Reflecting on the Use of Sonification for Network Monitoring
Louise Axon‚ Sadie Creese‚ Michael Goldsmith and Jason R. C. Nurse
In 10th International Conference on Emerging Security Information‚ Systems and Technologies. Pages 254–261. 2016.
Identifying attack patterns for insider threat detection
Ioannis Agrafiotis‚ Jason R. C. Nurse‚ Oliver Buckley‚ Phil Legg‚ Sadie Creese and Michael Goldsmith
In Computer Fraud & Security. No. 7. Pages 9–17. July, 2015.
Investigating the leakage of sensitive personal and organisational information in email headers
Jason R. C. Nurse‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Journal of Internet Services and Information Security. Vol. 5. No. 1. 2015.
- Sponstaneous Security
- Security Protocols for Ad Hoc Networks
- Noninterference and covert channel analysis
- Refinement-friendly bigraphs
- Identity Security in Cyberspace