Skip to main content

Louise Axon : Publications

Click here to download all publications in a single bibtex file

@article{axon2019sonification,
  title = "Sonification to Support the Monitoring Tasks of Security Operations Centres",
  author = "Axon, Louise and Happa, Jassim and Janse van Rensburg, Alastair and Goldsmith, Michael and Creese, Sadie",
  year = "2019",
  journal = "IEEE Transactions on Dependable and Secure Computing",
  publisher = "IEEE",
}
@article{axon2019hearing,
  title = "Hearing Attacks in Network Data: an Effectiveness Study",
  author = "Axon, Louise and Happa, Jassim and Goldsmith, Michael and Creese, Sadie",
  year = "2019",
  journal = "Computers \& Security",
  publisher = "Elsevier",
}
@inproceedings{axon2019analysing,
  title = "Analysing cyber-insurance claims to design harm-propagation trees",
  author = "Axon, L and Erola, A and Agrafiotis, I and Goldsmith, M and Creese, S",
  year = "2019",
  booktitle = "Cyber Science",
  publisher = "IEEE",
}
@article{axon2018sonification,
  title = "Sonification Mappings: Estimating Effectiveness, Polarities and Scaling in an Online Experiment",
  author = "Axon, Louise and Goldsmith, Michael and Creese, Sadie",
  year = "2018",
  journal = "Journal of the Audio Engineering Society",
  number = "12",
  pages = "1016--1032",
  publisher = "Audio Engineering Society",
  volume = "66",
}
@conference{2018-usec-aangc,
  title = "Sonification in Security Operations Centres: What do Security Practitioners Think?",
  author = "Louise M. Axon and Bushra Alahmadi and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese",
  year = "2018",
  booktitle = "Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium",
  note = "To appear",
  publisher = "Internet Society",
}
@phdthesis{axon2018sonification,
  title = "Sonification for network-security monitoring",
  author = "Axon, Louise",
  year = "2018",
  school = "University of Oxford",
}
@incollection{axon2018privacy,
  title = "Privacy Requirements in Cybersecurity Applications of Blockchain",
  author = "Axon, Louise and Goldsmith, Michael and Creese, Sadie",
  year = "2018",
  booktitle = "Advances in Computers",
  pages = "229--278",
  publisher = "Elsevier",
  volume = "111",
}
@article{2017-advsec-angc,
  title = "A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring",
  author = "Louise Axon; Jason R. C. Nurse; Michael Goldsmith; Sadie Creese",
  year = "2017",
  journal = "International Journal On Advances in Security",
  keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring; Formalised Model; Situational Awareness",
}
@inproceedings{axon2016pb,
  title = "PB-PKI: A privacy-aware blockchain-based PKI",
  author = "Axon, Louise and Goldsmith, Michael",
  year = "2016",
  booktitle = "International Conference on Security and Cryptography",
  publisher = "SCITEPRESS",
}
@conference{2016-rtsi-wanc,
  title = "Future scenarios and challenges for security and privacy",
  author = "Meredydd Williams and Louise Axon and Jason R. C. Nurse and Sadie Creese",
  year = "2016",
  booktitle = "2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016)",
  publisher = "IEEE",
  url = "http://apice.unibo.it/xwiki/bin/view/RTSI2016/WebHome",
  doi = "10.1109/RTSI.2016.7740625",
}
@conference{2016-securware-acgn,
  title = "Reflecting on the Use of Sonification for Network Monitoring",
  author = "Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C.",
  year = "2016",
  booktitle = "10th International Conference on Emerging Security Information, Systems and Technologies",
  isbn = "978-1-61208-493-0",
  issn = "2162-2116",
  keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring",
  pages = "254--261",
}