A survey of cyber security management in industrial control systems W Knowles, D Prince, D Hutchison, JFP Disso, K Jones International journal of critical infrastructure protection 9, 52-80, 2015 | 404 | 2015 |
An analysis of cyber security attack taxonomies R Derbyshire, B Green, D Prince, A Mauthe, D Hutchison 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2018 | 54 | 2018 |
Securitization and the global politics of cybersecurity M Lacy, D Prince Securitisation in the Non-West, 100-115, 2018 | 51 | 2018 |
The future of maritime cyber security O Fitton, D Prince, B Germond, M Lacy Lancaster University, 8, 2015 | 50 | 2015 |
The impact of social engineering on industrial control system security B Green, D Prince, J Busby, D Hutchison Proceedings of the first ACM workshop on cyber-physical systems-security and …, 2015 | 33 | 2015 |
Could a cyber attack cause a systemic impact in the financial sector? P Warren, K Kaivanto, D Prince Bank of England Quarterly Bulletin, Q4, 2018 | 31 | 2018 |
PCaaD: Towards automated determination and exploitation of industrial systems B Green, R Derbyshire, M Krotofil, W Knowles, D Prince, N Suri Computers & Security 110, 102424, 2021 | 29 | 2021 |
{ICS} testbed tetris: Practical building blocks towards a cyber security resource B Green, R Derbyshire, W Knowles, J Boorman, P Ciholas, D Prince, ... 13th USENIX workshop on cyber security experimentation and test (CSET 20), 2020 | 26 | 2020 |
Socio-technical security analysis of industrial control systems (ICS) B Green, D Prince, U Roedig, J Busby, D Hutchison 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 …, 2014 | 17 | 2014 |
Design and construction of an industrial control system testbed B Paske, B Green, D Prince, D Hutchison PG Net-The 15th Annual PostGraduate Symposium on the Convergence of …, 2014 | 16 | 2014 |
Cybersecurity: The security and protection challenges of our digital world D Prince Computer 51 (4), 16-19, 2018 | 15 | 2018 |
Understanding cyber criminals and measuring their future activity C Hargreaves, D Prince Lancaster: Lancaster University, 2013 | 14 | 2013 |
" How Long is a Piece of String": Defining Key Phases andObserved Challenges within ICS Risk Assessment B Green, D Prince, J Busby, D Hutchison Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017 | 11 | 2017 |
Small Business Cyber Security Survey 2012 D Prince, N King Security Lancaster & Lancaster University, UK, 2012 | 9 | 2012 |
Towards real-time assessment of industrial control systems (ICSs): A framework for future research W Knowles, D Prince, D Hutchison, JFP Disso, K Jones 1st International Symposium for ICS & SCADA Cyber Security Research 2013 …, 2013 | 5 | 2013 |
Small business cyber security workshop 2013: towards digitally secure business growth D Prince, N King Retrieved online: http://eprints. lancs. ac. uk/65265/1 …, 2013 | 4 | 2013 |
Perceptual influences on risk assessments and the challenges for information security and network management W Knowles, D Prince, D Hutchison Proceedings of the 13th Annual Post Graduate Symposium on the Conservence of …, 2012 | 4 | 2012 |
Risks and Transaction Costs of Distributed-Ledger Fintech: Boundary Effects and Consequences K Kaivanto, D Prince arXiv preprint arXiv:1702.08478, 2017 | 3 | 2017 |
Do you speak cyber? Talking security with developers of health systems and devices C Weir, A Dyson, D Prince IEEE Security & Privacy 21 (1), 27-36, 2022 | 2 | 2022 |
Response extraction for memories based physical unclonable function P Speed, UAF Roedig, RJ Young, DDC Prince US Patent App. 16/324,164, 2020 | 2 | 2020 |