Relevant publications from the project team
Priyanka Badva, Kopo M. Ramokapane, Eleonora Pantano, Awais Rashid (2024). Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber Defense. USENIX Security Symposium 2024. https://www.usenix.org/conference/usenixsecurity24/presentation/badva
Eleni Philippou, Sylvain Frey, Awais Rashid (2020). Contextualising and aligning security metrics and business objectives: A GQM-based methodology. Computers & Security 88. https://doi.org/10.1016/j.cose.2019.101634
Awais Rashid, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew Edwards, Ruzanna Chitchyan, Muhammad Ali Babar (2016). Discovering “unknown known” security requirements. Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016, pp. 866-876. https://doi.org/10.1145/2884781.2884785
Neeraj Suri. Distributed Systems Security chapter in CyBOK (Cyber Security Body of Knowledge) https://www.cybok.org/media/downloads/Distributed_Systems_Security_issue_1.0.pdf
S. Manzoor, A. Gouglidis, M. Bradbury and N. Suri (2024). Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments in IEEE Transactions on Cloud Computing, vol. 12, no. 1, pp. 319-336, Jan.-March 2024 https://ssg.lancs.ac.uk/wp-content/uploads/IEEE_TCC_ThreatPro.pdf
J. Luna, A. Taha, R. Trapero and N. Suri (2017). Quantitative Reasoning about Cloud Security Using Service Level Agreements, in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 457-471, 1 July-Sept. 2017 https://ssg.lancs.ac.uk/wp-content/uploads/jesus-quanti.pdf