Skip to content

Latest commit

 

History

History
41 lines (37 loc) · 7.9 KB

README.md

File metadata and controls

41 lines (37 loc) · 7.9 KB

Papers and articles

This directory contains informal copies of academic papers and articles by contributors to the Spyderisk project and related risk assessment topics. There are also some other written academic project deliverables such as project reports. These PDFs are referred to throughout the System Modeller tree, particularly in the Spyderisk history document, so having them locally means links always work.

Attribution and copyright

Each of these papers have several authors, but only one appears in the filename which is a degree of informal attribution. We have made efforts to contact authors where relevant. The authors of papers own their own work and where possible have additionally contributed these articles under the CC-BY-SA license as described in the top-level Spyderisk LICENSES/ directory.

Local copy Full citation
lopresti2004.pdf S. Lo Presti, A. Jøsang, ‘Analysing the Relationship between Risk and Trust’, doi: 10.1007/978-3-540-24747-0_11
boniface2010.pdf S. Bertram, M. Boniface, M. Surridge, N. Briscombe, M. Hall-May, ‘On-Demand Dynamic Security for Risk-Based Secure Collaboration in Clouds’, 2010 IEEE 3rd International Conference on Cloud Computing. doi: 10.1109/CLOUD.2010.83
surridge2010.pdf M. Bashevoy, A. Chakravarthy, M. Hall-May, M. Surridge, ‘SERSCIS-Ont: A Formal Metrics Model for Adaptive Service Oriented Frameworks’, ADAPTIVE 2010 : The Second International Conference on Adaptive and Self-Adaptive Systems and Applications, Lisbon. doi: PENDING
surridge2011-1.pdf M. Hall-May, R. Nossal-Tuyeni, M. Surridge, ‘Resilient critical infrastructure management using service oriented architecture - a test case using airport collaborative decision making’, International Journal of Applied Mathematics and Computer Science. doi: 10.2478/v10006-011-0019-9
surridge2011.pdf M. Surridge, A. Chakravarthy, M. Bashevoy, J. Wright, M. Hall-May, and R. Nossal, ‘SERSCIS-Ont : evaluation of a formal metric model using airport collaborative decision making’, Int. J. Adv. Intell. Syst., vol. 4, no. 3, Art. no. 3, Apr. 2012. doi: 10.5258/SOTON/P1129
chakravarthy2012.pdf M. Surridge, A. Chakravarthy, M. Hall-May, X. Chen, B. Nasse, R. Nossal, ‘SERSCIS: Semantic modelling of dynamic, multi-stakeholder systems’, SIDs 2012 - Proceedings of the SESAR Innovation Days. doi: PENDING
surridge2013.pdf M. Surridge, B. Nasser, X. Chen, A. Chakravarthy, and P. Melas, ‘Run-Time Risk Management in Adaptive ICT Systems’, in 2013 International Conference on Availability, Reliability and Security, Sep. 2013, pp. 102–110. doi: 10.1109/ARES.2013.20
shadbold2015.pdf N. Shadbolt, P. Smart, ‘Knowledge Elicitation: Methods, Tools and Techniques’, In, Wilson, John R and Sharples, Sarah (eds.) Evaluation of Human Work. Boca Raton, Florida, USA. CRC Press, pp. 163-200. ePrints Soton id 359638
surridge2018.pdf M. Surridge et al., ‘Trust Modelling in 5G mobile networks’, in Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, in SecSoN ’18. New York, NY, USA: Association for Computing Machinery, Aug. 2018, pp. 14–19. doi: 10.1145/3229616.3229621
surridge2019.pdf M. Surridge et al., ‘Modelling Compliance Threats and Security Analysis of Cross Border Health Data Exchange’, in New Trends in Model and Data Engineering, C. Attiogbé, F. Ferrarotti, and S. Maabout, Eds., in Communications in Computer and Information Science. Cham: Springer International Publishing, 2019, pp. 180–189. doi: 10.1007/978-3-030-32213-7_14
surridge2019-2.pdf L. Goeke, K. Meacham, N. G. Mohammadi, M. Surridge, S. Wiegand, T. Wilkinson, ‘RestAssured Security and Privacy Engineering’, External Report. doi: PENDING
surridge2020.pdf D. Ayed, E. Jaho, C. Lachner, Z. Mann, R. Seidl, M. Surridge, ‘FogProtect: Protecting Sensitive Data in the Computing Continuum’, Advances in Service-Oriented and Cloud Computing - International Workshops of ESOCC 2020. doi: 10.1007/978-3-030-71906-7_17.
pickering2021.pdf B. Pickering, C. Boletsis, R. Halvorsrud, S. Phillips, and M. Surridge, ‘It’s Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness’, in HCI for Cybersecurity, Privacy and Trust, A. Moallem, Ed., in Lecture Notes in Computer Science. Cham: Springer International Publishing, 2021, pp. 337–352. doi: 10.1007/978-3-030-77392-2_22
taylor2021.pdf L. Carrascal, K. Meacham, P. Melas, F. Rendon, M. Surridge, S. Taylor, S. Senior, ‘Data protection toolkit reducing risks in hospitals and care centers: Release of risk assessment tools.’, doi: 10.3030/826284 - Results tab / Deliverables / Other.
phillips2021.pdf Stephen C. Phillips, Mike Surridge, Chloe Yong, ‘Spyderisk Risk Assessment Software and its Knowledgebase.’
boletsis2022.pdf C. Boletsis, R. Halvorsrud, J. Pickering, S. Phillips, and M. Surridge, ‘Cybersecurity for SMEs: Introducing the Human Element into Socio-technical Cybersecurity Risk Assessment’, presented at the 12th International Conference on Information Visualization Theory and Applications, Jul. 2022, pp. 266–274. doi: 10.1007/978-3-030-77392-2_22
taylor2022.pdf N. Goetze, K. Meacham, P. Melas, S. Phillips, S. Senior, M. Surridge, S. Taylor, ‘Dynamic Risk Management Tools: Final Prototypes and Technical Report’, FogProtect Project. doi: 10.3030/871525 - Results tab / Deliverables / Documents and reports.
phillips2023.pdf Stephen C. Phillips, Mike Surridge, Steve Taylor, Ken Meacham, Panos Melas, ‘Spyderisk Risk Assessment Software and its Knowledgebase.’
smart2023.pdf J. Aslam, M. Boniface, Jarwar Aslam, P. Smart, J. Watson, ‘Secure Ontologies for Internet of Things Systems (SOfIoTS)’, report and recommendations for PETRAS National Centre of Excellence in IoT Systems Cybersecurity. doi: PENDING
smart2024.pdf M. Boniface, N. Fair, P. Smart, ‘Biomedical Burden Ontology: Ontology Documentation’, report for NHS and partners, IT Innovation Centre, University of Southampton, Southampton, UK. doi: PENDING
smart2024-2.pdf R. Clowes, R. Heersmink, P. Smart, ‘The Ethics of the Extended Mind: Mental Privacy, Manipulation and Agency’, doi:10.1007/978-3-662-68362-0_2
phillips2024.pdf M. Boniface, S. Modafferi, S. C. Phillips, M. Surridge, S. Taylor, ‘Automated Knowledge-Based Cybersecurity Risk Assessment of Cyber-Physical Systems’, IEEE Access. doi:10.1109/ACCESS.2024.3404264