Items where Author is "Kearney, Paul"

Up a level
Export as [feed] RSS
Group by: Item Type | No Grouping
Number of items: 34.

Article

Phillips, Amas and Maple, Carsten and Lukavsky, Florian and Pearson, Ian and Richardson, Michael and Hanson, Nigel and Kearney, Paul and Dobson, Robert (2023) Software Bills of Materials for IoT and OT devices. IoT Security Foundation.

Nagunwa, Thomas and Kearney, Paul and Fouad, Shereen (2022) A machine learning approach for detecting fast flux phishing hostnames. Journal of Information Security and Applications, 65. p. 103125. ISSN 2214-2126

Ghahremanlou, Lida and Tawil, Abdel-Rahman H. and Kearney, Paul and Zhao, Xia and Nevisi, Hossein and Abdallah, Ali E. (2018) A Survey of Open Data Platforms in Six UK Smart City Initiatives. The Computer Journal. ISSN Online ISSN 1460-2067 Print ISSN 0010-4620

Pavlidis, M. and Islam, S. and Mouratidis, H and Kearney, Paul (2014) Modeling Trust Relationships for Developing Trustworthy Information Systems. International Journal of Information Systems Modeling and Design, 5 (1). pp. 25-48.

Book Section

Kearney, Paul (2020) IoT Security: experience is an expensive teacher. In: Internet of Things: from Data to Insight. Wiley, pp. 107-120. ISBN ISBN: 978-1-119-54526-2

Kearney, Paul and Sinclair, D. and Wagner, S. (2014) Security Design Patterns in the MASTER Workbench. In: Cyberpatterns: Unifiying Design Patterns with Security and Attack Patterns. Springer. ISBN 978-3-319-04446-0

Kearney, Paul (2012) Towards a C2I Platform for Combating the Cyber-threat. In: Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems. Security and Cryptology Series . Springer. ISBN 978-3-642-30955-7

Conference or Workshop Item

Kearney, Paul (2023) Is Agile Certification an Oxymoron? In: IoT Security Foundation annual conference, 2022, 5th October 2022, London, UK.

Kearney, Paul (2022) Thoughts on the future of IoT security assurance and certification. In: AESIN Automotive Security Conference, 20th July 2022, Coventry. (Unpublished)

Adaros-Boye, Carolina and Kearney, Paul and Josephs, Mark and Ulmer, Hans (2021) An Indicators-of-Risk Library for Industrial Network Security. In: International Workshop on SecRS: Secure and resilient smart manufacturing environments (SecRS), ARES 2021 Virtual Conference.

Muhammad, Mujahid and Kearney, Paul and Aneiba, Adel and Arshad, Junaid and Kunz, Andreas (2021) RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications. In: 18th International Conference on Security and Cryptography SECRYPT 2021, 6-8th July 2021, online streaming.

Muhammad, Mujahid and Kearney, Paul and Aneiba, Adel and Kunz, Andreas (2021) Efficient Distribution of Key Chain Commitments for Broadcast Authentication in V2V Communications. In: VTC2020-Fall, 18th November - 16h December 2020, Victoria, BC, Canada.

Adaros-Boye, Carolina and Kearney, Paul and Josephs, Mark (2020) Continuous Risk Management for Industrial IoT: a Methodological View. In: 14th International Conference on Risk and Security of Internet and Systems, 29th to 31st of October, 2019, Hammamet, Tunisia.

Kearney, Paul (2019) Can IoT security risk management be made simple? In: IoT Security Foundation annual conference, 2019, 26th November 2019, London, UK.

Kearney, Paul and Asal, Rasool (2019) ERAMIS: A Reference Architecture-based Methodology for IoT Systems. In: IEEE Service, 8-13th July 2019, Milan, Italy.

Muhammad, Mujahid and Kearney, Paul and Aneiba, Adel and Kunz, Andreas (2019) Analysis of Security Overhead in Broadcast V2V Communications. In: The 2nd International Workshop on Safety, Security, and Privacy in Automotive Systems (STRIVE 2019), 10th September, 2019, Turku, Finland.

Adaros Boye, Carolina and Kearney, Paul and Josephs, Mark (2018) Collective responsibility and mutual coercion in IoT botnets: a tragedy of the commons problem. In: International Workshop on Behavioral Analysis for System Security - BASS 2018, 26 to 28 of July, 2018, Porto.

Adaros Boye, Carolina and Kearney, Paul and Josephs, Mark (2018) Cyber-risks in the Industrial Internet of Things (IIoT): towards a method for continuous assessment. In: 21st Information Security Conference ISC 2018, 9 to 12 September, 2018, Guildford.

Ghirardello, Kevin and Maple, Carsten and Ng, Daniel and Kearney, Paul (2018) Cyber Security of Smart Homes: Development of a Reference Architecture for Attack Surface Analysis. In: Living in the Internet of Things: A PETRAS, IoTUK & IET Conference, Forum & Exhibition, 28th-29th March 2018, London, UK.

Wang, Xiao-Si and Herwono, Ian and Di Cerbo, Francesco and Kearney, Paul and Shackleton, Mark (2018) Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services. In: 4th IEEE Workshop on Security and Privacy in the Cloud, 30th May 2018, Beijing, China.

Kearney, Paul (2018) Towards an EBTIC IoT Security Reference Architecture. In: UAE Cybersecurity Symposium 2018, 25th April 2018, Khalifa University, Abu Dhabi, UAE. (Unpublished)

Kearney, Paul (2018) Cybersecurity at Scale: Securing Government Digital Services. In: Second National Digital Transformation Conference, 12th-13th March 2018, Beirut, Lebanon. (Unpublished)

Kearney, Paul (2017) Building-in Cyber Security, Usability and Inter-Operability. In: First National Digital Government Conference, 4th-5th May 2017, Beirut, Lebanon. (Unpublished)

Doyle, Kenny and Dooly, Zeta and Kearney, Paul (2015) What’s So Unique About Cyber Security? In: 4th Cybersecurity & Privacy Innovation Forum, Brussels.

Cui, Z and Herwono, I and Kearney, Paul (2013) Multi-Stage Attack Modelling: your new weapon against sophisticated cyber attacks. In: CyberPatterns, 8-9 July, Abingdon.

Pavlidis, M. and Mouratidis, H. and Islam, S. and Kearney, Paul (2012) Dealing with Trust and Control A Meta-Model for Trustworthy Information Systems Development. In: Sixth International Conference on Research Challenges in Information Science, 16-18 May, Valencia.

Kearney, Paul (2012) How real is the cyber-threat? In: Community Resilience Current Issues Conference, Edinburgh.

Brücker, A.D. and Brügger, L. and Kearney, Paul and Wolff, B. (2011) An Approach to Modular and Testable Security Models of Real-world Health-Care Applications. In: ACM Symposium on Access control Models and Technologies, 21-23 June, Indianapolis.

Brücker, A.D. and Brügger, L. and Kearney, Paul and Wolff, B. (2010) Verified firewall policy transformations for test case generation. In: Third Conference on Software Testing, Verification and Validation, Paris.

Other

Day, Jeff and Kearney, Paul and Moor, John and Marshall, Richard and Bott, Andrew and Poyner, Ian (2021) Vulnerability Disclosure: Best Practice Guidelines. IoT Security Foundation.

Kearney, Paul (2015) Breaking down barriers to security innovation’ BT Global Services Let’s Talk Security blog site. BT.

Kearney, Paul (2015) Three reasons we really need innovation in cyber security. BT.

Kearney, Paul (2013) Should you get your retaliation in first? BT.

Kearney, Paul (2012) Of blunt instruments and sharp practices. European Union.

This list was generated on Thu May 16 07:38:39 2024 UTC.

Research

In this section...