Follow
Dr Cherdantseva Yulia
Title
Cited by
Cited by
Year
A review of cyber security risk assessment methods for SCADA systems
Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ...
Computers & security 56, 1-27, 2016
5502016
A reference model of information assurance & security
Y Cherdantseva, J Hilton
2013 International Conference on Availability, Reliability and Security, 546-555, 2013
3042013
Information security and information assurance: discussion about the meaning, scope, and goals
Y Cherdantseva, J Hilton
Standards and Standardization: Concepts, Methodologies, Tools, and …, 2015
962015
A forensic taxonomy of SCADA systems and approach to incident response
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby
3rd International Symposium for ICS & SCADA Cyber Security Research 2015 …, 2015
362015
Challenges and performance metrics for security operations center analysts: a systematic review
E Agyepong, Y Cherdantseva, P Reinecke, P Burnap
Journal of Cyber Security Technology 4 (3), 125-152, 2020
352020
SCADA system forensic analysis within IIoT
P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ...
Cybersecurity for Industry 4.0, 73-101, 2017
252017
Towards SecureBPMN-Aligning BPMN with the information assurance and security domain
Y Cherdantseva, J Hilton, O Rana
International Workshop on Business Process Modeling Notation, 107-115, 2012
222012
A multifaceted evaluation of the reference model of information assurance & security
Y Cherdantseva, J Hilton, O Rana, W Ivins
Computers & Security 63, 45-66, 2016
202016
A cyber forensic taxonomy for scada systems in critical infrastructure
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ...
International Conference on Critical Information Infrastructures Security, 27-39, 2015
152015
Forensic readiness for SCADA/ICS incident response
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ...
4th International Symposium for ICS & SCADA Cyber Security Research 2016 4 …, 2016
142016
Understanding information assurance and security
Y Cherdantseva, J Hilton
J. Organ. End User Comput 16 (3), 1, 2015
132015
Secure* BPMN-a graphical extension for BPMN 2.0 based on a reference model of information assurance & security
Y Cherdantseva
Cardiff University, 2014
112014
Towards gender equality in software engineering: the NSA approach
H De Ribaupierre, K Jones, F Loizides, Y Cherdantseva
2018 IEEE/ACM 1st International Workshop on Gender Equality in Software …, 2018
102018
The evolution of information security goals from the 1960s to today
Y Cherdantseva, J Hilton
Cardif University, 2012
102012
Security architecture in a collaborative de-perimeterised environment: Factors of success
Y Cherdantseva, O Rana, J Hilton
ISSE 2011 Securing Electronic Business Processes, 201-213, 2012
102012
Determining and sharing risk data in distributed interdependent systems
P Burnap, Y Cherdantseva, A Blyth, P Eden, K Jones, H Soulsby, ...
Computer 50 (4), 72-79, 2017
82017
Towards a framework for measuring the performance of a security operations center analyst
E Agyepong, Y Cherdantseva, P Reinecke, P Burnap
2020 International Conference on Cyber Security and Protection of Digital …, 2020
52020
A Configurable Dependency Model of a SCADA System for Goal-Oriented Risk Assessment
Y Cherdantseva, P Burnap, S Nadjm-Tehrani, K Jones
Applied Sciences 12 (4880), 1-29, 2022
22022
Applied Cyber Security for Applied Software Engineering Undergraduate Program
Y Cherdantseva, P Smart
Journal of The Colloquium for Information Systems Security Education 8 (1), 7-7, 2020
12020
Cyber security operations centre concepts and implementation
E Agyepong, Y Cherdantseva, P Reinecke, P Burnap
Modern Theories and Practices for Cyber Ethics and Security Compliance, 88-104, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20