Author of the publication

A systematic method for measuring the performance of a cyber security operations centre analyst.

, , , and . Comput. Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Forensic Taxonomy of SCADA Systems and Approach to Incident Response., , , , and . ICS-CSR, BCS, (2015)CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms., , , and . PerCom Workshops, page 282-284. IEEE, (2023)Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks., , and . SafeConfig@CCS, page 15-20. ACM, (2015)A Case for Understanding End-to-End Performance of Topic Detection and Tracking Based Big Data Applications in the Cloud., , , , , , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 315-325. (2015)A Grid-Enabled Security Framework for Collaborative Virtual Organisations., , , , , and . Virtual Enterprises and Collaborative Networks, volume 149 of IFIP, page 415-422. Kluwer/springer, (2004)Scaling Archived Social Media Data Analysis Using a Hadoop Cloud., , , and . IEEE CLOUD, page 685-692. IEEE Computer Society, (2013)POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 700-704. Springer, (2023)Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals., , , , , , and . J. Cybersecur. Priv., 4 (2): 340-356 (June 2024)Scmhl5 at TRAC-2 Shared Task on Aggression Identification: Bert Based Ensemble Learning Approach., , , and . TRAC@LREC, page 62-68. European Language Resources Association (ELRA), (2020)Analysing the connectivity and communication of suicidal users on twitter., , , and . Comput. Commun., (2016)