This directory contains informal copies of academic papers and articles by contributors to the Spyderisk project and related risk assessment topics. There are also some other written academic project deliverables such as project reports. These PDFs are referred to throughout the System Modeller tree, particularly in the Spyderisk history document, so having them locally means links always work.
Each of these papers have several authors, but only one appears in the filename which is a degree of informal attribution. We have made efforts to contact authors where relevant. The authors of papers own their own work and where possible have additionally contributed these articles under the CC-BY-SA license as described in the top-level Spyderisk LICENSES/ directory.
Local copy | Full citation |
---|---|
lopresti2004.pdf | S. Lo Presti, A. Jøsang, ‘Analysing the Relationship between Risk and Trust’, doi: 10.1007/978-3-540-24747-0_11 |
boniface2010.pdf | S. Bertram, M. Boniface, M. Surridge, N. Briscombe, M. Hall-May, ‘On-Demand Dynamic Security for Risk-Based Secure Collaboration in Clouds’, 2010 IEEE 3rd International Conference on Cloud Computing. doi: 10.1109/CLOUD.2010.83 |
surridge2010.pdf | M. Bashevoy, A. Chakravarthy, M. Hall-May, M. Surridge, ‘SERSCIS-Ont: A Formal Metrics Model for Adaptive Service Oriented Frameworks’, ADAPTIVE 2010 : The Second International Conference on Adaptive and Self-Adaptive Systems and Applications, Lisbon. doi: PENDING |
surridge2011-1.pdf | M. Hall-May, R. Nossal-Tuyeni, M. Surridge, ‘Resilient critical infrastructure management using service oriented architecture - a test case using airport collaborative decision making’, International Journal of Applied Mathematics and Computer Science. doi: 10.2478/v10006-011-0019-9 |
surridge2011.pdf | M. Surridge, A. Chakravarthy, M. Bashevoy, J. Wright, M. Hall-May, and R. Nossal, ‘SERSCIS-Ont : evaluation of a formal metric model using airport collaborative decision making’, Int. J. Adv. Intell. Syst., vol. 4, no. 3, Art. no. 3, Apr. 2012. doi: 10.5258/SOTON/P1129 |
chakravarthy2012.pdf | M. Surridge, A. Chakravarthy, M. Hall-May, X. Chen, B. Nasse, R. Nossal, ‘SERSCIS: Semantic modelling of dynamic, multi-stakeholder systems’, SIDs 2012 - Proceedings of the SESAR Innovation Days. doi: PENDING |
surridge2013.pdf | M. Surridge, B. Nasser, X. Chen, A. Chakravarthy, and P. Melas, ‘Run-Time Risk Management in Adaptive ICT Systems’, in 2013 International Conference on Availability, Reliability and Security, Sep. 2013, pp. 102–110. doi: 10.1109/ARES.2013.20 |
shadbold2015.pdf | N. Shadbolt, P. Smart, ‘Knowledge Elicitation: Methods, Tools and Techniques’, In, Wilson, John R and Sharples, Sarah (eds.) Evaluation of Human Work. Boca Raton, Florida, USA. CRC Press, pp. 163-200. ePrints Soton id 359638 |
surridge2018.pdf | M. Surridge et al., ‘Trust Modelling in 5G mobile networks’, in Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, in SecSoN ’18. New York, NY, USA: Association for Computing Machinery, Aug. 2018, pp. 14–19. doi: 10.1145/3229616.3229621 |
surridge2019.pdf | M. Surridge et al., ‘Modelling Compliance Threats and Security Analysis of Cross Border Health Data Exchange’, in New Trends in Model and Data Engineering, C. Attiogbé, F. Ferrarotti, and S. Maabout, Eds., in Communications in Computer and Information Science. Cham: Springer International Publishing, 2019, pp. 180–189. doi: 10.1007/978-3-030-32213-7_14 |
surridge2019-2.pdf | L. Goeke, K. Meacham, N. G. Mohammadi, M. Surridge, S. Wiegand, T. Wilkinson, ‘RestAssured Security and Privacy Engineering’, External Report. doi: PENDING |
surridge2020.pdf | D. Ayed, E. Jaho, C. Lachner, Z. Mann, R. Seidl, M. Surridge, ‘FogProtect: Protecting Sensitive Data in the Computing Continuum’, Advances in Service-Oriented and Cloud Computing - International Workshops of ESOCC 2020. doi: 10.1007/978-3-030-71906-7_17. |
pickering2021.pdf | B. Pickering, C. Boletsis, R. Halvorsrud, S. Phillips, and M. Surridge, ‘It’s Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness’, in HCI for Cybersecurity, Privacy and Trust, A. Moallem, Ed., in Lecture Notes in Computer Science. Cham: Springer International Publishing, 2021, pp. 337–352. doi: 10.1007/978-3-030-77392-2_22 |
taylor2021.pdf | L. Carrascal, K. Meacham, P. Melas, F. Rendon, M. Surridge, S. Taylor, S. Senior, ‘Data protection toolkit reducing risks in hospitals and care centers: Release of risk assessment tools.’, doi: 10.3030/826284 - Results tab / Deliverables / Other. |
phillips2021.pdf | Stephen C. Phillips, Mike Surridge, Chloe Yong, ‘Spyderisk Risk Assessment Software and its Knowledgebase.’ |
boletsis2022.pdf | C. Boletsis, R. Halvorsrud, J. Pickering, S. Phillips, and M. Surridge, ‘Cybersecurity for SMEs: Introducing the Human Element into Socio-technical Cybersecurity Risk Assessment’, presented at the 12th International Conference on Information Visualization Theory and Applications, Jul. 2022, pp. 266–274. doi: 10.1007/978-3-030-77392-2_22 |
taylor2022.pdf | N. Goetze, K. Meacham, P. Melas, S. Phillips, S. Senior, M. Surridge, S. Taylor, ‘Dynamic Risk Management Tools: Final Prototypes and Technical Report’, FogProtect Project. doi: 10.3030/871525 - Results tab / Deliverables / Documents and reports. |
phillips2023.pdf | Stephen C. Phillips, Mike Surridge, Steve Taylor, Ken Meacham, Panos Melas, ‘Spyderisk Risk Assessment Software and its Knowledgebase.’ |
smart2023.pdf | J. Aslam, M. Boniface, Jarwar Aslam, P. Smart, J. Watson, ‘Secure Ontologies for Internet of Things Systems (SOfIoTS)’, report and recommendations for PETRAS National Centre of Excellence in IoT Systems Cybersecurity. doi: PENDING |
smart2024.pdf | M. Boniface, N. Fair, P. Smart, ‘Biomedical Burden Ontology: Ontology Documentation’, report for NHS and partners, IT Innovation Centre, University of Southampton, Southampton, UK. doi: PENDING |
smart2024-2.pdf | R. Clowes, R. Heersmink, P. Smart, ‘The Ethics of the Extended Mind: Mental Privacy, Manipulation and Agency’, doi:10.1007/978-3-662-68362-0_2 |
phillips2024.pdf | M. Boniface, S. Modafferi, S. C. Phillips, M. Surridge, S. Taylor, ‘Automated Knowledge-Based Cybersecurity Risk Assessment of Cyber-Physical Systems’, IEEE Access. doi:10.1109/ACCESS.2024.3404264 |