Quantitatively assessing and visualising industrial system attack surfaces EP Leverett University of Cambridge, Darwin College 7, 21, 2011 | 102 | 2011 |
Solving cyber risk: protecting your company and society A Coburn, E Leverett, G Woo John Wiley & Sons, 2018 | 52 | 2018 |
On market concentration and cybersecurity risk D Geer, E Jardine, E Leverett Journal of Cyber Policy 5 (1), 9-29, 2020 | 45 | 2020 |
Stochastic counterfactual risk analysis for the vulnerability assessment of cyber‐physical attacks on electricity distribution infrastructure networks EJ Oughton, D Ralph, R Pant, E Leverett, J Copic, S Thacker, R Dada, ... Risk Analysis 39 (9), 2012-2031, 2019 | 45 | 2019 |
Standardisation and Certification of the ‘Internet of Things’ E Leverett, R Clayton, R Anderson Proceedings of WEIS 2017, 2017 | 40 | 2017 |
Social engineering in IT security: Tools, tactics, and techniques: Testing tools, tactics & techniques S Conheady McGraw Hill Professional, 2014 | 26 | 2014 |
Vulnerability inheritance in programmable logic controllers É Leverett, R Wightman Proceedings of the Second International Symposium on Research in Grey-Hat …, 2013 | 25 | 2013 |
Towards estimating the untapped potential: a global malicious DDoS mean capacity estimate E Leverett, A Kaplan Journal of Cyber Policy 2 (2), 195-208, 2017 | 22 | 2017 |
Cyber terrorism: Assessment of the threat to insurance T Evan, E Leverett, SJ Ruffle, AW Coburn, J Bourdeau, R Gunaratna, ... Cambridge, United Kingdom: Cambridge Centre for Risk Studies, 2017 | 20 | 2017 |
Cyber risk outlook AW Coburn, J Daffron, K Quantrill, E Leverett, J Bordeau, A Smith, ... Centre for Risk Studies, University of Cambridge, in collaboration with Risk …, 2019 | 19 | 2019 |
Integrated Infrastructure: Cyber Resiliency in Society, Mapping the Consequences of an Interconnected Digital Economy S Kelly, E Leverett, EJ Oughton, J Copic, S Thacker, R Pant, L Pryor, ... Cambridge Risk Framework series;, 2016 | 14 | 2016 |
Standardisation and Certification of Safety, Security and Privacy in the ‘Internet of Things’ E Leverett, R Clayton, R Anderson Proceedings of the 16th Workshop on the Economics of Information Security (WEIS), 2017 | 9 | 2017 |
Bashe attack: Global infection by contagious malware J Daffron, S Ruffle, C Andrew, J Copic, K Quantrill Centre for Risk Studies (University of Cambridge): Cambridge, UK, 2019 | 8 | 2019 |
Shen attack: Cyber risk in asia pacific ports J Daffron, S Ruffle, A Coburn, J Copic, K Quantrill, K Strong, E Leverett Cambridge Centre for Risk Studies: Cambridge, MA, USA, 2019 | 7 | 2019 |
Vulnerability Forecasting: Theory and practice É Leverett, M Rhode, A Wedgbury Digital Threats: Research and Practice 3 (4), 1-27, 2022 | 6 | 2022 |
Cyber Risk Outlook 2018 AW Coburn, J Daffron, A Smith, J Bordeau, É Leverett, S Sweeney, ... Centre for Risk Studies, University of Cambridge and Risk Management …, 2018 | 5 | 2018 |
Averages don’t characterise the heavy tails of ransoms E Leverett, E Jardine, E Burns, A Gangwal, D Geer eCrime2020, 2020 | 4 | 2020 |
Standardisation and Certification of Safety, Security and Privacy in theInternet of Things' R Anderson, E LEVERETT, R CLAYTON | 4 | 2018 |
Cyber insurance: recent advances, good practices & challenges TP Augustinos, L Bauer, A Cappelletti, J Chaudhery, I Goddijn, L Heslault, ... European Union Agency For Network and Information Security (ENISA), 2016 | 4 | 2016 |
The Intelligent Process Lifecycle of Active Cyber Defenders D Sacher-Boldewin, E Leverett Digital Threats: Research and Practice (DTRAP) 3 (3), 1-17, 2022 | 3 | 2022 |