Securing industrial control system environments: the missing piece
(2018)
Journal Article
Ani, U. D., Daniel, N., Oladipo, F., & Adewumi, S. E. (2018). Securing industrial control system environments: the missing piece. Journal of Cyber Security Technology, 2(3-4), 131-163. https://doi.org/10.1080/23742917.2018.1554985
All Outputs (31)
A framework for Operational Security Metrics Development for industrial control environment (2018)
Journal Article
Ani, U. P. D., He, H. (., & Tiwari, A. (2018). A framework for Operational Security Metrics Development for industrial control environment. Journal of Cyber Security Technology, 2(3-4), 201-237. https://doi.org/10.1080/23742917.2018.1554986
Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective (2016)
Journal Article
Ani, U. P. D., He, H. (., & Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32-74. https://doi.org/10.1080/23742917.2016.1252211
Human Capability Evaluation Approach for Cyber Security in Critical Industrial Infrastructure (2016)
Book Chapter
Daniel Ani, U. P., He, H. M., & Tiwari, A. (2016). Human Capability Evaluation Approach for Cyber Security in Critical Industrial Infrastructure. . Springer International Publishing. https://doi.org/10.1007/978-3-319-41932-9_14
BYOD NETWORK: Enhancing Security through Trust–Aided Access Control Mechanisms (2015)
Journal Article
Nwebonyi, F. N., The Society of Digital Information and Wireless Communication, & ANI, U. (2015). BYOD NETWORK: Enhancing Security through Trust–Aided Access Control Mechanisms. International Journal of Cyber-Security and Digital Forensics, 4(1), 272-289. https://doi.org/10.17781/p001410
A Comparative Assessment of Computer Security Incidence Handling (2014)
Journal Article
Ani, U., & Agbanusi, N. A Comparative Assessment of Computer Security Incidence Handling. British Journal of Mathematics and Computer Science, 4(22), 3120-3134. https://doi.org/10.9734/bjmcs/2014/11874
Optimising VoIP Traffic over MANET: Leveraging the Power of TORA On-Demand Routing Protocol (2013)
Journal Article
Ani, U., Muhammad, M., & C. Agbanusi, N. Optimising VoIP Traffic over MANET: Leveraging the Power of TORA On-Demand Routing Protocol. International Journal of Computer Applications, 82(12), 38-52. https://doi.org/10.5120/14172-2414
Safeguarding Forensic Integrity of Virtual Environment Evidence (2013)
Journal Article
Ani, U., & Epiphaniou, G. Safeguarding Forensic Integrity of Virtual Environment Evidence. International Journal of Computer Applications, 82(6), 43-52. https://doi.org/10.5120/14123-2240
Cyber Risk in IoT Systems
Journal Article
Radanliev, P., De Roure, D. C., Maple, C., Nurse, J. R., Nicolescu, R., & Ani, U. Cyber Risk in IoT Systems. Preprints, https://doi.org/10.20944/preprints201903.0104.v1
Cyber Risk Management for the Internet of Things
Journal Article
Radanliev, P., Charles De Roure, D., R.C. Nurse, J., Burnap, P., Anthi, E., Uchenna, A., …Mantilla Montalvo, R. Cyber Risk Management for the Internet of Things. Preprints, https://doi.org/10.20944/preprints201904.0133.v1
Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains
Journal Article
D Ani, U., M Watson, J., Tuptuk, N., Hailes, S., & Jawar, A. (2023). Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains. arXiv,This study explores the state-of-the-art, application, and maturity of socio-technical security models for industries and sectors dependent on CI and investigates the gap between academic research and industry practices concerning the modelling of bo... Read More about Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains.