default search action
Kevin I. Jones
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j9]Kevin I. Jones, Helge Janicke, Leandros Maglaras, Christos Xenakis:
Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems". J. Inf. Secur. Appl. 54: 102542 (2020)
2010 – 2019
- 2019
- [j8]Lee Hadlington, Masa Popovac, Helge Janicke, Iryna Yevseyeva, Kevin I. Jones:
Exploring the role of work identity and work locus of control in information security awareness. Comput. Secur. 81: 41-48 (2019) - [j7]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros A. Maglaras:
Developing cyber peacekeeping: Observation, monitoring and reporting. Gov. Inf. Q. 36(2): 276-293 (2019) - 2018
- [j6]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros Maglaras:
An introduction to cyber peacekeeping. J. Netw. Comput. Appl. 114: 70-87 (2018) - [j5]Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Defence Mechanisms for Public Systems. EAI Endorsed Trans. Security Safety 4(13): e1 (2018) - [i4]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros Maglaras:
Developing Cyber Peacekeeping: Observation, Monitoring and Reporting. CoRR abs/1806.02608 (2018) - [i3]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros Maglaras:
Developing Cyber Buffer Zones. CoRR abs/1812.11900 (2018) - 2017
- [j4]Kevin I. Jones, Helge Janicke, Christian Facchi, Leandros A. Maglaras:
Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security". J. Inf. Secur. Appl. 34: 152 (2017) - [j3]Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems. EAI Endorsed Trans. Security Safety 4(12): e1 (2017) - [e4]Leandros A. Maglaras, Helge Janicke, Kevin I. Jones:
Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 - November 1, 2016, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 188, 2017, ISBN 978-3-319-52568-6 [contents] - [i2]Michael Robinson, Kevin I. Jones, Helge Janicke:
An Introduction to Cyber Peacekeeping. CoRR abs/1710.09616 (2017) - [i1]Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin I. Jones, Helge Janicke:
Internet of Cloud: Security and Privacy issues. CoRR abs/1711.00525 (2017) - 2016
- [j2]Helge Janicke, Kevin I. Jones, Leandros A. Maglaras:
Security, Privacy and Trust in Cyber Physical Systems. EAI Endorsed Trans. Security Safety 3(7): e1 (2016) - [c5]Andrew Wain, Stephan Reiff-Marganiec, Kevin I. Jones, Helge Janicke:
Towards a Distributed Runtime Monitor for ICS/SCADA Systems. ICS-CSR 2016 - 2015
- [j1]Michael Robinson, Kevin I. Jones, Helge Janicke:
Cyber warfare: Issues and challenges. Comput. Secur. 49: 70-94 (2015) - [c4]Ying He, Leandros A. Maglaras, Helge Janicke, Kevin I. Jones:
An Industrial Control Systems incident response decision framework. CNS 2015: 761-762 - [e3]Helge Janicke, Kevin I. Jones:
3rd International Symposium for ICS & SCADA Cyber Security Research 2015, ICS-CSR 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany. Workshops in Computing, BCS 2015 [contents] - 2014
- [e2]Helge Janicke, Kevin I. Jones:
2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria. Workshops in Computing, BCS 2014, ISBN 978-1-78017-286-6 [contents] - 2013
- [e1]Helge Janicke, Kevin I. Jones:
1st International Symposium for ICS & SCADA Cyber Security Research 2013, ICS-CSR 2013, 16-17 September 2013, Leicester, UK. Workshops in Computing, BCS 2013, ISBN 978-1-780172-32-3 [contents] - 2010
- [b1]Kevin I. Jones:
A trust based approach to mobile multi-agent systems. De Montfort University, Leicester, UK, 2010
2000 – 2009
- 2009
- [c3]Kevin I. Jones, Helge Janicke, Antonio Cau:
A Property Based Framework for Trust and Reputation in Mobile Computing. AINA Workshops 2009: 1031-1036 - 2006
- [c2]Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan, Kevin I. Jones:
A Compositional Event & Time-Based Policy Model. POLICY 2006: 173-182 - 2005
- [c1]Helge Janicke, François Siewe, Kevin I. Jones, Antonio Cau, Hussein Zedan:
Analysis and Run-Time Verification of Dynamic Security Policies. DAMAS 2005: 92-103
Coauthor Index
aka: Leandros A. Maglaras
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint