Louise Axon : Publications
Book chapters
-
[1]
Privacy Requirements in Cybersecurity Applications of Blockchain
Louise Axon‚ Michael Goldsmith and Sadie Creese
In Advances in Computers. Vol. 111. Pages 229–278. Elsevier. 2018.
Details about Privacy Requirements in Cybersecurity Applications of Blockchain | BibTeX data for Privacy Requirements in Cybersecurity Applications of Blockchain
Journal papers
-
[1]
Sonification to Support the Monitoring Tasks of Security Operations Centres
Louise Axon‚ Jassim Happa‚ Alastair Janse van Rensburg‚ Michael Goldsmith and Sadie Creese
In IEEE Transactions on Dependable and Secure Computing. 2019.
Details about Sonification to Support the Monitoring Tasks of Security Operations Centres | BibTeX data for Sonification to Support the Monitoring Tasks of Security Operations Centres
-
[2]
Hearing Attacks in Network Data: an Effectiveness Study
Louise Axon‚ Jassim Happa‚ Michael Goldsmith and Sadie Creese
In Computers & Security. 2019.
Details about Hearing Attacks in Network Data: an Effectiveness Study | BibTeX data for Hearing Attacks in Network Data: an Effectiveness Study
-
[3]
Sonification Mappings: Estimating Effectiveness‚ Polarities and Scaling in an Online Experiment
Louise Axon‚ Michael Goldsmith and Sadie Creese
In Journal of the Audio Engineering Society. Vol. 66. No. 12. Pages 1016–1032. 2018.
Details about Sonification Mappings: Estimating Effectiveness‚ Polarities and Scaling in an Online Experiment | BibTeX data for Sonification Mappings: Estimating Effectiveness‚ Polarities and Scaling in an Online Experiment
-
[4]
A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring
Louise Axon; Jason R. C. Nurse; Michael Goldsmith; Sadie Creese
In International Journal On Advances in Security. 2017.
Details about A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring | BibTeX data for A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring | Download (pdf) of A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring
Conference papers
-
[1]
Analysing cyber−insurance claims to design harm−propagation trees
L Axon‚ A Erola‚ I Agrafiotis‚ M Goldsmith and S Creese
In Cyber Science. IEEE. 2019.
Details about Analysing cyber−insurance claims to design harm−propagation trees | BibTeX data for Analysing cyber−insurance claims to design harm−propagation trees
-
[2]
Sonification in Security Operations Centres: What do Security Practitioners Think?
Louise M. Axon‚ Bushra Alahmadi‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium. Internet Society. 2018.
To appear
Details about Sonification in Security Operations Centres: What do Security Practitioners Think? | BibTeX data for Sonification in Security Operations Centres: What do Security Practitioners Think? | Download (pdf) of Sonification in Security Operations Centres: What do Security Practitioners Think?
-
[3]
PB−PKI: A privacy−aware blockchain−based PKI
Louise Axon and Michael Goldsmith
In International Conference on Security and Cryptography. SCITEPRESS. 2016.
Details about PB−PKI: A privacy−aware blockchain−based PKI | BibTeX data for PB−PKI: A privacy−aware blockchain−based PKI
-
[4]
Future scenarios and challenges for security and privacy
Meredydd Williams‚ Louise Axon‚ Jason R. C. Nurse and Sadie Creese
In 2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016). IEEE. 2016.
Details about Future scenarios and challenges for security and privacy | BibTeX data for Future scenarios and challenges for security and privacy | Download (pdf) of Future scenarios and challenges for security and privacy | DOI (10.1109/RTSI.2016.7740625) | Link to Future scenarios and challenges for security and privacy
-
[5]
Reflecting on the Use of Sonification for Network Monitoring
Louise Axon‚ Sadie Creese‚ Michael Goldsmith and Jason R.C. Nurse
In 10th International Conference on Emerging Security Information‚ Systems and Technologies. Pages 254–261. 2016.
Details about Reflecting on the Use of Sonification for Network Monitoring | BibTeX data for Reflecting on the Use of Sonification for Network Monitoring | Download (pdf) of Reflecting on the Use of Sonification for Network Monitoring
Theses
-
[1]
Sonification for network−security monitoring
Louise Axon
PhD Thesis University of Oxford. 2018.
Details about Sonification for network−security monitoring | BibTeX data for Sonification for network−security monitoring