Skip to main content

Research Repository

Advanced Search

All Outputs (12)

Exploring the Security Culture of Operational Technology (OT) Organisations: The Role of External Consultancy in Overcoming Organisational Barriers (2023)
Presentation / Conference
Evripidou, S., Ani, U. D., Hailes, S., & McK. Watson, J. D. (2023, August). Exploring the Security Culture of Operational Technology (OT) Organisations: The Role of External Consultancy in Overcoming Organisational Barriers. Presented at Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), Anaheim, California, USA

Operational Technology (OT) refers to systems that control and monitor industrial processes. Organisations that use OT can be found in many sectors, including water and energy, and often operate a nation's critical infrastructure. These organisations... Read More about Exploring the Security Culture of Operational Technology (OT) Organisations: The Role of External Consultancy in Overcoming Organisational Barriers.

Digital twins in cyber effects modelling of IoT/CPS points of low resilience (2023)
Journal Article
Ani, U. (2023). Digital twins in cyber effects modelling of IoT/CPS points of low resilience. Simulation Modelling Practice and Theory, 125, Article 102744. https://doi.org/10.1016/j.simpat.2023.102744

The exponential increase of data volume and velocity have necessitated a tighter linkage of physical and cyber components in modern Cyber–physical systems (CPS) to achieve faster response times and autonomous component reconfiguration. To attain this... Read More about Digital twins in cyber effects modelling of IoT/CPS points of low resilience.

Industrial Internet of Things Security Modelling using Ontological Methods (2023)
Conference Proceeding
Aslam Jarwar, M., Watson, J., Ani, U., & Chalmers, S. (2023). Industrial Internet of Things Security Modelling using Ontological Methods. In IoT '22: Proceedings of the 12th International Conference on the Internet of Things (163 - 170). https://doi.org/10.1145/3567445.3571103

The Industrial Internet of Things (IIoT) trend presents many significant benefits for improving industrial operations. However, its emergence from the convergence of legacy Industrial Control Systems (ICS) and Information and Communication Technologi... Read More about Industrial Internet of Things Security Modelling using Ontological Methods.

Super-forecasting the 'technological singularity' risks from artificial intelligence (2022)
Journal Article
Ani, Radanliev, P., De Roure, D., Maple, C., & Ani, U. (2022). Super-forecasting the 'technological singularity' risks from artificial intelligence. Evolving Systems, 13(5), 747-757. https://doi.org/10.1007/s12530-022-09431-7

This article investigates cybersecurity (and risk) in the context of ‘technological singularity’ from artificial intelligence. The investigation constructs multiple risk forecasts that are synthesised in a new framework for counteracting risks from a... Read More about Super-forecasting the 'technological singularity' risks from artificial intelligence.

Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation (2022)
Report
D Ani, U., D McK Watson, J., Tuptuk, N., Hailes, S., Carr, M., & Maple, C. (2022). Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation. PETRAS

The UK Critical National Infrastructure is critically dependent on digital technologies that provide communications, monitoring, control, and decision-support functionalities. Digital technologies are progressively enhancing efficiency, reliability,... Read More about Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation.

What Makes an Industrial Control System Security Testbed Credible and Acceptable? Towards a Design Consideration Framework (2021)
Journal Article
Ani, U., & Watson, J. (2021). What Makes an Industrial Control System Security Testbed Credible and Acceptable? Towards a Design Consideration Framework. https://doi.org/10.5220/0010170301810190

The convergence of Industrial Control System (ICS) with Information Technologies (IT) coupled with the resulting and widely publicized cyber security incidents have made ICS security and resilience issues of critical concern to operators and governme... Read More about What Makes an Industrial Control System Security Testbed Credible and Acceptable? Towards a Design Consideration Framework.

The ethics of shared Covid-19 risks: an epistemological framework for ethical health technology assessment of risk in vaccine supply chain infrastructures (2021)
Journal Article
Ani. (2021). The ethics of shared Covid-19 risks: an epistemological framework for ethical health technology assessment of risk in vaccine supply chain infrastructures. Health and Technology, 1083 - 1091. https://doi.org/10.1007/s12553-021-00565-3

AbstractThis article addresses the topic of shared responsibilities in supply chains, with a specific focus on the application of the Internet of Things (IoT) in e-health environments, and Industry 4.0 issues—concerning data security, privacy, reliab... Read More about The ethics of shared Covid-19 risks: an epistemological framework for ethical health technology assessment of risk in vaccine supply chain infrastructures.

The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK (Policy Brief) (2021)
Report
Lesniewska, F., D Ani, U., M Watson, J., & Carr, M. The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK (Policy Brief). PETRAS

In January 2019, the UK Government published its Maritime 2050 on Navigating the Future strategy. In the strategy, the government highlighted the importance of digitalization (with well-designed regulatory support) to achieve its goal of ensuring tha... Read More about The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK (Policy Brief).

Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases (2020)
Journal Article
Ani, U. P. D., Watson, J. M., Green, B., Craggs, B., & Nurse, J. R. C. (2021). Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases. Journal of Cyber Security Technology, 5(2), 71-119. https://doi.org/10.1080/23742917.2020.1843822

This paper presents a mapping framework for design factors and an implementation process for building credible Industrial Control Systems (ICS) security testbeds. The security and resilience of ICSs has become a critical concern to operators and gove... Read More about Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases.

Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases (2020)
Journal Article
Ani, U. D., Watson, J. M., Green, B., Craggs, B., & Nurse, J. (2020). Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases. Journal of Cyber Security Technology, 5(2), https://doi.org/10.1080/23742917.2020.1843822

This paper presents a mapping framework for design factors and implementation process for building credible Industrial Control Systems (ICS) security testbeds. The resilience of ICSs has become a critical concern to operators and governments followin... Read More about Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases.

A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints (2020)
Journal Article
Ani, U. D., Watson, J. M., Carr, M., Cook, A., & Nurse, J. R. (2022). A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints. Journal of Defense Modeling and Simulation, 19(3), 263-286. https://doi.org/10.1177/1548512920953499

Simulation can provide a useful means to understand issues linked to industrial network operations. For transparent, collaborative, cost-effective solutions development, and to attract the broadest interest base, simulation is critical and open sourc... Read More about A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints.

Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains
Journal Article
D Ani, U., M Watson, J., Tuptuk, N., Hailes, S., & Jawar, A. (2023). Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains. arXiv,

This study explores the state-of-the-art, application, and maturity of socio-technical security models for industries and sectors dependent on CI and investigates the gap between academic research and industry practices concerning the modelling of bo... Read More about Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains.