Kevin Jones

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals.
J. Cybersecur. Priv., June, 2024

2021
A three-tiered intrusion detection system for industrial control systems.
J. Cybersecur., 2021

2020
Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A New Hope: Human-Centric Cybersecurity Research Embedded Within Organizations.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

2019
Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks.
CoRR, 2019

Deep Latent Defence.
CoRR, 2019

Dual-task agent for run-time classification and killing of malicious processes.
CoRR, 2019

LAB to SOC: Robust Features for Dynamic Malware Detection.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Adversarial Machine Learning Beyond the Image Domain.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
Early-stage malware prediction using recurrent neural networks.
Comput. Secur., 2018

Malware classification using self organising feature maps and machine activity data.
Comput. Secur., 2018

2017
Determining and Sharing Risk Data in Distributed Interdependent Systems.
Computer, 2017

2016
A review of cyber security risk assessment methods for SCADA systems.
Comput. Secur., 2016

A Model of a Malware Infected Automated Guided Vehicle for Experimental Cyber-Physical Security.
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016

Forensic Readiness for SCADA/ICS Incident Response.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2016

Self-Healing Intrusion Detection System Concept.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
A survey of cyber security management in industrial control systems.
Int. J. Crit. Infrastructure Prot., 2015

Combined Danger Signal and Anomaly-Based Threat Detection in Cyber-Physical Systems.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

Automated Asset Discovery in Industrial Control Systems - Exploring the Problem.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

A Forensic Taxonomy of SCADA Systems and Approach to Incident Response.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Cross-domain situational awareness and collaborative working for cyber security.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2015

2014
Cybersecurity Information Sharing: a Framework for Sustainable Information Security Management in UK SME Supply Chains.
Proceedings of the 22st European Conference on Information Systems, 2014

2013
A High-Throughput Antibody-Based Microarray Typing Platform.
Sensors, 2013

Towards a SCADA Forensics Architecture.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

A Plausible Solution to SCADA Security Honeypot Systems.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2011
Compartmental modelling of the pharmacokinetics of a breast cancer resistance protein.
Comput. Methods Programs Biomed., 2011

2010
An exploratory study of news article clustering for web-based bio-surveillance.
Proceedings of the ACM International Health Informatics Symposium, 2010

2006
MMALV - The Morphing Micro Air-Land Vehicle.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

1995
The Algorithmic Muse: New Listening Paradigms and the Harmonies of Chaos.
Proceedings of the 1995 International Computer Music Conference, 1995

1990
Algorithmic Explorations of Juxtaposition and Simultaneity in Computer-aided Composition.
Proceedings of the 1990 International Computer Music Conference, 1990

1986
Real-Time Stochastic Composition and Performance with AMPLE.
Proceedings of the 1986 International Computer Music Conference, 1986

1980
A Space Grammar for the Stochastic Generation of Multi-Dimensional Structures.
Proceedings of the 1980 International Computer Music Conference, 1980


  Loading...