Author of the publication

Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation.

, , , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covert channel attacks in pervasive computing., and . PerCom, page 236-242. IEEE Computer Society, (2015)Evolving Attackers against Wireless Sensor Networks., , and . GECCO (Companion), page 107-108. ACM, (2016)Identifying Vulnerabilities of Industrial Control Systems using Evolutionary Multiobjective Optimisation., and . CoRR, (2020)Evolving attackers against wireless sensor networks using genetic programming., , and . IET Wirel. Sens. Syst., 7 (4): 113-122 (2017)Risk Based Authorisation for Mobile Ad Hoc Networks., and . AIMS, volume 4543 of Lecture Notes in Computer Science, page 188-191. Springer, (2007)Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation., , , , , and . CoRR, (2022)A Systematic Survey of the Gemini Principles for Digital Twin Ontologies., , and . CoRR, (2024)Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains., , , , and . CoRR, (2023)Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation., and . Comput. Secur., (February 2024)Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures., , , , , , , , and . CEC Workshops, page 3-11. IEEE Computer Society, (2005)