Home > Research > Security > Publications & Outputs
View graph of relations
  1. 2024
  2. E-pub ahead of print

    Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology

    Staves, A., Gouglidis, A., Maesschalck, S. & Hutchison, D., 30/06/2024, In: Safety Science. 174, 106481.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. E-pub ahead of print

    These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 5/02/2024, (E-pub ahead of print) In: IEEE Transactions on Network and Service Management.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. 2023
  5. Forthcoming

    Exploring the Representation of Cyber-Risk Data Through Sketching

    Miller, T., Sturdee, M. & Prince, D., 22/10/2023, (Accepted/In press). 11 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. Published

    To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source Initiative

    Derbyshire, R., Maesschalck, S., Staves, A., Green, B. & Hutchison, D., 31/07/2023, IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 358-362 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and Guidelines

    Staves, A., Maesschalck, S., Derbyshire, R., Green, B. & Hutchison, D., 24/07/2023, 2023 IFIP Networking Conference (IFIP Networking). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool

    Maesschalck, S., Staves, A., Derbyshire, R., Green, B. & Hutchison, D., 30/04/2023, In: Computers and Security. 127, 14 p., 103116.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. 2022
  10. Published

    Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Yin, H. & Stavrou, A. (eds.). New York: ACM, p. 3415-3417 3 p. (Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Poster: Multi-Layer Threat Analysis of the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, p. 3419-3421. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  12. Forthcoming

    Attributes and Dimensions of Trust in Secure Systems

    Bradbury, M., Prince, D., Marcinkiewicz, V. & Watson, T., 7/10/2022, (Accepted/In press) STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands, (ACM Transactions on Internet of Things).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...23 Next

Back to top