Sadie Creese : Publications
-
[1]
A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks
Sadie Creese‚ Michael Goldsmith‚ Jason R.C. Nurse and Elizabeth Phillips
In 11th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−12). Pages 1124−1131. IEEE. 2012.
Details about A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | BibTeX data for A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | Download (pdf) of A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | DOI (10.1109/TrustCom.2012.22)
-
[2]
A Logical High−Level Framework for Critical Infrastructure Resilience and Risk Assessment
Sadie Creese‚ Michael H. Goldsmith and Adedayo O. Adetoye
In The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011). Milan‚ Italy. September, 2011. To appear.
Details about A Logical High−Level Framework for Critical Infrastructure Resilience and Risk Assessment | BibTeX data for A Logical High−Level Framework for Critical Infrastructure Resilience and Risk Assessment
-
[3]
A Model for Identity in the Cyber and Natural Universes
Duncan Hodges‚ Sadie Creese and Michael Goldsmith
In Intelligence and Security Informatics Conference (EISIC)‚ 2012 European. Pages 115–122. IEEE. August, 2012.
Details about A Model for Identity in the Cyber and Natural Universes | BibTeX data for A Model for Identity in the Cyber and Natural Universes | DOI (10.1109/EISIC.2012.43)
-
[4]
A Modelling Approach for Interdependency in Digital Systems−of−Systems Security – Extended Abstract
M. Goldsmith A. Adetoye S. Creese
In Proceedings of CRITIS'10. 2010.
Details about A Modelling Approach for Interdependency in Digital Systems−of−Systems Security – Extended Abstract | BibTeX data for A Modelling Approach for Interdependency in Digital Systems−of−Systems Security – Extended Abstract
-
[5]
A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches
Jason R.C. Nurse‚ Philip A. Legg‚ Oliver Buckley‚ Ioannis Agrafiotis‚ Gordon Wright‚ Monica Whitty‚ David Upton‚ Michael Goldsmith and Sadie Creese
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 16th International Conference on Human−Computer Interaction (HCI). Springer. 2014.
Details about A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | BibTeX data for A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | Download (pdf) of A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | DOI (10.1007/978-3-319-07620-1_24)
-
[6]
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
Syed Sadiqur Rahman‚ Michael Goldsmith and Sadie Creese
In Proceedings of STM'11 7th International Workshop on Security and Trust Management. June, 2011.
Details about Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources | BibTeX data for Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
-
[7]
An Initial Usability Evaluation of the Secure Situation Awareness System
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith‚ Rachel Craddock and Glyn Jones
In The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012). IAS of ISCRAM. 2012.
Details about An Initial Usability Evaluation of the Secure Situation Awareness System | BibTeX data for An Initial Usability Evaluation of the Secure Situation Awareness System | Download (pdf) of An Initial Usability Evaluation of the Secure Situation Awareness System | Download (pdf) of An Initial Usability Evaluation of the Secure Situation Awareness System
-
[8]
Applying Social Network Analysis to Security
Elizabeth Phillips‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In International Conference on Cyber Security for Sustainable Society. Pages 11–27. 2015.
Details about Applying Social Network Analysis to Security | BibTeX data for Applying Social Network Analysis to Security | Download (pdf) of Applying Social Network Analysis to Security
-
[9]
Applying formal methods to describe the privacy−control requirements in real case−study scenario: emerging ambiguities and proposed solutions
N. Papanikolaou I. Agrafiotis S. Creese M. Goldsmith
In Proceedings of 2010 IFIP/PrimeLife Summer School. 2010.
Details about Applying formal methods to describe the privacy−control requirements in real case−study scenario: emerging ambiguities and proposed solutions | BibTeX data for Applying formal methods to describe the privacy−control requirements in real case−study scenario: emerging ambiguities and proposed solutions
-
[10]
Applying semantic technologies to fight online banking fraud
Rodrigo Carvalho‚ Michael Goldsmith and Sadie Creese
In European Intelligence and Security Informatics Conference (EISIC). 2015.
Details about Applying semantic technologies to fight online banking fraud | BibTeX data for Applying semantic technologies to fight online banking fraud | Download (pdf) of Applying semantic technologies to fight online banking fraud
-
[11]
Authentication in pervasive computing
A. W. Roscoe‚ S.J. Creese‚ M.H. Goldsmith and I.Zakiuddin
In Proceedings of the First International Conference on Security in Pervasive Computing. LNCS. March, 2003.
Details about Authentication in pervasive computing | BibTeX data for Authentication in pervasive computing | Link to Authentication in pervasive computing
-
[12]
Biodiversity: A Security Approach for Ad Hoc Networks
Jen Jackson‚ Sadie Creese and Mark Leeson
In Proceedings of IEEE SSCI2011 Symposium Series on Computational Intelligence‚ CICS2011 Symposium on Computational Intelligence in Cyber Security. April, 2011.
Details about Biodiversity: A Security Approach for Ad Hoc Networks | BibTeX data for Biodiversity: A Security Approach for Ad Hoc Networks
-
[13]
Bootstrapping Multi−Party Ad−Hoc Security
Ming Xiao S. J. Creese M. H. Goldsmith A.W. Roscoe
In Proceedings of SAC 2006 21st Annual ACM Symposium on Applied Computing. April, 2006.
Details about Bootstrapping Multi−Party Ad−Hoc Security | BibTeX data for Bootstrapping Multi−Party Ad−Hoc Security
-
[14]
Breaking the Arc: Risk Control for Big Data
D. Hodges and S. Creese
In IEEE BigData 2013. October, 2013.
Details about Breaking the Arc: Risk Control for Big Data | BibTeX data for Breaking the Arc: Risk Control for Big Data
-
[15]
Breaking the Arc: Risk control for Big Data
Duncan Hodges and Sadie Creese
In Big Data‚ 2013 IEEE International Conference on. Pages 613−621. 2013.
Details about Breaking the Arc: Risk control for Big Data | BibTeX data for Breaking the Arc: Risk control for Big Data | DOI (10.1109/BigData.2013.6691630)
-
[16]
Building Confidence in Information−Trustworthiness Metrics for Decision Support
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 12th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−13). IEEE. 2013.
Details about Building Confidence in Information−Trustworthiness Metrics for Decision Support | BibTeX data for Building Confidence in Information−Trustworthiness Metrics for Decision Support | Download of Building Confidence in Information−Trustworthiness Metrics for Decision Support | DOI (10.1109/TrustCom.2013.6)
-
[17]
Building a better intelligence machine: A new approach to capability review and development
Duncan Hodges and Sadie Creese
In Intelligence and Security Informatics (ISI)‚ 2013 IEEE International Conference on. Pages 113–115. IEEE. 2013.
Details about Building a better intelligence machine: A new approach to capability review and development | BibTeX data for Building a better intelligence machine: A new approach to capability review and development
-
[18]
Can cognitive science help us make information risk more tangible online?
Sadie Creese and Koen Lamberts
Vol. Vol 24 Issue 6 32−36. 2009.
Details about Can cognitive science help us make information risk more tangible online? | BibTeX data for Can cognitive science help us make information risk more tangible online?
-
[19]
Communicating Trustworthiness using Radar Graphs: A Detailed Look
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 11th International Conference on Privacy‚ Security and Trust (PST). IEEE. 2013.
Details about Communicating Trustworthiness using Radar Graphs: A Detailed Look | BibTeX data for Communicating Trustworthiness using Radar Graphs: A Detailed Look | Download (pdf) of Communicating Trustworthiness using Radar Graphs: A Detailed Look | DOI (10.1109/PST.2013.6596085)
-
[20]
Data Protection−Aware Design for Cloud Services
Sadie Creese‚ Paul Hopkins‚ Siani Pearson and Yun Shen
In Proceedings of CloudCom 2009. Vol. Vol 5931/2009‚ 119−130. LNCS. 2009.
Details about Data Protection−Aware Design for Cloud Services | BibTeX data for Data Protection−Aware Design for Cloud Services
-
[21]
Defining Consent and Revocation Policies
S. Pearson I. Agrafiotis S. Creese M. Goldsmith N. Papanikolaou M Casassa Mont
In Proceedings of 2010 IFIP/PrimeLife Summer School. 2010.
Details about Defining Consent and Revocation Policies | BibTeX data for Defining Consent and Revocation Policies
-
[22]
Developing a Strategy for Automated Privacy Testing Suites
M. Goldsmith I. Agrafiotis S. Creese
In Proceedings of the IFIP Summer School. September, 2011.
Details about Developing a Strategy for Automated Privacy Testing Suites | BibTeX data for Developing a Strategy for Automated Privacy Testing Suites
-
[23]
EnCoRe: Towards a Holistic Approach to Privacy
S. Pearson N. Papanikolaou S. Creese M. Goldsmith M. Casassa Mont
In Proceedings of SECRYPT2010. 2010.
Details about EnCoRe: Towards a Holistic Approach to Privacy | BibTeX data for EnCoRe: Towards a Holistic Approach to Privacy
-
[24]
Ensuring Consent and Revocation: Towards a Taxonomy of Consent
N. Papnikolaou S. Creese M. Goldsmith
In Proceedings of WebSci'09: Society On−Line. 2009.
Details about Ensuring Consent and Revocation: Towards a Taxonomy of Consent | BibTeX data for Ensuring Consent and Revocation: Towards a Taxonomy of Consent
-
[25]
Exploiting Empirical Engagement in Authentication Protocol Design
Sadie Creese‚ Michael Goldsmith‚ Richard Harrison‚ Bill Roscoe‚ Paul Whittaker and Irfan Zakiuddin
In Proceedings of SPPC 2005. May, 2005.
Details about Exploiting Empirical Engagement in Authentication Protocol Design | BibTeX data for Exploiting Empirical Engagement in Authentication Protocol Design
-
[26]
Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation
M. Goldsmith I. Agrafiotis S. Creese
In Proceedings of the IFIP Summer School 2011. September, 2011.
Details about Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation | BibTeX data for Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation
-
[27]
Guidelines for Usable Cybersecurity: Past and Present
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011) at The 5th International Conference on Network and System Security (NSS 2011). IEEE. 2011.
Details about Guidelines for Usable Cybersecurity: Past and Present | BibTeX data for Guidelines for Usable Cybersecurity: Past and Present | Download (pdf) of Guidelines for Usable Cybersecurity: Past and Present | DOI (10.1109/CSS.2011.6058566)
-
[28]
Identifying attack patterns for insider threat detection
Ioannis Agrafiotis‚ Jason R. C. Nurse‚ Oliver Buckley‚ Phil Legg‚ Sadie Creese and Michael Goldsmith
In Computer Fraud & Security. No. 7. Pages 9–17. July, 2015.
Details about Identifying attack patterns for insider threat detection | BibTeX data for Identifying attack patterns for insider threat detection | DOI (10.1016/S1361-3723(15)30066-X) | Link to Identifying attack patterns for insider threat detection
-
[29]
Identity attribution across CyberSpace and the Natural Space
D. Hodges‚ J.R.C. Nurse‚ M. Goldsmith and S. Creese
In The International Crime and Intelligence Analysis Conference. 2012.
Details about Identity attribution across CyberSpace and the Natural Space | BibTeX data for Identity attribution across CyberSpace and the Natural Space | Link to Identity attribution across CyberSpace and the Natural Space
-
[30]
Image Choice to Represent the Self in Different Online Environments
Monica Whitty‚ James Doodson‚ Sadie Creese and Duncan Hodges
In Social Computing and Social Media. Pages 528–537. Springer International Publishing. 2014.
Details about Image Choice to Represent the Self in Different Online Environments | BibTeX data for Image Choice to Represent the Self in Different Online Environments
-
[31]
Image Choice to represent the Self in Different Online Environments
M. Whitty‚ J. Doodson‚ S. Creese and D. Hodges
In International Conference on Social Computing and Social Media at the 16th International Conference on Human−Computer Interaction (HCI). Springer. 2014.
To appear
Details about Image Choice to represent the Self in Different Online Environments | BibTeX data for Image Choice to represent the Self in Different Online Environments
-
[32]
Inadequacies of Current Risk Controls for the Cloud
P. Hopkins M. Auty S. Creese M. Goldsmith
In Proceedings of CloudCom 2010. November, 2010.
Details about Inadequacies of Current Risk Controls for the Cloud | BibTeX data for Inadequacies of Current Risk Controls for the Cloud
-
[33]
Information Quality and Trustworthiness: A Topical State−of−the−Art Review
Jason R.C. Nurse‚ Syed Sadiqur Rahman‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The International Conference on Computer Applications and Network Security (ICCANS) 2011. IEEE. 2011.
Details about Information Quality and Trustworthiness: A Topical State−of−the−Art Review | BibTeX data for Information Quality and Trustworthiness: A Topical State−of−the−Art Review | Download (pdf) of Information Quality and Trustworthiness: A Topical State−of−the−Art Review | Link to Information Quality and Trustworthiness: A Topical State−of−the−Art Review
-
[34]
Information trustworthiness as a solution to the misinformation problems in social media
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese‚ Koen Lamberts‚ Darren Price and Glyn Jones
In International Conference on Cyber Security for Sustainable Society. Pages 28−35. 2015.
Details about Information trustworthiness as a solution to the misinformation problems in social media | BibTeX data for Information trustworthiness as a solution to the misinformation problems in social media | Download (pdf) of Information trustworthiness as a solution to the misinformation problems in social media
-
[35]
Investigating the leakage of sensitive personal and organisational information in email headers
Jason R. C. Nurse‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Journal of Internet Services and Information Security. Vol. 5. No. 1. 2015.
Details about Investigating the leakage of sensitive personal and organisational information in email headers | BibTeX data for Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers
-
[36]
MAFTIA (Malicious− and Accidental− Fault Tolerance for Internet Applications
M. Waidner D. Powell A. Adelsbach C. Cachin S. Creese M. Dacier Y. Deswarte T. McCutcheon N. Neves B. Pfitzmann B. Randell R. Stroud P. Veríssimo
2001.
Details about MAFTIA (Malicious− and Accidental− Fault Tolerance for Internet Applications | BibTeX data for MAFTIA (Malicious− and Accidental− Fault Tolerance for Internet Applications
-
[37]
Managing the influence of social media using information trust
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese‚ Koen Lamberts‚ Darren Price and Glyn Jones
In Social Influence in the Information Age Conference. 2014.
Details about Managing the influence of social media using information trust | BibTeX data for Managing the influence of social media using information trust
-
[38]
Policy Refinement Checking (extended abstract)
S. Creese N. Papanikolaou M. Goldsmith
In Proceedings of 9th Symposium on Automated Verification of Critical Systems (AvoCS’09)‚ Technical Report CSR−2−2009‚ Swansea University. September, 2009.
Details about Policy Refinement Checking (extended abstract) | BibTeX data for Policy Refinement Checking (extended abstract)
-
[39]
Predicting Graphical Passwords
Matthieu Devlin‚ Jason R. C. Nurse‚ Duncan Hodges‚ Michael Goldsmith and Sadie Creese
In Theo Tryfonas and Ioannis Askoxylakis, editors, International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 17th International Conference on Human−Computer Interaction (HCI). Pages 23–35. Springer. 2015.
Details about Predicting Graphical Passwords | BibTeX data for Predicting Graphical Passwords | Download (pdf) of Predicting Graphical Passwords | DOI (10.1007/978-3-319-20376-8_3)
-
[40]
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data
N. Papanikolaou I. Agrafiotis S. Creese M. Goldsmith
In Privacy and Identity Management for Life‚ Proceedings of 5th PrimeLife/IFIP International Summer School. Springer IFIP AICT 320. 2009.
Details about Reaching for Informed Revocation: Shutting Off the Tap on Personal Data | BibTeX data for Reaching for Informed Revocation: Shutting Off the Tap on Personal Data
-
[41]
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
Adedayo O. Adetoye‚ Sadie Creese and Michael H. Goldsmith
In 7th International Conference On Critical Information Infrastructures Security (CRITIS 2012). LNCS. September, 2012.
To appear
Details about Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment | BibTeX data for Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
-
[42]
Refinement Checking for Privacy Policies
S. Creese N. Papanikolaou M. Goldsmith
In Science of Computer Programming. 2011.
Details about Refinement Checking for Privacy Policies | BibTeX data for Refinement Checking for Privacy Policies | DOI (10.1016/j.scico.2011.07.009)
-
[43]
Refinement−Friendly Bigraphs and Spygraphs
S. Creese M. Goldsmith
In Proceedings of SEFM'10. 2010.
Details about Refinement−Friendly Bigraphs and Spygraphs | BibTeX data for Refinement−Friendly Bigraphs and Spygraphs
-
[44]
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
Oliver Buckley‚ Jason R. C. Nurse‚ Philip A. Legg‚ Michael Goldsmith and Sadie Creese
In Workshop on Socio−Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF). IEEE. 2014.
Details about Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | BibTeX data for Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | Download (pdf) of Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | DOI (10.1109/STAST.2014.10)
-
[45]
Reflecting on the Use of Sonification for Network Monitoring
Louise Axon‚ Sadie Creese‚ Michael Goldsmith and Jason R.C. Nurse
In 10th International Conference on Emerging Security Information‚ Systems and Technologies. Pages 254–261. 2016.
Details about Reflecting on the Use of Sonification for Network Monitoring | BibTeX data for Reflecting on the Use of Sonification for Network Monitoring | Download (pdf) of Reflecting on the Use of Sonification for Network Monitoring
-
[46]
Relationships between Password Choices‚ Perceptions of Risk and Security Expertise
Sadie Creese‚ Duncan Hodges‚ Sue Jamison−Powell and Monica Whitty
In Louis Marinos and Ioannis Askoxylakis, editors, Human Aspects of Information Security‚ Privacy‚ and Trust. Vol. 8030 of Lecture Notes in Computer Science. Pages 80−89. Springer Berlin Heidelberg. 2013.
Details about Relationships between Password Choices‚ Perceptions of Risk and Security Expertise | BibTeX data for Relationships between Password Choices‚ Perceptions of Risk and Security Expertise | DOI (10.1007/978-3-642-39345-7_9) | Link to Relationships between Password Choices‚ Perceptions of Risk and Security Expertise
-
[47]
Requirements and Concepts for Information Assurance and Pervasive Adaptation Co−Design
M. Goldsmith S. Creese
In Proceedings of Pervasive Adaptation (PerAda) workshop‚ 2nd Conference on Self−Adapting and Self−Organizing Systems (SASO 2008). 2008.
Details about Requirements and Concepts for Information Assurance and Pervasive Adaptation Co−Design | BibTeX data for Requirements and Concepts for Information Assurance and Pervasive Adaptation Co−Design
-
[48]
Sonification in Security Operations Centres: What do Security Practitioners Think?
Louise M. Axon‚ Bushra Alahmadi‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium. Internet Society. 2018.
To appear
Details about Sonification in Security Operations Centres: What do Security Practitioners Think? | BibTeX data for Sonification in Security Operations Centres: What do Security Practitioners Think? | Download (pdf) of Sonification in Security Operations Centres: What do Security Practitioners Think?
-
[49]
Supporting Human Decision−Making Online using Information Trustworthiness Metrics
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Syed S. Rahman
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 15th International Conference on Human−Computer Interaction (HCII). Springer. 2013.
Details about Supporting Human Decision−Making Online using Information Trustworthiness Metrics | BibTeX data for Supporting Human Decision−Making Online using Information Trustworthiness Metrics | Download (pdf) of Supporting Human Decision−Making Online using Information Trustworthiness Metrics | DOI (10.1007/978-3-642-39345-7_33)
-
[50]
The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance
Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith‚ Jason R.C. Nurse and David Upton
No. RR−17−01. DCS. Oxford‚ UK. 2017.
Details about The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance | BibTeX data for The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance | Download (pdf) of The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance
-
[51]
The SuperIdentity Stimulus Dataset − a Multi−Modal Biometric and Cybermetric Resource
G. Neil‚ S. Stevenage‚ S. Black‚ H. Meadows‚ S. Creese‚ D. Hodges‚ H. He‚ W. Pike‚ O. Love‚ S. Saxby‚ A. Knight‚ I. Hamlin‚ J. Schultz‚ D. Stanton−Fraser‚ C. Bevan‚ L. Emanuel‚ M. Whitty and S Jamison−Powell
In Pattern Analysis and Machine Intelligence‚ IEEE Transactions on. In Review.
Details about The SuperIdentity Stimulus Dataset − a Multi−Modal Biometric and Cybermetric Resource | BibTeX data for The SuperIdentity Stimulus Dataset − a Multi−Modal Biometric and Cybermetric Resource
-
[52]
Tools for Understanding Identity
Sadie Creese‚ Thomas Gibson−Robinson‚ Michael Goldsmith‚ Duncan Hodges‚ Dee Kim‚ Oriana Love‚ Jason R. C. Nurse‚ Bill Pike and Jean Schultz
In IEEE Conference on Technologies for Homeland Security (HST '13). 2013.
Details about Tools for Understanding Identity | BibTeX data for Tools for Understanding Identity | DOI (10.1109/THS.2013.6699064)
-
[53]
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
Sadie Creese Philip A. Legg Nick Moffat Jason R.C. Nurse Jassim Happa Ioannis Agrafiotis Michael Goldsmith
In Journal of Wireless Mobile Networks‚ Ubiquitous Computing‚ and Dependable Applications. Vol. 4. No. 4. Pages 20−37. 2013.
Details about Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection | BibTeX data for Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection | Download (pdf) of Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
-
[54]
Towards a Conceptual Model for Privacy Policies
N. Papanikolaou M. Casassa Mont S. Pearson S. Creese M. Goldsmith
In Proceedings of 2010 IFIP/PrimeLife Summer School. 2010.
Details about Towards a Conceptual Model for Privacy Policies | BibTeX data for Towards a Conceptual Model for Privacy Policies
-
[55]
Towards an Integrated Approach to the Management‚ Specification and Enforcement of Privacy Policies
N. Papanikolaou M. Casassa Mont S. Pearson S. Creese M. Goldsmith
In Proceedings of W3C Workshop on Access Control Application Scenarios. November, 2009.
Details about Towards an Integrated Approach to the Management‚ Specification and Enforcement of Privacy Policies | BibTeX data for Towards an Integrated Approach to the Management‚ Specification and Enforcement of Privacy Policies
-
[56]
Trustworthy and Effective Communication of Cybersecurity Risks: A Review
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 1st Workshop on Socio−Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). IEEE. 2011.
Details about Trustworthy and Effective Communication of Cybersecurity Risks: A Review | BibTeX data for Trustworthy and Effective Communication of Cybersecurity Risks: A Review | Download (pdf) of Trustworthy and Effective Communication of Cybersecurity Risks: A Review | DOI (10.1109/STAST.2011.6059257)
-
[57]
Two sides of the coin: measuring and communicating the trustworthiness of online information
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese and Koen Lamberts
In Journal of Trust Management. Vol. 1. No. 5. 2014.
Details about Two sides of the coin: measuring and communicating the trustworthiness of online information | BibTeX data for Two sides of the coin: measuring and communicating the trustworthiness of online information | DOI (10.1186/2196-064X-1-5) | Link to Two sides of the coin: measuring and communicating the trustworthiness of online information
-
[58]
Understanding Insider Threat: A Framework for Characterising Attacks
Jason R.C. Nurse‚ Oliver Buckley‚ Philip A. Legg‚ Michael Goldsmith‚ Sadie Creese‚ Gordon R.T. Wright and Monica Whitty
In Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society Security and Privacy Workshops (SPW14)‚ in conjunction with the IEEE Symposium on Security and Privacy (SP).. IEEE. 2014.
Details about Understanding Insider Threat: A Framework for Characterising Attacks | BibTeX data for Understanding Insider Threat: A Framework for Characterising Attacks | Download of Understanding Insider Threat: A Framework for Characterising Attacks | DOI (10.1109/SPW.2014.38) | Link to Understanding Insider Threat: A Framework for Characterising Attacks
-
[59]
Using Information Trustworthiness Advice in Decision−Making
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 2nd Workshop on Socio−Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF). IEEE. 2012.
Details about Using Information Trustworthiness Advice in Decision−Making | BibTeX data for Using Information Trustworthiness Advice in Decision−Making | Download (pdf) of Using Information Trustworthiness Advice in Decision−Making | DOI (10.1109/STAST.2012.10)
-
[60]
Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviours
Jenifer Jackson and Sadie Creese
In IEEE Transactions on Dependable and Secure Computing. Vol. 9. No. 6. Pages 930−943. 2012.
Details about Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviours | BibTeX data for Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviours | DOI (10.1109/TDSC.2012.72) | Link to Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviours
-
[61]
Who's Making Security Risks Online ?
M. T. Whitty‚ S. Creese and D. Hodges
In European Congress of Psychology. July, 2013.
Details about Who's Making Security Risks Online ? | BibTeX data for Who's Making Security Risks Online ?
-
[62]
Formal Verification of Arbitrary Network Topologies
A. W. Roscoe and S.J. Creese
In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'99). Vol. II. CSREA Press. June, 1999.
Details about Formal Verification of Arbitrary Network Topologies | BibTeX data for Formal Verification of Arbitrary Network Topologies | Download (pdf) of Formal Verification of Arbitrary Network Topologies