Christopher Williams

Affiliations:
  • Defence Science and Technology Laboratory, Porton Down, UK


According to our database1, Christopher Williams authored at least 24 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2022
Assessing system of systems information security risk with OASoSIS.
Comput. Secur., 2022

2021
ProFact: A Provenance-Based Analytics Framework for Access Control Policies.
IEEE Trans. Serv. Comput., 2021

2019
A normative decision-making model for cyber security.
Inf. Comput. Secur., 2019

Methods and Tools for Policy Analysis.
ACM Comput. Surv., 2019

2018
The Challenge of Access Control Policies Quality.
ACM J. Data Inf. Qual., 2018

System of Systems Characterisation assisting Security Risk Assessment.
Proceedings of the 13th Annual Conference on System of Systems Engineering, 2018

Assessing System of Systems Security Risk and Requirements with OASoSIS.
Proceedings of the 5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2018

OpenSDC: A Novel, Generic Datapath for Software Defined Coalitions.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Rationalising Decision Making about Risk: A Normative Approach.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Policy Support for Autonomous Swarms of Drones.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

2017
Improving Security in Coalition Tactical Environments Using an SDN Approach.
Proceedings of the Guide to Security in SDN and NFV, 2017

Towards an architecture for policy-based management of software defined coalitions.
Proceedings of the 2017 IEEE SmartWorld, 2017

Generative policy model for autonomic management.
Proceedings of the 2017 IEEE SmartWorld, 2017

Next generation firewalls for dynamic coalitions.
Proceedings of the 2017 IEEE SmartWorld, 2017

Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Provenance-Based Analytics Services for Access Control Policies.
Proceedings of the 2017 IEEE World Congress on Services, 2017

A Requirements Traceability Approach to Support Mission Assurance and Configurability in the Military.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2017

From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017

System design considerations for risk perception.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission Network.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2015
Distributed analytics and information science.
Proceedings of the 18th International Conference on Information Fusion, 2015

2014
Mission Assurance through Requirements Traceability.
Proceedings of the 2014 IEEE Military Communications Conference, 2014


  Loading...