Skip to main content

Louise Axon : Publications

Click here to download all publications in a single bibtex file

@inproceedings{14808,
  title = "99% false positives: A qualitative study of SOC analysts' perspectives on security alarms",
  author = "Bushra AlAhmadi and Louise Axon and Ivan Martinovic",
  year = "2022",
  booktitle = "Proc. 31st USENIX Security Symposium",
}
@inproceedings{alahmadi2022false,
  title = "99% false positives: A qualitative study of SOC analysts’ perspectives on security alarms",
  author = "Alahmadi, Bushra and Axon, Louise and Martinovic, Ivan",
  year = "2022",
  booktitle = "USENIX Security Symposium (to appear)",
  organization = "USENIX",
}
@inproceedings{erola2021control,
  title = "Control effectiveness: a capture-the-flag study",
  author = "Erola, Arnau and Axon, Louise and Janse van Rensburg, Alastair and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie",
  year = "2021",
  booktitle = "International Workshop on Cyber Threat Intelligence Management",
}
@inproceedings{axon2021practitioners,
  title = "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness",
  author = "Axon, Louise and Erola, Arnau and Janse van Rensburg, Alastair and Nurse, Jason RC and Goldsmith, Michael and Creese, Sadie",
  year = "2021",
  booktitle = "International Workshop on Information Security Methodology and Replication Studies",
}
@article{axon2020data,
  title = "Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice",
  author = "Axon, Louise and AlAhmadi, Bushra A and Nurse, Jason RC and Goldsmith, Michael and Creese, Sadie",
  year = "2020",
  journal = "Journal of Cybersecurity",
  number = "1",
  pages = "tyaa004",
  publisher = "Oxford University Press",
  volume = "6",
}
@inproceedings{nurse2020data,
  title = "The data that drives cyber insurance: A study into the underwriting and claims processes",
  author = "Nurse, RC Jason and Axon, Louise and Erola, Arnau and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie",
  year = "2020",
  booktitle = "2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)",
  organization = "IEEE",
  pages = "1--8",
}
@techreport{creese2020foresight,
  title = "Foresight Review of Cyber Security for the Industrial IoT",
  author = "Creese, Sadie and Hannigan, Robert and El Kaafarani, Ali and Axon, Louise and Fletcher, Katherine and Schuler Scott, Arianna and Stolz, Marcel",
  year = "2020",
  institution = "Lloyd's Register Foundation",
}
@techreport{creese2020future,
  title = "Future Series: Cybersecurity, Emerging Technology and Systemic Risk",
  author = "Creese, Sadie and Saunders, Jamie and Axon, Louise and Dixon, William",
  year = "2020",
  institution = "World Economic Forum",
}
@article{axon2019sonification,
  title = "Sonification to Support the Monitoring Tasks of Security Operations Centres",
  author = "Axon, Louise and Happa, Jassim and Janse van Rensburg, Alastair and Goldsmith, Michael and Creese, Sadie",
  year = "2019",
  journal = "IEEE Transactions on Dependable and Secure Computing",
  publisher = "IEEE",
}
@article{axon2019hearing,
  title = "Hearing Attacks in Network Data: an Effectiveness Study",
  author = "Axon, Louise and Happa, Jassim and Goldsmith, Michael and Creese, Sadie",
  year = "2019",
  journal = "Computers \& Security",
  publisher = "Elsevier",
}
@inproceedings{axon2019analysing,
  title = "Analysing cyber-insurance claims to design harm-propagation trees",
  author = "Axon, L and Erola, A and Agrafiotis, I and Goldsmith, M and Creese, S",
  year = "2019",
  booktitle = "Cyber Science",
  publisher = "IEEE",
}
@article{axon2018sonification,
  title = "Sonification Mappings: Estimating Effectiveness, Polarities and Scaling in an Online Experiment",
  author = "Axon, Louise and Goldsmith, Michael and Creese, Sadie",
  year = "2018",
  journal = "Journal of the Audio Engineering Society",
  number = "12",
  pages = "1016--1032",
  publisher = "Audio Engineering Society",
  volume = "66",
}
@conference{2018-usec-aangc,
  title = "Sonification in Security Operations Centres: What do Security Practitioners Think?",
  author = "Louise M. Axon and Bushra Alahmadi and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese",
  year = "2018",
  booktitle = "Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium",
  note = "To appear",
  publisher = "Internet Society",
}
@phdthesis{axon2018sonification,
  title = "Sonification for network-security monitoring",
  author = "Axon, Louise",
  year = "2018",
  school = "University of Oxford",
}
@incollection{axon2018privacy,
  title = "Privacy Requirements in Cybersecurity Applications of Blockchain",
  author = "Axon, Louise and Goldsmith, Michael and Creese, Sadie",
  year = "2018",
  booktitle = "Advances in Computers",
  pages = "229--278",
  publisher = "Elsevier",
  volume = "111",
}
@article{2017-advsec-angc,
  title = "A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring",
  author = "Louise Axon; Jason R. C. Nurse; Michael Goldsmith; Sadie Creese",
  year = "2017",
  journal = "International Journal On Advances in Security",
  keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring; Formalised Model; Situational Awareness",
}
@inproceedings{axon2016pb,
  title = "PB-PKI: A privacy-aware blockchain-based PKI",
  author = "Axon, Louise and Goldsmith, Michael",
  year = "2016",
  booktitle = "International Conference on Security and Cryptography",
  publisher = "SCITEPRESS",
}
@conference{2016-rtsi-wanc,
  title = "Future scenarios and challenges for security and privacy",
  author = "Meredydd Williams and Louise Axon and Jason R. C. Nurse and Sadie Creese",
  year = "2016",
  booktitle = "2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016)",
  publisher = "IEEE",
  url = "http://apice.unibo.it/xwiki/bin/view/RTSI2016/WebHome",
  doi = "10.1109/RTSI.2016.7740625",
}
@conference{2016-securware-acgn,
  title = "Reflecting on the Use of Sonification for Network Monitoring",
  author = "Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C.",
  year = "2016",
  booktitle = "10th International Conference on Emerging Security Information, Systems and Technologies",
  isbn = "978-1-61208-493-0",
  issn = "2162-2116",
  keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring",
  pages = "254--261",
}