Louise Axon : Publications
Click here to download all publications in a single bibtex file
@inproceedings{14808, title = "99% false positives: A qualitative study of SOC analysts' perspectives on security alarms", author = "Bushra AlAhmadi and Louise Axon and Ivan Martinovic", year = "2022", booktitle = "Proc. 31st USENIX Security Symposium", }
@inproceedings{alahmadi2022false, title = "99% false positives: A qualitative study of SOC analysts’ perspectives on security alarms", author = "Alahmadi, Bushra and Axon, Louise and Martinovic, Ivan", year = "2022", booktitle = "USENIX Security Symposium (to appear)", organization = "USENIX", }
@inproceedings{erola2021control, title = "Control effectiveness: a capture-the-flag study", author = "Erola, Arnau and Axon, Louise and Janse van Rensburg, Alastair and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie", year = "2021", booktitle = "International Workshop on Cyber Threat Intelligence Management", }
@inproceedings{axon2021practitioners, title = "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness", author = "Axon, Louise and Erola, Arnau and Janse van Rensburg, Alastair and Nurse, Jason RC and Goldsmith, Michael and Creese, Sadie", year = "2021", booktitle = "International Workshop on Information Security Methodology and Replication Studies", }
@article{axon2020data, title = "Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice", author = "Axon, Louise and AlAhmadi, Bushra A and Nurse, Jason RC and Goldsmith, Michael and Creese, Sadie", year = "2020", journal = "Journal of Cybersecurity", number = "1", pages = "tyaa004", publisher = "Oxford University Press", volume = "6", }
@inproceedings{nurse2020data, title = "The data that drives cyber insurance: A study into the underwriting and claims processes", author = "Nurse, RC Jason and Axon, Louise and Erola, Arnau and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie", year = "2020", booktitle = "2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)", organization = "IEEE", pages = "1--8", }
@techreport{creese2020foresight, title = "Foresight Review of Cyber Security for the Industrial IoT", author = "Creese, Sadie and Hannigan, Robert and El Kaafarani, Ali and Axon, Louise and Fletcher, Katherine and Schuler Scott, Arianna and Stolz, Marcel", year = "2020", institution = "Lloyd's Register Foundation", }
@techreport{creese2020future, title = "Future Series: Cybersecurity, Emerging Technology and Systemic Risk", author = "Creese, Sadie and Saunders, Jamie and Axon, Louise and Dixon, William", year = "2020", institution = "World Economic Forum", }
@article{axon2019sonification, title = "Sonification to Support the Monitoring Tasks of Security Operations Centres", author = "Axon, Louise and Happa, Jassim and Janse van Rensburg, Alastair and Goldsmith, Michael and Creese, Sadie", year = "2019", journal = "IEEE Transactions on Dependable and Secure Computing", publisher = "IEEE", }
@article{axon2019hearing, title = "Hearing Attacks in Network Data: an Effectiveness Study", author = "Axon, Louise and Happa, Jassim and Goldsmith, Michael and Creese, Sadie", year = "2019", journal = "Computers \& Security", publisher = "Elsevier", }
@inproceedings{axon2019analysing, title = "Analysing cyber-insurance claims to design harm-propagation trees", author = "Axon, L and Erola, A and Agrafiotis, I and Goldsmith, M and Creese, S", year = "2019", booktitle = "Cyber Science", publisher = "IEEE", }
@article{axon2018sonification, title = "Sonification Mappings: Estimating Effectiveness, Polarities and Scaling in an Online Experiment", author = "Axon, Louise and Goldsmith, Michael and Creese, Sadie", year = "2018", journal = "Journal of the Audio Engineering Society", number = "12", pages = "1016--1032", publisher = "Audio Engineering Society", volume = "66", }
@conference{2018-usec-aangc, title = "Sonification in Security Operations Centres: What do Security Practitioners Think?", author = "Louise M. Axon and Bushra Alahmadi and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese", year = "2018", booktitle = "Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium", note = "To appear", publisher = "Internet Society", }
@phdthesis{axon2018sonification, title = "Sonification for network-security monitoring", author = "Axon, Louise", year = "2018", school = "University of Oxford", }
@incollection{axon2018privacy, title = "Privacy Requirements in Cybersecurity Applications of Blockchain", author = "Axon, Louise and Goldsmith, Michael and Creese, Sadie", year = "2018", booktitle = "Advances in Computers", pages = "229--278", publisher = "Elsevier", volume = "111", }
@article{2017-advsec-angc, title = "A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring", author = "Louise Axon; Jason R. C. Nurse; Michael Goldsmith; Sadie Creese", year = "2017", journal = "International Journal On Advances in Security", keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring; Formalised Model; Situational Awareness", }
@inproceedings{axon2016pb, title = "PB-PKI: A privacy-aware blockchain-based PKI", author = "Axon, Louise and Goldsmith, Michael", year = "2016", booktitle = "International Conference on Security and Cryptography", publisher = "SCITEPRESS", }
@conference{2016-rtsi-wanc, title = "Future scenarios and challenges for security and privacy", author = "Meredydd Williams and Louise Axon and Jason R. C. Nurse and Sadie Creese", year = "2016", booktitle = "2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016)", publisher = "IEEE", url = "http://apice.unibo.it/xwiki/bin/view/RTSI2016/WebHome", doi = "10.1109/RTSI.2016.7740625", }
@conference{2016-securware-acgn, title = "Reflecting on the Use of Sonification for Network Monitoring", author = "Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C.", year = "2016", booktitle = "10th International Conference on Emerging Security Information, Systems and Technologies", isbn = "978-1-61208-493-0", issn = "2162-2116", keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring", pages = "254--261", }