Follow
Kevin Jones
Kevin Jones
Airbus Group
Verified email at cyberkevinjones.com
Title
Cited by
Cited by
Year
A review of cyber security risk assessment methods for SCADA systems
Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ...
computers & security 56, 1-27, 2016
7722016
A survey of cyber security management in industrial control systems
W Knowles, D Prince, D Hutchison, JFP Disso, K Jones
International Journal of Critical Infrastructure Protection 9, 52-80, 2015
4052015
Early-stage malware prediction using recurrent neural networks
M Rhode, P Burnap, K Jones
Computers & Security 77, 578-594, 2018
3222018
Cyber warfare: Issues and challenges
M Robinson, K Jones, H Janicke
Computers & security 49, 70-94, 2015
2312015
Malware classification using self organising feature maps and machine activity data
P Burnap, R French, F Truner, K Jones
Computers & Security, 2017
1562017
Internet of Clouds: Security and Privacy Issues
HJ A.Cook, M.Robinson, M.Ferrag, L.Maglaras, Y.He, K.Jones
Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018
91*2018
Internet of Cloud: Security and Privacy Issues
A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke
Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018
912018
Towards a SCADA forensics architecture
T Wu, JFP Disso, K Jones, A Campos
Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security …, 2013
612013
Exploring the role of work identity and work locus of control in information security awareness
L Hadlington, M Popovac, H Janicke, I Yevseyeva, K Jones
Computers & Security, 2018
562018
On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge
JM Ahrend, M Jirotka, K Jones
Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016 …, 2016
542016
Developing cyber forensics for SCADA industrial control systems
J Stirland, K Jones, H Janicke, T Wu
The International Conference on Information Security and Cyber Forensics …, 2014
542014
A forensic taxonomy of SCADA systems and approach to incident response
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ...
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber …, 2015
502015
Automated asset discovery in industrial control systems: exploring the problem
A Wedgbury, K Jones
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber …, 2015
482015
An introduction to cyber peacekeeping
M Robinson, K Jones, H Janicke, L Maglaras
Journal of Network and Computer Applications 114, 70-87, 2018
452018
SCADA system forensic analysis within IIoT
P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ...
Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 73-101, 2017
452017
Adversarial Machine Learning Beyond the Image Domain.
G Zizzo, C Hankin, S Maffeis, K Jones
DAC, 176:1-176:4, 2019
432019
A Plausible Solution to SCADA Security Honeypot Systems
JP Disso, K Jones, S Bailey
Broadband and Wireless Computing, Communication and Applications (BWCCA …, 2013
392013
Developing Cyber Peacekeeping: Observation, Monitoring and Reporting
M Robinson, K Jones, H Janicke, L Maglaras
arXiv preprint arXiv:1806.02608, 2018
322018
CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems
B Hallaq, A Nicholson, R Smith, L Maglaras, H Janicke, K Jones
Security Solutions and Applied Cryptography in Smart Grid Communications …, 2016
322016
Analysis and run-time verification of dynamic security policies
H Janicke, F Siewe, K Jones, A Cau, H Zedan
Lecture Notes in Computer Science 3890, 92, 2006
312006
The system can't perform the operation now. Try again later.
Articles 1–20