Fingerprint

Dive into the research topics where Peter Eden is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Cyber Resilience, Dependability and Security

    Mison, A., Davies, G. & Eden, P., 21 Mar 2024, Proceedings of the 19th International Conference on Cyber Warfare and Security, ICCWS 2024: University of Johannesburg South Africa 26-27 March 2024. du Toit, J. & van Niekerk, B. (eds.). Johannesburg, SA: University of Johannesburg, Vol. 19 (1). p. 177-184 8 p. (International Conference on Cyber Warfare and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    3 Downloads (Pure)
  • Determining and Sharing Risk Data in Distributed Interdependent Systems

    Burnap, P., Cherdantseva, Y., Blyth, A., Eden, P., Jones, K., Soulsby, H. & Stoddart, K., 26 Apr 2017, In: Computer. 50, 4, p. 72-79

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    30 Downloads (Pure)
  • SCADA System Forensic Analysis Within IIoT

    Eden, P., Blyth, A., Jones, K., Soulsby, H., Cherdantseva, Y., Burnap, P. & Stoddart, K., 5 Apr 2017, Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Thames, L. & Schaefer, D. (eds.). 1st ed. Springer Nature, p. 73-101 28 p. (Springer Series in Advanced Manufacturing ).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure

    Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. & Stoddart, K., 18 May 2016, Critical Information Infrastructures Security: 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers. Rome, E., Theocharidou, M. & Wolthusen, S. (eds.). Springer, p. 27-39 Chapter 3. (Lecture Notes in Computer Science; vol. 9578).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contributionpeer-review

  • A review of cyber security risk assessment methods for SCADA systems

    Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. & Stoddart, K., 1 Feb 2016, In: Computers and Security. 56, p. 1-27 27 p.

    Research output: Contribution to journalReview articlepeer-review

    Open Access
    File
    8 Citations (Scopus)
    1249 Downloads (Pure)