German steel mill cyber attack RM Lee, MJ Assante, T Conway Industrial Control Systems 30 (62), 1-15, 2014 | 268 | 2014 |
The ICS Cyber Kill Chain M Assante https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system …, 2015 | 234* | 2015 |
Crashoverride: Analysis of the threat to electric grid operations RM Lee, MJ Assante, T Conway Dragos Inc., March, 7, 2017 | 74 | 2017 |
ICS CP/PE (Cyber-to-Physical or Process Effects) case study paper–German steel mill cyber attack RM Lee, MJ Assante, T Conway Sans ICS, 2014 | 49 | 2014 |
The evolution of cyber threat intelligence (cti): 2019 sans cti survey R Brown, RM Lee SANS Institute. Available online: https://www. sans. org/white-papers/38790 …, 2019 | 48 | 2019 |
OMG Cyber! Thirteen Reasons Why Hype Makes for Bad Policy RM Lee, T Rid The RUSI Journal 159 (5), 4-12, 2014 | 42 | 2014 |
The Sliding Scale of Cyber Security RM Lee https://www.sans.org/reading-room/whitepapers/analyst/sliding-scale-cyber …, 2015 | 35 | 2015 |
2021 sans cyber threat intelligence (cti) survey R Brown, RM Lee Tech. Rep. SANS Institute, 2021 | 32 | 2021 |
One hundred monkeys: The triumph of popular wisdom in Canadian politics RM Lee MacFarlane Walter & Ross, 1989 | 26 | 1989 |
Industroyer/crashoverride: Zero things cool about a threat group targeting the power grid R Lee, J Slowik, B Miller, A Cherepanov, R Lipovsky Black Hat USA, 2017 | 19 | 2017 |
Analysis of the cyber attack on the ukrainian power grid M Assante, T Conway, R Lee SANS Industrial Control Systems Security Blog, 1-26, 2016 | 19 | 2016 |
Cyber threat intelligence M Lee John Wiley & Sons, 2023 | 18 | 2023 |
Modular ICS malware MJ Assante, RM Lee, T Conway SANS-Industrial Control Systems, E-ISAC white paper, 2017 | 18 | 2017 |
Analysis of the cyber attack on the ukrainian power grid. 2016 RM Lee, MJ Assante, T Conway URL http://www. nerc. com/pa/CI/ESISAC/Documents/E …, 0 | 18 | |
Tlp: White-analysis of the cyber attack on the Ukrainian power grid-defense use case R Lee, MJ Assante, T Conway Proc. Electr. Inf. Sharing Anal. Center (E-ISAC), 1-29, 2016 | 17 | 2016 |
The who, what, where, when, why and how of effective threat hunting RM Lee, R Lee SANS Institute, 2016 | 17 | 2016 |
ICS CP/PE (cyber-to-physical or process effects) case study paper-media report of the Baku-Tbilisi-Ceyhan (BTC) pipeline cyber attack RM Lee, MJ Assante, T Conway SANS Institute, Bethesda, MD, USA, 2014 | 15 | 2014 |
Media report of the Baku-Tbilisi-Ceyhan (BTC) pipeline cyber attack RM Lee, MJ Assante, T Conway ICS Defense Use Case (DUC), SANS Industrial Control Systems, SANS Institute …, 2014 | 14 | 2014 |
2020 SANS Cyber Threat Intelligence (CTI) Survey RM Lee Tech. Rep, 2020 | 13 | 2020 |
SANS 2018 threat hunting survey results RM Lee, RT Lee SANS Institute Reading Room, 2018 | 13 | 2018 |