A review of cyber security risk assessment methods for SCADA systems
Cherdantseva, Yulia, Burnap, Pete, Blyth, Andrew, Eden, Peter, Jones, Kevin, Soulsby, Hugh, Stoddart, Kristan
Published in Computers & security (01.02.2016)
Published in Computers & security (01.02.2016)
Get full text
Journal Article
Determining and Sharing Risk Data in Distributed Interdependent Systems
Burnap, Pete, Cherdantseva, Yulia, Blyth, Andrew, Eden, Peter, Jones, Kevin, Soulsby, Hugh, Stoddart, Kristan
Published in Computer (Long Beach, Calif.) (01.04.2017)
Published in Computer (Long Beach, Calif.) (01.04.2017)
Get full text
Journal Article
SCADA System Forensic Analysis Within IIoT
Eden, Peter, Blyth, Andrew, Jones, Kevin, Soulsby, Hugh, Burnap, Pete, Cherdantseva, Yulia, Stoddart, Kristan
Published in Cybersecurity for Industry 4.0 (01.01.2017)
Published in Cybersecurity for Industry 4.0 (01.01.2017)
Get full text
Book Chapter