Richard McEvoy
Orcid: 0000-0001-7322-4257Affiliations:
- Norwegian University for Science and Technology, Gjøvik, Norway
- DXC Technology, Aldershot, UK
According to our database1,
Richard McEvoy
authored at least 18 papers
between 2008 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2021
Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021), 2021
2020
An Accimap Waiting to Happen: Using Multi-Coding Frameworks to Accelerate Risk Analysis and Management.
Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020), 2020
2019
Deriving Cyber Security Risks from Human and Organizational Factors - A Socio-technical Approach.
Complex Syst. Informatics Model. Q., 2019
Cassandra's Calling Card: Socio-technical Risk Analysis and Management in Cyber Security Systems.
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019
2018
Proceedings of the 4th International Workshop on Socio-Technical Perspective in IS development (STPIS'18) co-located with 30th International Conference on Advanced Information Systems Engineering (CAiSE 2018), 2018
2016
Proceedings of the International Conference on Military Communications and Information Systems, 2016
2014
Proceedings of the Critical Information Infrastructures Security, 2014
2013
Context-based anomaly detection in critical infrastructures: a study in distributed systems.
PhD thesis, 2013
Int. J. Crit. Infrastructures, 2013
2012
Proceedings of the Critical Infrastructure Protection VI, 2012
Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012
2011
Proceedings of the Critical Infrastructure Protection V, 2011
Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.
Proceedings of the Critical Information Infrastructure Security, 2011
2010
Proceedings of the Information Security, 2010
Proceedings of the Critical Infrastructure Protection IV, 2010
Proceedings of the Critical Information Infrastructures Security, 2010
2009
Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2009
2008
Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008