Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research., , , , and . ICS-CSR, BCS, (2013)A Forensic Taxonomy of SCADA Systems and Approach to Incident Response., , , , and . ICS-CSR, BCS, (2015)Deep Latent Defence., , , and . CoRR, (2019)Determining and Sharing Risk Data in Distributed Interdependent Systems., , , , , , and . Computer, 50 (4): 72-79 (2017)Adversarial Machine Learning Beyond the Image Domain., , , and . DAC, page 176. ACM, (2019)Automated Asset Discovery in Industrial Control Systems - Exploring the Problem., and . ICS-CSR, BCS, (2015)Cross-domain situational awareness and collaborative working for cyber security., , and . CyberSA, page 1-8. IEEE, (2015)A Plausible Solution to SCADA Security Honeypot Systems., , and . BWCCA, page 443-448. IEEE, (2013)Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design., , , , , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 51-66. Springer, (2020)Compartmental modelling of the pharmacokinetics of a breast cancer resistance protein., , , , , and . Comput. Methods Programs Biomed., 104 (2): 81-92 (2011)