Kevin Jones
Kevin Jones
Airbus Group
Verified email at
Cited by
Cited by
A review of cyber security risk assessment methods for SCADA systems
Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ...
computers & security 56, 1-27, 2016
A survey of cyber security management in industrial control systems
W Knowles, D Prince, D Hutchison, JFP Disso, K Jones
International Journal of Critical Infrastructure Protection 9, 52-80, 2015
Early-stage malware prediction using recurrent neural networks
M Rhode, P Burnap, K Jones
Computers & Security 77, 578-594, 2018
Cyber warfare: Issues and challenges
M Robinson, K Jones, H Janicke
Computers & security 49, 70-94, 2015
Malware classification using self organising feature maps and machine activity data
P Burnap, R French, F Truner, K Jones
Computers & Security, 2017
Internet of Clouds: Security and Privacy Issues
HJ A.Cook, M.Robinson, M.Ferrag, L.Maglaras, Y.He, K.Jones
Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018
Internet of Cloud: Security and Privacy Issues
A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke
Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018
Towards a SCADA forensics architecture
T Wu, JFP Disso, K Jones, A Campos
Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security …, 2013
On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge
JM Ahrend, M Jirotka, K Jones
Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016 …, 2016
A forensic taxonomy of SCADA systems and approach to incident response
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ...
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber …, 2015
Exploring the role of work identity and work locus of control in information security awareness
L Hadlington, M Popovac, H Janicke, I Yevseyeva, K Jones
Computers & Security, 2018
Developing cyber forensics for SCADA industrial control systems
J Stirland, K Jones, H Janicke, T Wu
The International Conference on Information Security and Cyber Forensics …, 2014
An introduction to cyber peacekeeping
M Robinson, K Jones, H Janicke, L Maglaras
Journal of Network and Computer Applications 114, 70-87, 2018
Analysis and run-time verification of dynamic security policies
H Janicke, F Siewe, K Jones, A Cau, H Zedan
Lecture Notes in Computer Science 3890, 92, 2006
A Plausible Solution to SCADA Security Honeypot Systems
JP Disso, K Jones, S Bailey
Broadband and Wireless Computing, Communication and Applications (BWCCA …, 2013
CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems
B Hallaq, A Nicholson, R Smith, L Maglaras, H Janicke, K Jones
Security Solutions and Applied Cryptography in Smart Grid Communications …, 2016
Automated asset discovery in industrial control systems: exploring the problem
A Wedgbury, K Jones
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber …, 2015
SCADA System Forensic Analysis Within IIoT
P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ...
Cybersecurity for Industry 4.0, 73-101, 2017
A compositional event & time-based policy model
H Janicke, A Cau, F Siewe, H Zedan, K Jones
Policies for Distributed Systems and Networks, 2006. Policy 2006. Seventh …, 2006
Developing Cyber Peacekeeping: Observation, Monitoring and Reporting
M Robinson, K Jones, H Janicke, L Maglaras
arXiv preprint arXiv:1806.02608, 2018
The system can't perform the operation now. Try again later.
Articles 1–20