Hugh Soulsby is a Member of the Institution of Engineering and Technology.
Kristan Stoddart gained his Ph D from Swansea University, UK in 2006.
The data analysis uses control charts to map the deviations from the mean of each probe.
Two methods for aggregating the results in a certain area are then proposed.
Her research has been concerned with the integration of security into business process models, security knowledge representation and risk assessment in SCADA systems.
Peter Burnap holds a Ph D degree in Computer Science from Cardiff University, UK.
We describe the essence of the methods and then analyse them in terms of aim; application domain; the stages of risk management addressed; key risk management concepts covered; impact measurement; sources of probabilistic data; evaluation and tool support.
We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system.From 1985 to 1991 he worked as an Assembly Integration and Test Engineer on Satellites for Bae, moving to Measurement Technology Limited as a Test Development and Design Engineer until 2001.During 2001–2003 he worked for Peak Production Engineering.Over the past 20 years he has published many papers on the subject of Cyber Security and Computer Forensics. Sc.(Hons) degree in computer forensics from the University of South Wales (USW), Pontypridd, Wales in 2014.Professor Blyth also has function as an expert witness for various law enforcement agencies. In 2014, he joined the Information Security Research Group, University of South Wales School of Computing Engineering and Science, as a Research Assistant.