measuring the performance of a cyber security operations centre analyst
E Agyepong, Y Cherdantseva, P Reinecke, P Burnap
Computers & Security 124, 102959, 2023
82023
Model-based incident response playbooks
A Shaked, Y Cherdantseva, P Burnap
Proceedings of the 17th International Conference on Availability …, 2022
52022
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20