Louise Axon : Publications
Click here to download all publications in a single bibtex file
@inproceedings{14808,
title = "99% false positives: A qualitative study of SOC analysts' perspectives on security alarms",
author = "Bushra AlAhmadi and Louise Axon and Ivan Martinovic",
year = "2022",
booktitle = "Proc. 31st USENIX Security Symposium",
}
@inproceedings{alahmadi2022false,
title = "99% false positives: A qualitative study of SOC analysts’ perspectives on security alarms",
author = "Alahmadi, Bushra and Axon, Louise and Martinovic, Ivan",
year = "2022",
booktitle = "USENIX Security Symposium (to appear)",
organization = "USENIX",
}
@inproceedings{erola2021control,
title = "Control effectiveness: a capture-the-flag study",
author = "Erola, Arnau and Axon, Louise and Janse van Rensburg, Alastair and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie",
year = "2021",
booktitle = "International Workshop on Cyber Threat Intelligence Management",
}
@inproceedings{axon2021practitioners,
title = "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness",
author = "Axon, Louise and Erola, Arnau and Janse van Rensburg, Alastair and Nurse, Jason RC and Goldsmith, Michael and Creese, Sadie",
year = "2021",
booktitle = "International Workshop on Information Security Methodology and Replication Studies",
}
@article{axon2020data,
title = "Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice",
author = "Axon, Louise and AlAhmadi, Bushra A and Nurse, Jason RC and Goldsmith, Michael and Creese, Sadie",
year = "2020",
journal = "Journal of Cybersecurity",
number = "1",
pages = "tyaa004",
publisher = "Oxford University Press",
volume = "6",
}
@inproceedings{nurse2020data,
title = "The data that drives cyber insurance: A study into the underwriting and claims processes",
author = "Nurse, RC Jason and Axon, Louise and Erola, Arnau and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie",
year = "2020",
booktitle = "2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)",
organization = "IEEE",
pages = "1--8",
}
@techreport{creese2020foresight,
title = "Foresight Review of Cyber Security for the Industrial IoT",
author = "Creese, Sadie and Hannigan, Robert and El Kaafarani, Ali and Axon, Louise and Fletcher, Katherine and Schuler Scott, Arianna and Stolz, Marcel",
year = "2020",
institution = "Lloyd's Register Foundation",
}
@techreport{creese2020future,
title = "Future Series: Cybersecurity, Emerging Technology and Systemic Risk",
author = "Creese, Sadie and Saunders, Jamie and Axon, Louise and Dixon, William",
year = "2020",
institution = "World Economic Forum",
}
@article{axon2019sonification,
title = "Sonification to Support the Monitoring Tasks of Security Operations Centres",
author = "Axon, Louise and Happa, Jassim and Janse van Rensburg, Alastair and Goldsmith, Michael and Creese, Sadie",
year = "2019",
journal = "IEEE Transactions on Dependable and Secure Computing",
publisher = "IEEE",
}
@article{axon2019hearing,
title = "Hearing Attacks in Network Data: an Effectiveness Study",
author = "Axon, Louise and Happa, Jassim and Goldsmith, Michael and Creese, Sadie",
year = "2019",
journal = "Computers \& Security",
publisher = "Elsevier",
}
@inproceedings{axon2019analysing,
title = "Analysing cyber-insurance claims to design harm-propagation trees",
author = "Axon, L and Erola, A and Agrafiotis, I and Goldsmith, M and Creese, S",
year = "2019",
booktitle = "Cyber Science",
publisher = "IEEE",
}
@article{axon2018sonification,
title = "Sonification Mappings: Estimating Effectiveness, Polarities and Scaling in an Online Experiment",
author = "Axon, Louise and Goldsmith, Michael and Creese, Sadie",
year = "2018",
journal = "Journal of the Audio Engineering Society",
number = "12",
pages = "1016--1032",
publisher = "Audio Engineering Society",
volume = "66",
}
@conference{2018-usec-aangc,
title = "Sonification in Security Operations Centres: What do Security Practitioners Think?",
author = "Louise M. Axon and Bushra Alahmadi and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese",
year = "2018",
booktitle = "Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium",
note = "To appear",
publisher = "Internet Society",
}
@phdthesis{axon2018sonification,
title = "Sonification for network-security monitoring",
author = "Axon, Louise",
year = "2018",
school = "University of Oxford",
}
@incollection{axon2018privacy,
title = "Privacy Requirements in Cybersecurity Applications of Blockchain",
author = "Axon, Louise and Goldsmith, Michael and Creese, Sadie",
year = "2018",
booktitle = "Advances in Computers",
pages = "229--278",
publisher = "Elsevier",
volume = "111",
}
@article{2017-advsec-angc,
title = "A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring",
author = "Louise Axon; Jason R. C. Nurse; Michael Goldsmith; Sadie Creese",
year = "2017",
journal = "International Journal On Advances in Security",
keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring; Formalised Model; Situational Awareness",
}
@inproceedings{axon2016pb,
title = "PB-PKI: A privacy-aware blockchain-based PKI",
author = "Axon, Louise and Goldsmith, Michael",
year = "2016",
booktitle = "International Conference on Security and Cryptography",
publisher = "SCITEPRESS",
}
@conference{2016-rtsi-wanc,
title = "Future scenarios and challenges for security and privacy",
author = "Meredydd Williams and Louise Axon and Jason R. C. Nurse and Sadie Creese",
year = "2016",
booktitle = "2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016)",
publisher = "IEEE",
url = "http://apice.unibo.it/xwiki/bin/view/RTSI2016/WebHome",
doi = "10.1109/RTSI.2016.7740625",
}
@conference{2016-securware-acgn,
title = "Reflecting on the Use of Sonification for Network Monitoring",
author = "Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C.",
year = "2016",
booktitle = "10th International Conference on Emerging Security Information, Systems and Technologies",
isbn = "978-1-61208-493-0",
issn = "2162-2116",
keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring",
pages = "254--261",
}