Kevin Jones
Kevin Jones
Airbus Group
Email verificata su cyberkevinjones.com
Titolo
Citata da
Citata da
Anno
A review of cyber security risk assessment methods for SCADA systems
Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ...
computers & security 56, 1-27, 2016
3042016
A survey of cyber security management in industrial control systems
W Knowles, D Prince, D Hutchison, JFP Disso, K Jones
International Journal of Critical Infrastructure Protection 9, 52-80, 2015
1922015
Cyber warfare: Issues and challenges
M Robinson, K Jones, H Janicke
Computers & security 49, 70-94, 2015
952015
Early-stage malware prediction using recurrent neural networks
M Rhode, P Burnap, K Jones
Computers & Security 77, 578-594, 2018
882018
Malware classification using self organising feature maps and machine activity data
P Burnap, R French, F Truner, K Jones
Computers & Security, 2017
562017
Towards a SCADA forensics architecture
T Wu, JFP Disso, K Jones, A Campos
Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security …, 2013
352013
Analysis and run-time verification of dynamic security policies
H Janicke, F Siewe, K Jones, A Cau, H Zedan
Lecture Notes in Computer Science 3890, 92, 2006
302006
Internet of Clouds: Security and Privacy Issues
HJ A.Cook, M.Robinson, M.Ferrag, L.Maglaras, Y.He, K.Jones
Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018
28*2018
Internet of Cloud: Security and Privacy Issues
A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke
Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018
282018
On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge
JM Ahrend, M Jirotka, K Jones
Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016 …, 2016
242016
A compositional event & time-based policy model
H Janicke, A Cau, F Siewe, H Zedan, K Jones
Policies for Distributed Systems and Networks, 2006. Policy 2006. Seventh …, 2006
232006
A forensic taxonomy of SCADA systems and approach to incident response
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ...
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber …, 2015
222015
Developing cyber forensics for SCADA industrial control systems
J Stirland, K Jones, H Janicke, T Wu
The International Conference on Information Security and Cyber Forensics …, 2014
212014
A Plausible Solution to SCADA Security Honeypot Systems
JP Disso, K Jones, S Bailey
Broadband and Wireless Computing, Communication and Applications (BWCCA …, 2013
192013
Automated asset discovery in industrial control systems: exploring the problem
A Wedgbury, K Jones
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber …, 2015
182015
An introduction to cyber peacekeeping
M Robinson, K Jones, H Janicke, L Maglaras
Journal of Network and Computer Applications 114, 70-87, 2018
172018
Cybersecurity information sharing: A framework for information security management in UK SME supply chains
R Lewis, P Louvieris, P Abbott, N Clewley, K Jones
172014
Developing Cyber Peacekeeping: Observation, Monitoring and Reporting
M Robinson, K Jones, H Janicke, L Maglaras
arXiv preprint arXiv:1806.02608, 2018
152018
SCADA System Forensic Analysis Within IIoT
P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ...
Cybersecurity for Industry 4.0, 73-101, 2017
142017
Exploring the role of work identity and work locus of control in information security awareness
L Hadlington, M Popovac, H Janicke, I Yevseyeva, K Jones
Computers & Security, 2018
122018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20