Richard Thomas

Publications

  1. Published

    Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story

    Tom Chothia, Andreea Radu & Richard J Thomas, 15 Aug 2017, 2017 USENIX Workshop on Advances in Security Education (ASE 17). Vancouver, BC: USENIX Association

    Research output: Chapter in Book/Report/Conference proceedingChapter

  2. Published

    Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course

    Tom Chothia, Chris Novakovic, Andreea Radu & Richard J Thomas, 27 Apr 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 141-172 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11345 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    A Formal Security Analysis of ERTMS Train to Trackside Protocols

    Tom Chothia, Joeri De Ruiter & Richard J Thomas, 15 Jun 2016, Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification. Springer, p. 53-68 Chapter 4. (Lecture Notes in Computer Science; vol. 9707).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    An attack against message authentication in the ERTMS train to trackside communication protocols

    Tom Chothia, Mihai Ordean, Joeri De Ruiter & Richard J Thomas, 2 Apr 2017, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. New York, NY, USA: Association for Computing Machinery , p. 743-756

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    TRAKS: A Universal Key Management Scheme for ERTMS

    Richard J Thomas, Mihai Ordean, Tom Chothia & Joeri De Ruiter, 4 Dec 2017, ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference. Association for Computing Machinery (ACM), p. 327-338

    Research output: Chapter in Book/Report/Conference proceedingConference contribution