Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daniel Prince is active.

Publication


Featured researches published by Daniel Prince.


workshop on cyber physical systems | 2015

The Impact of Social Engineering on Industrial Control System Security

Benjamin Green; Daniel Prince; J S Busby; David Hutchison

In assessing the security posture of Industrial Control Systems (ICS), several approaches have been proposed, including attack graphs, attack trees, Bayesian networks and security ideals. Predominantly focusing on technical vulnerabilities, challenges stemming from social and organisational factors are often reviewed in isolation, if at all. Taking a mean time-to-compromise (MTTC) metric as a base for expansion, we explore the impact social engineering attack vectors (malicious e-mails) could have on such assessments. The applied method takes a holistic view, to better understand the potential impact of social engineering across a small European utility company. The results of this review are analysed and discussed, highlighting the level of access an attacker could gain through social engineering, and the need for assessment metrics to include vulnerabilities stemming not only from technical factors, but social and organisational ones as well.


Global Discourse | 2018

Securitization and the global politics of cybersecurity

Mark Lacy; Daniel Prince

In ‘Digital disaster, cyber security, and the Copenhagen school’, published in 2009, Lene Hansen and Helen Nissenbaum suggest ways in which securitization theory can help understand the politics of cybersecurity and cyberwar. What was significant about Hansen and Nissenbaum’s article was the way it attempted to add new approaches and questions to a topic that tended to occupy a space in an often highly technical discourse of security, technology and strategy, a discourse that extended in to all aspects of life in a digitizing society. This article asks: What should international relations scholars be doing in addition to the challenge and task – to become more interdisciplinary in order to be able to engage with the potential technification and hypersecuritizations of cybersecurity policy and discourse – that was set out in Hansen and Nissenbaum’s article?


Lecture Notes in Computer Science | 2003

On Demand Network Level Service Deployment in Ad Hoc Networks

Daniel Prince; Andrew Scott; William Shepherd

Many network level services such as routing, auto-addressing and, security have been proposed for ad hoc networks. Each has characteristics that may cause it to outperform similar services under different network conditions; therefore the choice of optimal services depends on the network deployment. Furthermore, since ad hoc network groups may be mobile it is probable that networks operating different or varying service implementations will interact. This paper presents work to provide dynamic, on demand network service selection and deployment, with minimal user interaction, in ad hoc networks.


IEEE Computer | 2018

Cybersecurity: The Security and Protection Challenges of Our Digital World

Daniel Prince

Once the domain of national agencies empowered to protect civil society and support intelligence missions, cybersecurity is now the pervasive technical, social, and economic issue. It affects all aspects of our daily life and organizational functions. From financial institutions to smart homes, and from the classroom to the doctor’s office, we are in a cyber arms race to protect ourselves from those driven to do us harm.


workshop on cyber physical systems | 2017

How Long is a Piece of String:: Defining Key Phases andObserved Challenges within ICS Risk Assessment

Benjamin Green; Daniel Prince; J S Busby; David Hutchison

The numbers and severity of global cyber security attacks on Industrial Control Systems have increased over recent years. However, there are also significant efforts to improve defensive capabilities. While comprehensive reviews of risk assessment efforts exist, little detail is currently available on how they are being applied by security practitioners. This paper provides a summary of the approaches adopted by security practitioners, outlining key phases applied to risk assessment, application of existing predefined methodologies, and challenges faced throughout the overall process.


International Journal of Critical Infrastructure Protection | 2015

A survey of cyber security management in industrial control systems

William Knowles; Daniel Prince; David Hutchison; Jules Ferdinand Pagna Disso; Kevin Jones


Archive | 2014

Design and construction of an Industrial Control System testbed

Benjamin Green; Ben Paske; David Hutchison; Daniel Prince


ICS-CSR 2014 Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research 2014 | 2014

Socio-Technical Security Analysis of Industrial Control Systems (ICS)

Benjamin Green; Daniel Prince; Utz Roedig; J S Busby; David Hutchison


ICS-CSR 2013 Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research 2013 | 2013

Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research

William Knowles; Daniel Prince; David Hutchison; Jules Ferdinand Pagna Disso; Kevin Jones


Archive | 2013

Small business cyber security workshop 2013 : towards digitally secure business growth

Daniel Prince; Nick King

Collaboration


Dive into the Daniel Prince's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge