PUBLICATIONS
[2] Cherdantseva Y. “The Social Network: Be On The Safe Side!”. May 2011. FULL TEXT IN PDF AVAILABLE HERE. Published by Gair Rhydd on 6th February 2012.
[4] Cherdantseva Y. and Hilton J. "Information Security and Information Assurance. The Discussion about the Meaning, Scope and Goals,” In: F. Almeida, and I. Portela (eds.), Organizational, Legal, and Technological Dimensions of IS Administrator. IGI Global Publishing. September, 2014.
[5] Cherdantseva Y. and Hilton J. "The 2011 Survey of Information Security and Information Assurance Professionals: Findings,” In: F. Almeida, and I. Portela (eds.), Organizational, Legal, and Technological Dimensions of IS Administrator. IGI Global Publishing. 2014.
[6] Cherdantseva, Y.; Hilton, J., "A Reference Model of Information Assurance & Security," Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, pp.546-555, 2-6 Sept. 2013 doi: 10.1109/ARES.2013.72 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6657288&isnumber=6657192
[7] Cherdantseva, Y.: "Secure*BPMN - a graphical extension for BPMN 2.0 based on a Reference Model of Information Assurance & Security", PhD THESIS. CARDIFF UNIVERSITY. UK. 2014.
The full text of the thesis is available at ORCA: http://orca.cf.ac.uk/74432.
NOTE: This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
[8] Eden, P., Blyth, A., Burnap, Cherdantseva, Y., P., Jones, K., Soulsby, H., Stoddart, K. A forensic taxonomy of SCADA systems and approach to incident response. Proceedings of the 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015).
[9] Eden, P., Blyth, A., Burnap, Cherdantseva, Y., P., Jones, K., Soulsby, H., Stoddart, K. A Cyber Forensic Taxonomy for SCADA systems in Critical Infrastructure. Critical Information Infrastructures Security. Volume 9578 of the series Lecture Notes in Computer Science, pp 27-39. 2016.
[10] Cherdantseva, Y., Burnap P., Blyth, A., Eden, P., Jones, K., Soulsby, H., Stoddart, K.: "A Review of cyber security risk assessment methods for SCADA systems" . Computers & Security. Volume 56, February 2016, pp. 1-27. OPEN ACCESS. Received 19 May 2015, Revised 18 September 2015, Accepted 29 September 2015 2015.
[11] Cherdantseva, Y., Hilton, J., Rana, O., Ivins, W.: "A Multifaceted Evaluation of the Reference Model of Information Assurance & Security" . Computers & Security. 2016. Received at Editorial Oce: 14 Jun 2016. Article revised: 14 Sep 2016. Accepted for publication on 20 Sep 2016. Authors' Post-Print Version is available here.
TALKS and WORKSHOPS
[3].
FTS, COMSC, Cardiff University (28th Feb 2012)
Privacy from the perspective of 2012
[5].
Invited Lecture, COMSC, Cardiff University
(30th March 2012)
Year 2, CM2206 Business Strategy and IS
Information Security as an integral part of corporate governance.
The Business Model for Information Security
Presentation is available in pdf.
Tutorial: The Business Model for Information Security
[6]. 4th International Workshop on the Business Process Model and Notation
(BPMN) 2012 - WU Vienna, Austria
(12-13 September 2012)
Towards SecureBPMN - Aligning BPMN with the Information Assurance & Security Domain
At www.springerlink.com
[7]. Invited Talk, COMSC, Cardiff University
(12 November 2012)
Informatics seminar
A Four-Dimensional Refence Model of Information Assurance & Security
[8].
Invited Lecture and Workshop, COMSC, Cardiff University
(13th December 2012)
MSc Security and Privacy
A Four-Dimensional Refence Model of Information Assurance & Security
Workshop: A Four-Dimensional Refence Model of Information Assurance & Security and its application to the Translate case-study
[9].
Invited Lecture and Workshop, Cranfield University
(26 February 2013)
MSc Cyber Defence and Information Assurance
A Four-Dimensional Refence Model of Information Assurance & Security
Workshop: A Four-Dimensional Refence Model of Information Assurance & Security and its application to the Translate case-study
[10].
Software Engineering Research Group (SERG) Monthly Seminars, University of West of England (UWE), Bristol, UK
(3 April 2013)
A Four-Dimensional Refence Model of Information Assurance & Security
[11].
Software Engineering Research Group (SERG) Monthly Seminars, University of West of England (UWE), Bristol, UK
(6 November 2013)
Secure*BPMN - extending BPMN 2.0 with the Information Assurance and Security modelling capabilities
[12].
Invited Talk, COMSC, Cardiff University
(21st December 2013)
MSc Security and Privacy
BPMN 2.0 - Introduction
[13].
Invited Talk and Workshop, COMSC, Cardiff University
(21st December 2013)
MSc Security and Privacy
Secure*BPMN - extending BPMN 2.0 with the Information Assurance and Security modelling capabilities