Daniel Prince
YOU?
Author Swipe
View article: Verification and Validation of Model-Based Systems Requirements and Design Leveraging Formal Methods to Increase Development Assurance
Verification and Validation of Model-Based Systems Requirements and Design Leveraging Formal Methods to Increase Development Assurance Open
As model-based systems engineering is proliferating throughout the aerospace industry as a method to manage the development of complex cyber-physical systems, opportunities to leverage formal methods for verification and validation purpose…
View article: Table of Contents
Table of Contents Open
This issue of IEEE Security & Privacy aims to highlight research of value to security and privacy workers as well as practices and case studies of security and privacy workers of value to researchers and other practitioners.We received 12 …
View article: Attributes and Dimensions of Trust in Secure Systems
Attributes and Dimensions of Trust in Secure Systems Open
What is it to be trusted? This is an important question as trust is increasingly placed in a system and the degree to which a system is trusted is increasingly being assessed. However, there are issues with how related terms are used. Many…
View article: Health IoT Privacy and Security Transferred to Engineering Requirements - State of the Art Technical Report
Health IoT Privacy and Security Transferred to Engineering Requirements - State of the Art Technical Report Open
Health IoT (HIoT) software offers thorny and complex security, privacy and safeguarding (SPS) problems and requirements, with huge potential impact. The HIPSTER project aims to help development teams in the Small-to-Medium Enterprise commu…
View article: VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System
VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System Open
The ever-increasing complexity of cyber-physical systems is driving the need for assurance of critical infrastructure and embedded systems. However, traditional methods to secure cyber-physical systems—e.g., using cyber best practices, ada…
View article: PCaaD: Towards Automated Determination and Exploitation of Industrial Processes
PCaaD: Towards Automated Determination and Exploitation of Industrial Processes Open
Over the last decade, Programmable Logic Controllers (PLCs) have been increasingly targeted by attackers to obtain control over industrial processes that support critical services. Such targeted attacks typically require detailed knowledge…
View article: Transformers:Intrusion Detection Data In Disguise
Transformers:Intrusion Detection Data In Disguise Open
IoT cyber security deficiencies are an increasing concern for users, operators, and developers. With no immediate and holistic devicelevel fixes in sight, alternative wraparound defensive measures are required. Intrusion Detection Systems …
View article: ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource
ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource Open
Cyber attacks on Critical National Infrastructure (CNI) can be hugely detrimental to society, notably via compromising Industrial Control Systems (ICS) that underpin core CNI functions. In order to explore in-depth ICS Cyber Security chall…
View article: FUJITSU White Paper: Cyber Threat Lab
FUJITSU White Paper: Cyber Threat Lab Open
No abstract available.
View article: Could a cyber attack cause a systemic impact in the financial sector
Could a cyber attack cause a systemic impact in the financial sector Open
There is not a uniform view of the link between cyber risk and systemic risk: some assume a direct link whereas others query the connection. Beyond nation states, the vast majority of independent cyber attackers are currently unlikely to h…
View article: Securitization and the global politics of cybersecurity
Securitization and the global politics of cybersecurity Open
In 'Digital disaster, cyber security, and the Copenhagen school', published in 2009, Lene Hansen and Helen Nissenbaum suggest ways in which securitization theory can help understand the politics of cybersecurity and cyberwar. What was sign…
View article: Risks and Transaction Costs of Distributed-Ledger Fintech: Boundary Effects and Consequences
Risks and Transaction Costs of Distributed-Ledger Fintech: Boundary Effects and Consequences Open
Fintech business models based on distributed ledgers -- and their smart-contract variants in particular -- offer the prospect of democratizing access to faster, anywhere-accessible, lower cost, reliable-and-secure high-quality financial se…
View article: The North West cyber security industry:export potential assessment
The North West cyber security industry:export potential assessment Open
Cyber Security businesses in the North West of England form an industry which is growing. This study has taken an in depth analysis of the industry to determine its size, make up and readiness to export and is the first of its kind classif…
View article: The future of maritime cyber security
The future of maritime cyber security Open
The Maritime environment is not immune to the radical ability of modern digital communications and computing to be disruptive. In order to gain the advantages of modern technology those operating in the maritime must also become aware and …