Joseph Gardiner
Joseph Gardiner
University of Bristol; Lancaster University
Verified email at
Cited by
Cited by
On the Security of Machine Learning in Malware C&C Detection: A Survey
J Gardiner, S Nagaraja
ACM Computing Surveys (CSUR) 49 (3), 59, 2016
Command & Control: Understanding, Denying and Detecting
J Gardiner, M Cova, S Nagaraja
CoRR, 2014
Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds
J Gardiner, B Craggs, B Green, A Rashid
ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC). ACM Press, 2019
Everything is Awesome! Or is it?: Cyber Security Risks in Critical Infrastructure
A Rashid, J Gardiner, B Green, B Craggs
SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools
E Samanis, J Gardiner, A Rashid
Proceedings of the 17th International Conference on Availability …, 2022
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures
RJ Thomas, J Gardiner, T Chothia, E Samanis, J Perrett, A Rashid
Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 49-60, 2020
Blindspot: Indistinguishable Anonymous Communications
J Gardiner, S Nagaraja
arXiv preprint arXiv:1408.0784, 2014
On the reliability of network measurement techniques used for malware traffic analysis
J Gardiner, S Nagaraja
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014
StegChat: A Synonym-Substitution Based Algorithm for Text Steganography
J Gardiner, S Nagaraja
Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farming
S Agarwal, A Rashid, J Gardiner
Proceedings of the 15th Workshop on Cyber Security Experimentation and Test, 1-9, 2022
Security Threats in Electric Vehicle Charging
A Ahalawat, S Adepu, J Gardiner
2022 IEEE International Conference on Communications, Control, and Computing …, 2022
Threat Models over Space and Time: A Case Study of E2EE Messaging Applications
PD Chowdhury, M Sameen, J Blessing, N Boucher, J Gardiner, T Burrows, ...
arXiv preprint arXiv:2301.05653, 2023
Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems
J Gardiner, A Eiffert, P Garraghan, N Race, S Nagaraja, A Rashid
Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 63-68, 2021
Adaptive Cyber Security for Critical Infrastructure
E Samanis, J Gardiner, A Rashid
2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS …, 2022
Building A privacy testbed: Use cases and design considerations
J Gardiner, P Das Chowdhury, J Halsey, M Tahaei, T Elahi, A Rashid
Computer Security. ESORICS 2021 International Workshops: CyberICPS, SECPRE …, 2022
Technical Report: Gone in 20 Seconds--Overview of a Password Vulnerability in Siemens HMIs
J Gardiner, A Rashid
arXiv preprint arXiv:2009.03961, 2020
RESTful HTTPS over Zigbee: Why and how?
SY Lim, J Gardiner, B Craggs, A Rashid
6th International Symposium for ICS & SCADA Cyber Security Research 2019 6 …, 2019
The Internet of Insecure Cows-A Security Analysis of Wireless Smart Devices Used for Dairy Farming
S Barnes-Thornton, J Gardiner, A Rashid
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 67-73, 2023
A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts
F Shahbi, J Gardiner, S Adepu, A Rashid
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023
Decisions & Disruptions 2: Decide Harder
B Shreeve, J Gardiner, J Hallett, D Humphries, A Rashid
arXiv preprint arXiv:2306.12168, 2023
The system can't perform the operation now. Try again later.
Articles 1–20