Skip to main content

Identity Security in Cyberspace: Publications

Click here to download all publications in a single bibtex file

@article{negc2015email,
  title = "Investigating the leakage of sensitive personal and organisational information in email headers",
  author = "Jason R. C. Nurse and Arnau Erola and Michael Goldsmith and Sadie Creese",
  year = "2015",
  journal = "Journal of Internet Services and Information Security",
  number = "1",
  url = "http://isyou.info/jisis/vol5/no1/jisis-2015-vol5-no1-04.pdf",
  volume = "5",
}
@inproceedings{dnhgc2015predictinggps,
  title = "Predicting Graphical Passwords",
  author = "Matthieu Devlin and Jason R. C. Nurse and Duncan Hodges and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 17th International Conference on Human-Computer Interaction (HCI)",
  editor = "Theo Tryfonas and Ioannis Askoxylakis",
  pages = "23--35",
  publisher = "Springer",
  series = "9190",
  doi = "10.1007/978-3-319-20376-8_3",
}
@inproceedings{ephillips2015snasecurity,
  title = "Applying Social Network Analysis to Security",
  author = "Elizabeth Phillips and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "International Conference on Cyber Security for Sustainable Society",
  pages = "11--27",
}
@inproceedings{npggc14,
  title = "Inferring Social Relationships from Technology-Level Device Connections",
  author = "Jason R. C. Nurse and Jess Pumphrey and Thomas Gibson-Robinson and Michael Goldsmith and Sadie Creese",
  year = "2014",
  booktitle = "12th International Conference on Privacy, Security and Trust (PST)",
  pages = "40 - 47",
  publisher = "IEEE",
  doi = "10.1109/PST.2014.6890922",
}
@inproceedings{cgnptrustcom2012,
  title = "A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks",
  author = "Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C. and Phillips, Elizabeth",
  year = "2012",
  booktitle = "11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)",
  pages = "1124-1131",
  publisher = "IEEE",
  doi = "10.1109/TrustCom.2012.22",
}
@inproceedings{hngc2012,
  title = "Identity attribution across CyberSpace and the Natural Space",
  author = "Hodges, D. and Nurse, J.R.C. and Goldsmith, M. and Creese, S.",
  year = "2012",
  booktitle = "The International Crime and Intelligence Analysis Conference",
  url = "http://www.ucl.ac.uk/jdi/events/int-CIA-conf",
}
@inproceedings{ncglstast2011,
  title = "Trustworthy and Effective Communication of Cybersecurity Risks: A Review",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2011.6059257",
}