Adversarial attacks on machine learning cybersecurity defences in industrial control systems E Anthi, L Williams, M Rhode, P Burnap, A Wedgbury Journal of Information Security and Applications 58, 102717, 2021 | 162 | 2021 |
Automated asset discovery in industrial control systems-exploring the problem A Wedgbury, K Jones 3rd International Symposium for ICS & SCADA Cyber Security Research 2015 …, 2015 | 45 | 2015 |
Examining human individual differences in cyber security and possible implications for human-machine interface design LM Bishop, PL Morgan, PM Asquith, G Raywood-Burke, A Wedgbury, ... International Conference on Human-Computer Interaction, 51-66, 2020 | 19 | 2020 |
A New Hope: Human-Centric Cybersecurity Research Embedded Within Organizations PL Morgan, PM Asquith, LM Bishop, G Raywood-Burke, A Wedgbury, ... International Conference on Human-Computer Interaction, 206-216, 2020 | 16 | 2020 |
Real-time malware process detection and automated process killing M Rhode, P Burnap, A Wedgbury | 10* | |
Vulnerability Forecasting: In theory and practice É Leverett, M Rhode, A Wedgbury arXiv preprint arXiv:2012.03814, 2020 | 6 | 2020 |
Industrial Control System Defence: Debugging ICS Maintenance Network Traffic A Smith, A Wedgbury, P Biondi, H Soulsby, K Jones 6th International Symposium for ICS & SCADA Cyber Security Research 2019 6 …, 2019 | 1 | 2019 |
Cyber Security Architectures for ICS/SCADA Environments A Wedgbury, K Jones Engineering & Technology Reference 1, 2016 | | 2016 |