Andrew Blyth
Andrew Blyth
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα southwales.ac.uk - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Antecedents of the people and organizational aspects of medical informatics: review of the literature
NM Lorenzi, RT Riley, AJC Blyth, G Southon, BJ Dixon
Journal of the American Medical Informatics Association 4 (2), 79-93, 1997
3241997
A review of cyber security risk assessment methods for SCADA systems
Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones, H Soulsby, ...
Computers & security 56, 1-27, 2016
2552016
The ORDIT approach to organisational requirements
JE Dobson, AJC Blyth, J Chudge, R Strens
Requirements engineering: Social and technical issues, 87-106, 1994
681994
Acquiring volatile operating system data tools and techniques
I Sutherland, J Evans, T Tryfonas, A Blyth
ACM SIGOPS Operating Systems Review 42 (3), 65-73, 2008
562008
ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements
AJC Blyth, J Chudge, JE Dobson, MR Strens
Proceedings of the conference on Organizational computing systems, 216-227, 1993
531993
What is Information Assurance?
A Blyth, GL Kovacich
Information Assurance: Security in the Information Environment, 3-15, 2006
44*2006
'Limited'Democracy in Ghana and Uganda. What Is Most Important to International Actors: Stability or Political Freedom?
J Haynes
Journal of Contemporary African Studies 19 (2), 183-204, 2001
382001
An empirical examination of the reverse engineering process for binary files
I Sutherland, GE Kalb, A Blyth, G Mulley
Computers & Security 25 (3), 221-228, 2006
252006
Penetration testing and vulnerability assessments: A professional approach
K Xynos, I Sutherland, H Read, E Everitt, AJC Blyth
School of Computer and Information Science, Security Research Centre, Edith …, 2010
242010
Cost effective management frameworks for intrusion detection systems
C Iheagwara, A Blyth, M Singhal
Journal of Computer Security 12 (5), 777-798, 2004
222004
Modelling the business process to derive organisational requirements for information technology
A Blyth
ACM SIGOIS Bulletin 16 (1), 25-33, 1995
221995
The ORDIT approach to requirements identification
JE Dobson, AJC Blyth, J Chudge, MR Strens
[1992] Proceedings. The Sixteenth Annual International Computer Software and …, 1992
211992
Information assurance: surviving in the information environment
A Blyth, GL Kovacich
Springer Science & Business Media, 2013
202013
Using stakeholders, domain knowledge, and responsibilities to specify information systems' requirements
A Blyth
Journal of Organizational Computing and Electronic Commerce 9 (4), 287-296, 1999
191999
People and organizational aspects of medical informatics.
NM Lorenzi, RT Riley, AJ Blyth, G Southon, BJ Dixon
Studies in health technology and informatics 52, 1197-1200, 1998
191998
A forensic taxonomy of SCADA systems and approach to incident response
P Eden, A Blyth, P Burnap, Y Cherdantseva, K Jones, H Soulsby
3rd International Symposium for ICS & SCADA Cyber Security Research 2015 …, 2015
182015
Evaluation of the performance of ID systems in a switched and distributed environment: the RealSecure case study
C Iheagwara, A Blyth
Computer Networks 39 (2), 93-112, 2002
182002
Xbox 360: A digital forensic investigation of the hard disk drive
K Xynos, S Harries, I Sutherland, G Davies, A Blyth
Digital Investigation 6 (3-4), 104-111, 2010
172010
Legal, regulatory, and ethical frameworks for development of standards in artificial intelligence (AI) and autonomous robotic surgery
S O'Sullivan, N Nevejans, C Allen, A Blyth, S Leonard, U Pagallo, ...
The International Journal of Medical Robotics and Computer Assisted Surgery …, 2019
162019
SCADA system forensic analysis within IIoT
P Eden, A Blyth, K Jones, H Soulsby, P Burnap, Y Cherdantseva, ...
Cybersecurity for Industry 4.0, 73-101, 2017
16*2017
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20