A review of cyber security risk assessment methods for SCADA systems Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ... Computers & security 56, 1-27, 2016 | 770 | 2016 |
The British nuclear experience: The roles of beliefs, culture and identity J Baylis, K Stoddart OUP Oxford, 2014 | 64 | 2014 |
Losing an empire and finding a role: Britain, the USA, NATO and nuclear weapons, 1964-70 K Stoddart Springer, 2012 | 60 | 2012 |
UK cyber security and critical national infrastructure protection K Stoddart International Affairs 92 (5), 1079-1105, 2016 | 59 | 2016 |
SCADA system forensic analysis within IIoT P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ... Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 73-101, 2017 | 45 | 2017 |
Britain and the Chevaline project: the hidden nuclear programme, 1967–82 J Baylis, K Stoddart The Journal of Strategic Studies 26 (4), 124-155, 2003 | 35 | 2003 |
Maintaining the ‘Moscow Criterion’: British Strategic Nuclear Targeting 1974–1979 K Stoddart Journal of Strategic Studies 31 (6), 897-924, 2008 | 34 | 2008 |
The Sword and the Shield: Britain, America, NATO and Nuclear Weapons, 1970-1976 K Stoddart Springer, 2014 | 28 | 2014 |
Forensic readiness for SCADA/ICS incident response P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ... 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016 | 25 | 2016 |
Nuclear Weapons in Britain's Policy towards France, 1960–1974 K Stoddart Diplomacy and Statecraft 18 (4), 719-744, 2007 | 25 | 2007 |
Facing down the Soviet Union: Britain, the USA, NATO and nuclear weapons, 1976-1983 K Stoddart Springer, 2014 | 23 | 2014 |
A cyber forensic taxonomy for scada systems in critical infrastructure P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby, ... Critical Information Infrastructures Security: 10th International Conference …, 2016 | 20 | 2016 |
The British nuclear experience: The role of ideas and beliefs (Part One) J Baylis, K Stoddart Diplomacy & Statecraft 23 (2), 331-346, 2012 | 20 | 2012 |
Live free or die hard: US–UK cybersecurity policies K Stoddart Political Science Quarterly 131 (4), 803-842, 2016 | 19 | 2016 |
Difficult Europeans: NATO and tactical/non-strategic nuclear weapons in the Cold War B Heuser, K Stoddart Diplomacy & statecraft 28 (3), 454-476, 2017 | 15 | 2017 |
The British Labour Government and the Development of Chevaline, 1974–79 K Stoddart Cold War History 10 (3), 287-314, 2010 | 15 | 2010 |
The Wilson government and British responses to anti-ballistic missiles, 1964–1970 K Stoddart Contemporary British History 23 (1), 1-33, 2009 | 14 | 2009 |
Determining and sharing risk data in distributed interdependent systems P Burnap, Y Cherdantseva, A Blyth, P Eden, K Jones, H Soulsby, ... Computer 50 (4), 72-79, 2017 | 13 | 2017 |
Non and Sub-State Actors: Cybercrime, Terrorism, and Hackers K Stoddart Cyberwarfare: Threats to Critical Infrastructure, 351-399, 2022 | 12 | 2022 |
Hope and fear: Intelligence and the future of global security a decade after 9/11 RG Hughes, K Stoddart Intelligence and National Security 27 (5), 625-652, 2012 | 10 | 2012 |