Follow
Richard Derbyshire
Title
Cited by
Cited by
Year
An analysis of cyber security attack taxonomies
R Derbyshire, B Green, D Prince, A Mauthe, D Hutchison
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2018
492018
“Talking a Different Language”: Anticipating Adversary Attack Cost for Cyber Risk Assessment
R Derbyshire, B Green, D Hutchison
Computers & Security, 102163, 2020
302020
PCaaD: Towards Automated Determination and Exploitation of Industrial Systems
B Green, R Derbyshire, M Krotofil, W Knowles, D Price, N Suri
Computers & Security, 102424, 2021
272021
ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource
B Green, R Derbyshire, W Knowles, J Boorman, P Ciholas, D Prince, ...
13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020
252020
Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool
S Maesschalck, A Staves, R Derbyshire, B Green, D Hutchison
Computers & Security 127, 103116, 2023
11*2023
Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment
RJ Derbyshire
PQDT-Global, 2022
42022
Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and Guidelines
A Staves, S Maesschalck, R Derbyshire, B Green, D Hutchison
2023 IFIP Networking Conference (IFIP Networking), 1-6, 2023
12023
Dead Man's PLC: Towards Viable Cyber Extortion for Operational Technology
R Derbyshire, B Green, C van der Walt, D Hutchison
arXiv preprint arXiv:2307.09549, 2023
2023
To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source Initiative
R Derbyshire, S Maesschalck, A Staves, B Green, D Hutch
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–9