Richard McEvoy

Orcid: 0000-0001-7322-4257

Affiliations:
  • Norwegian University for Science and Technology, Gjøvik, Norway
  • DXC Technology, Aldershot, UK


According to our database1, Richard McEvoy authored at least 18 papers between 2008 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Consulting the Oracle at Delphi - Combining Risk I and Risk in cyber security.
Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021), 2021

2020
An Accimap Waiting to Happen: Using Multi-Coding Frameworks to Accelerate Risk Analysis and Management.
Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020), 2020

2019
Deriving Cyber Security Risks from Human and Organizational Factors - A Socio-technical Approach.
Complex Syst. Informatics Model. Q., 2019

Cassandra's Calling Card: Socio-technical Risk Analysis and Management in Cyber Security Systems.
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019

2018
Beyond Training and Awareness: From Security Culture to Security Risk Management.
Proceedings of the 4th International Workshop on Socio-Technical Perspective in IS development (STPIS'18) co-located with 30th International Conference on Advanced Information Systems Engineering (CAiSE 2018), 2018

2016
Assisted content-based labelling and classification of documents.
Proceedings of the International Conference on Military Communications and Information Systems, 2016

2014
An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Context-based anomaly detection in critical infrastructures: a study in distributed systems.
PhD thesis, 2013

Locating subverted processes using random packet comparison in SCADA systems.
Int. J. Crit. Infrastructures, 2013

2012
Agent Interaction and State Determination in SCADA Systems.
Proceedings of the Critical Infrastructure Protection VI, 2012

Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
A Plant-Wide Industrial Process Control Security Problem.
Proceedings of the Critical Infrastructure Protection V, 2011

Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.
Proceedings of the Critical Information Infrastructure Security, 2011

2010
Host-Based Security Sensor Integrity in Multiprocessing Environments.
Proceedings of the Information Security, 2010

Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes.
Proceedings of the Critical Infrastructure Protection IV, 2010

A Formal Adversary Capability Model for SCADA Environments.
Proceedings of the Critical Information Infrastructures Security, 2010

2009
Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2009

2008
Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008


  Loading...