Identifying attack patterns for insider threat detection
Ioannis Agrafiotis‚ Jason R. C. Nurse‚ Oliver Buckley‚ Phil Legg‚ Sadie Creese and Michael Goldsmith
In Computer Fraud & Security. No. 7. Pages 9–17. July, 2015.
Investigating the leakage of sensitive personal and organisational information in email headers
Jason R. C. Nurse‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Journal of Internet Services and Information Security. Vol. 5. No. 1. 2015.
Applying semantic technologies to fight online banking fraud
Rodrigo Carvalho‚ Michael Goldsmith and Sadie Creese
In European Intelligence and Security Informatics Conference (EISIC). 2015.
- Sponstaneous Security
- Security Protocols for Ad Hoc Networks
- Noninterference and covert channel analysis
- Refinement-friendly bigraphs
- Identity Security in Cyberspace