@article{bispham2018taxonomy, title = "A taxonomy of attacks via the speech interface", author = "Bispham, Mary K and Agrafiotis, Ioannis and Goldsmith, Michael", year = "2018", booktitle = "Proceedings of CYBER 2018 : The Third International Conference on Cyber-Technologies and Cyber-Systems", publisher = "ThinkMind Digital Library for the Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018)", } @article{giasemidis2018semi, title = "A semi-supervised approach to message stance classification", author = "Giasemidis, Georgios and Kaplis, Nikolaos and Agrafiotis, Ioannis and Nurse, Jason", year = "2018", journal = "IEEE Transactions on Knowledge and Data Engineering", publisher = "IEEE", } @article{jowua18-9-4-04, title = "Modeling Advanced Persistent Threats to enhance anomaly detection techniques", author = "Cheyenne Atapour and Ioannis Agrafiotis and Sadie Creese", year = "2018", journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)", month = "December", number = "4", pages = "71--102", volume = "9", } @article{bada2018reviewing, title = "Reviewing national cybersecurity awareness in Africa: An empirical study", author = "Bada, Maria and Von Solms, Basie and Agrafiotis, Ioannis", year = "2018", publisher = "CYBER 2018, The Third International Conference on Cyber-Technologies and Cyber-Systems", } @article{hameed2018analysing, title = "Analysing trends and success factors of international cybersecurity capacity-building initiatives", author = "Hameed, F and Agrafiotis, I and Weisser, C and Goldsmith, M and Creese, S", year = "2018", journal = "SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies", publisher = "IARIA", } @article{zhang2018state, title = "A state machine system for insider threat detection", author = "Zhang, H and Agrafiotis, I and Erola, A and Creese, S and Goldsmith, M", year = "2018", journal = "The fifth International Workshop on Graphical Models for Security (GramSec), in conjunction with FLoC 2018", publisher = "Springer", } @article{doi:10.1093/cybsec/tyy006, title = "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate", author = "Agrafiotis, Ioannis and Nurse, Jason R C and Goldsmith, Michael and Creese, Sadie and Upton, David", year = "2018", journal = "Journal of Cybersecurity", pages = "tyy006", url = "http://dx.doi.org/10.1093/cybsec/tyy006", doi = "10.1093/cybsec/tyy006", } @inproceedings{akinrolabu2018challenge, title = "The challenge of detecting sophisticated attacks: Insights from SOC Analysts", author = "Akinrolabu, Olusola and Agrafiotis, Ioannis and Erola, Arnau", year = "2018", booktitle = "Proceedings of the 13th International Conference on Availability, Reliability and Security", organization = "ACM", pages = "55", } @article{kingston2018using, title = "Using semantic clustering to support situation awareness on Twitter: the case of world views", author = "Kingston, Charlie and Nurse, Jason RC and Agrafiotis, Ioannis and Milich, Andrew Burke", year = "2018", journal = "Human-centric Computing and Information Sciences", number = "1", pages = "22", publisher = "SpringerOpen", volume = "8", } @article{Woods2017, title = "Mapping the coverage of security controls in cyber insurance proposal forms", author = "Woods, Daniel and Agrafiotis, Ioannis and Nurse, Jason R. C. and Creese, Sadie", year = "2017", issn = "1869-0238", journal = "Journal of Internet Services and Applications", month = "Jul", number = "1", pages = "8", url = "https://doi.org/10.1186/s13174-017-0059-y", volume = "8", doi = "10.1186/s13174-017-0059-y", } @article{agrafiotis2017formalising, title = "Formalising policies for insider-threat detection: A tripwire grammar", author = "Agrafiotis, Ioannis and Erola, Arnau and Goldsmith, Michael and Creese, Sadie", year = "2017", journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)", number = "1", pages = "26--43", volume = "8", } @article{erola2017richerpicture, title = "RicherPicture: Semi-automated cyber defence using context-aware data analytics", author = "Erola, Arnau and Agrafiotis, Ioannis and Happa, Jassim and Goldsmith, Michael and Creese, Sadie and Legg, Philip", year = "2017", publisher = "IEEE", } @conference{2017-has-nurse-et-al, title = "An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System", author = "Jason R.C. Nurse; Ioannis Agrafiotis; Arnau Erola; Maria Bada; Taylor Roberts; Meredydd Williams; Michael Goldsmith; Sadie Creese", year = "2017", booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 19th International Conference on Human-Computer Interaction (HCII)", note = "Accepted for publication", publisher = "Springer", doi = "10.1007/978-3-319-58460-7_26", } @techreport{RR-17-01, title = "The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance", author = "Ioannis Agrafiotis and Sadie Creese and Michael Goldsmith and Jason R.C. Nurse and David Upton", year = "2017", address = "Oxford, UK", institution = "DCS", number = "RR-17-01", pages = "87", } @inproceedings{rashid2016new, title = "A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models", author = "Rashid, Tabish and Agrafiotis, Ioannis and Nurse, Jason RC", year = "2016", booktitle = "Proceedings of the 2016 International Workshop on Managing Insider Security Threats", organization = "ACM", pages = "47--56", } @inproceedings{agrafiotis2016tripwire, title = "A tripwire grammar for insider threat detection", author = "Agrafiotis, Ioannis and Erola, Arnau and Goldsmith, Michael and Creese, Sadie", year = "2016", booktitle = "Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats", organization = "ACM", pages = "105--108", } @article{2016-cfs-ein, title = "Insider threat response and recovery strategies in financial services firms", author = "Jacqueline Eggenschwiler, Ioannis Agrafiotis, Jason R. C. Nurse", year = "2016", issn = "1361-3723", journal = "Computer Fraud & Security", publisher = "Elsevier Ltd.", doi = "10.1016/S1361-3723(16)30091-4", } @conference{socinfo2016-gsanpw, title = "Determining the veracity of rumours on Twitter", author = "Giasemidis, Georgios and Singleton, Colin and Agrafiotis, Ioannis and Nurse, Jason R.C. and Pilgrim, Alan and Willis, Chris", year = "2016", booktitle = "8th International Conference on Social Informatics (SocInfo 2016)", pages = "185--205", publisher = "Springer", doi = "10.1007/978-3-319-47880-7_12", } @article{writ2016, title = "Validating an insider threat detection system: A real scenario perspective", author = "Agrafiotis, Ioannis and Erola, Arnau and Happa, Jassim and Goldsmith, Michael and Creese, Sadie", year = "2016", journal = "IEEE Symposium on Security and Privacy, Workshop on Research for Insider Threats (WRIT)", } @article{cfs2015agrafiotisetal, title = "Identifying attack patterns for insider threat detection", author = "Ioannis Agrafiotis and Jason R. C. Nurse and Oliver Buckley and Phil Legg and Sadie Creese and Michael Goldsmith", year = "2015", issn = "1361-3723", journal = "Computer Fraud & Security", month = "July", number = "7", pages = "9--17", url = "http://www.journals.elsevier.com/computer-fraud-and-security", doi = "10.1016/S1361-3723(15)30066-X", } @inproceedings{nurse2015, title = "Information trustworthiness as a solution to the misinformation problems in social media", author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn", year = "2015", booktitle = "International Conference on Cyber Security for Sustainable Society", issn = "2052-8604", pages = "28-35", } @article{agrafiotis2014towards, title = "Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection", author = "Agrafiotis, Ioannis and Legg, Philip and Goldsmith, Michael and Creese, Sadie", year = "2014", journal = "Journal of Internet Services and Information Security (JISIS)", number = "4", pages = "127--137", volume = "4", } @techreport{agrafiotis2015as, title = "Supplementary document for Identifying attack patterns for insider-threat detection", author = "Agrafiotis I., Nurse J., Buckley O., Legg P., Creese S., Goldsmith M.", year = "2014", } @article{nagcl14, title = "Two sides of the coin: measuring and communicating the trustworthiness of online information", author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen", year = "2014", journal = "Journal of Trust Management", keywords = "Information trustworthiness; Information quality; Trust metrics; Trust visuals; Decision-making; Social-media content; Risk communication", number = "5", publisher = "Springer Open", url = "http://www.journaloftrustmanagement.com/content/1/1/5", volume = "1", doi = "10.1186/2196-064X-1-5", } @conference{nagclpj2014, title = "Managing the influence of social media using information trust", author = "Jason R.C. Nurse and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese and Koen Lamberts and Darren Price and Glyn Jones", year = "2014", booktitle = "Social Influence in the Information Age Conference", } @inproceedings{nlbawwugc14, title = "A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches", author = "Nurse, Jason R.C. and Legg, Philip A. and Buckley, Oliver and Agrafiotis, Ioannis and Wright, Gordon and Whitty, Monica and Upton, David and Goldsmith, Michael and Creese, Sadie", year = "2014", booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI)", publisher = "Springer", doi = "10.1007/978-3-319-07620-1_24", } @inproceedings{cybervis, title = "CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise", author = "Sadie Creese and Michael Goldsmith and Nick Moffat and Jassim Happa and Ioannis Agrafiotis", year = "2013", booktitle = "Proceedings of the 13th annual IEEE Conference on Technologies for Homeland Security", } @article{legg2013mist, title = "Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection", author = "Philip A. Legg, Nick Moffat, Jason R.C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese", year = "2013", issn = "2093-5382", journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications", number = "4", pages = "20-37", url = "http://isyou.info/jowua/papers/jowua-v4n4-2.pdf", volume = "4", } @inproceedings{7027, title = "Communicating Trustworthiness using Radar Graphs: A Detailed Look", author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen", year = "2013", booktitle = "The 11th International Conference on Privacy, Security and Trust (PST)", keywords = "Trustworthiness factors; trustworthiness visualisation; risk communication; communicating trustworthiness and quality; user studies", publisher = "IEEE", doi = "10.1109/PST.2013.6596085", } @inproceedings{7026, title = "Building Confidence in Information-Trustworthiness Metrics for Decision Support", author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen", year = "2013", booktitle = "The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)", keywords = "Trust metrics; trustworthiness visualisation; decision-making; risk communication; information quality", publisher = "IEEE", doi = "10.1109/TrustCom.2013.6", } @incollection{agrafiotis2012formalising, title = "Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation", author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael", year = "2012", booktitle = "Privacy and Identity Management for Life", pages = "232--244", publisher = "Springer Boston", } @incollection{agrafiotis2012developing, title = "Developing a Strategy for Automated Privacy Testing Suites", author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael", year = "2012", booktitle = "Privacy and Identity Management for Life", pages = "32--44", publisher = "Springer Boston", } @inproceedings{5557, title = "Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation", author = "I. Agrafiotis, S. Creese, M. Goldsmith", year = "2011", booktitle = "Proceedings of the IFIP Summer School 2011", month = "September", } @incollection{agrafiotis2011applying, title = "Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements", author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick", year = "2011", booktitle = "Privacy and Identity Management for Life", pages = "271--282", publisher = "Springer IFIP AICT", volume = "352", } @inproceedings{5556, title = "Developing a Strategy for Automated Privacy Testing Suites", author = "I. Agrafiotis, S. Creese, M. Goldsmith", year = "2011", booktitle = "Proceedings of the IFIP Summer School", month = "September 2011", } @inproceedings{5567, title = "Applying formal methods to describe the privacy-control requirements in real case-study scenario: emerging ambiguities and proposed solutions", author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou", year = "2010", booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School", } @inproceedings{5565, title = "Defining Consent and Revocation Policies", author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou, M Casassa Mont, S. Pearson", year = "2010", booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School", } @incollection{agrafiotis2010reaching, title = "Reaching for informed revocation: shutting off the tap on personal data", author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick", year = "2010", booktitle = "Privacy and Identity Management for Life", pages = "246--258", publisher = "Springer IFIP AICT", volume = "320", } @inbook{5576, title = "Reaching for Informed Revocation: Shutting Off the Tap on Personal Data", author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou", year = "2009", booktitle = "Privacy and Identity Management for Life, Proceedings of 5th PrimeLife/IFIP International Summer School", publisher = "Springer IFIP AICT 320", }