Louise Axon : Publications
Book chapters
-
[1]
Privacy Requirements in Cybersecurity Applications of Blockchain
Louise Axon‚ Michael Goldsmith and Sadie Creese
In Advances in Computers. Vol. 111. Pages 229–278. Elsevier. 2018.
Details about Privacy Requirements in Cybersecurity Applications of Blockchain | BibTeX data for Privacy Requirements in Cybersecurity Applications of Blockchain
Journal papers
-
[1]
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice
Louise Axon‚ Bushra A AlAhmadi‚ Jason RC Nurse‚ Michael Goldsmith and Sadie Creese
In Journal of Cybersecurity. Vol. 6. No. 1. Pages tyaa004. 2020.
Details about Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice | BibTeX data for Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice
-
[2]
Sonification to Support the Monitoring Tasks of Security Operations Centres
Louise Axon‚ Jassim Happa‚ Alastair Janse van Rensburg‚ Michael Goldsmith and Sadie Creese
In IEEE Transactions on Dependable and Secure Computing. 2019.
Details about Sonification to Support the Monitoring Tasks of Security Operations Centres | BibTeX data for Sonification to Support the Monitoring Tasks of Security Operations Centres
-
[3]
Hearing Attacks in Network Data: an Effectiveness Study
Louise Axon‚ Jassim Happa‚ Michael Goldsmith and Sadie Creese
In Computers & Security. 2019.
Details about Hearing Attacks in Network Data: an Effectiveness Study | BibTeX data for Hearing Attacks in Network Data: an Effectiveness Study
-
[4]
Sonification Mappings: Estimating Effectiveness‚ Polarities and Scaling in an Online Experiment
Louise Axon‚ Michael Goldsmith and Sadie Creese
In Journal of the Audio Engineering Society. Vol. 66. No. 12. Pages 1016–1032. 2018.
Details about Sonification Mappings: Estimating Effectiveness‚ Polarities and Scaling in an Online Experiment | BibTeX data for Sonification Mappings: Estimating Effectiveness‚ Polarities and Scaling in an Online Experiment
-
[5]
A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring
Louise Axon; Jason R. C. Nurse; Michael Goldsmith; Sadie Creese
In International Journal On Advances in Security. 2017.
Details about A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring | BibTeX data for A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring | Download (pdf) of A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring
Conference papers
-
[1]
99% false positives: A qualitative study of SOC analysts’ perspectives on security alarms
Bushra Alahmadi‚ Louise Axon and Ivan Martinovic
In USENIX Security Symposium (to appear). USENIX. 2022.
Details about 99% false positives: A qualitative study of SOC analysts’ perspectives on security alarms | BibTeX data for 99% false positives: A qualitative study of SOC analysts’ perspectives on security alarms
-
[2]
Control effectiveness: a capture−the−flag study
Arnau Erola‚ Louise Axon‚ Alastair Janse van Rensburg‚ Ioannis Agrafiotis‚ Michael Goldsmith and Sadie Creese
In International Workshop on Cyber Threat Intelligence Management. 2021.
Details about Control effectiveness: a capture−the−flag study | BibTeX data for Control effectiveness: a capture−the−flag study
-
[3]
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness
Louise Axon‚ Arnau Erola‚ Alastair Janse van Rensburg‚ Jason RC Nurse‚ Michael Goldsmith and Sadie Creese
In International Workshop on Information Security Methodology and Replication Studies. 2021.
Details about Practitioners' Views on Cybersecurity Control Adoption and Effectiveness | BibTeX data for Practitioners' Views on Cybersecurity Control Adoption and Effectiveness
-
[4]
The data that drives cyber insurance: A study into the underwriting and claims processes
RC Jason Nurse‚ Louise Axon‚ Arnau Erola‚ Ioannis Agrafiotis‚ Michael Goldsmith and Sadie Creese
In 2020 International Conference on Cyber Situational Awareness‚ Data Analytics and Assessment (CyberSA). Pages 1–8. IEEE. 2020.
Details about The data that drives cyber insurance: A study into the underwriting and claims processes | BibTeX data for The data that drives cyber insurance: A study into the underwriting and claims processes
-
[5]
Analysing cyber−insurance claims to design harm−propagation trees
L Axon‚ A Erola‚ I Agrafiotis‚ M Goldsmith and S Creese
In Cyber Science. IEEE. 2019.
Details about Analysing cyber−insurance claims to design harm−propagation trees | BibTeX data for Analysing cyber−insurance claims to design harm−propagation trees
-
[6]
Sonification in Security Operations Centres: What do Security Practitioners Think?
Louise M. Axon‚ Bushra Alahmadi‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium. Internet Society. 2018.
To appear
Details about Sonification in Security Operations Centres: What do Security Practitioners Think? | BibTeX data for Sonification in Security Operations Centres: What do Security Practitioners Think? | Download (pdf) of Sonification in Security Operations Centres: What do Security Practitioners Think?
-
[7]
PB−PKI: A privacy−aware blockchain−based PKI
Louise Axon and Michael Goldsmith
In International Conference on Security and Cryptography. SCITEPRESS. 2016.
Details about PB−PKI: A privacy−aware blockchain−based PKI | BibTeX data for PB−PKI: A privacy−aware blockchain−based PKI
-
[8]
Future scenarios and challenges for security and privacy
Meredydd Williams‚ Louise Axon‚ Jason R. C. Nurse and Sadie Creese
In 2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016). IEEE. 2016.
Details about Future scenarios and challenges for security and privacy | BibTeX data for Future scenarios and challenges for security and privacy | Download (pdf) of Future scenarios and challenges for security and privacy | DOI (10.1109/RTSI.2016.7740625) | Link to Future scenarios and challenges for security and privacy
-
[9]
Reflecting on the Use of Sonification for Network Monitoring
Louise Axon‚ Sadie Creese‚ Michael Goldsmith and Jason R.C. Nurse
In 10th International Conference on Emerging Security Information‚ Systems and Technologies. Pages 254–261. 2016.
Details about Reflecting on the Use of Sonification for Network Monitoring | BibTeX data for Reflecting on the Use of Sonification for Network Monitoring | Download (pdf) of Reflecting on the Use of Sonification for Network Monitoring
Technical reports
-
[1]
Foresight Review of Cyber Security for the Industrial IoT
Sadie Creese‚ Robert Hannigan‚ Ali El Kaafarani‚ Louise Axon‚ Katherine Fletcher‚ Arianna Schuler Scott and Marcel Stolz
Lloyd's Register Foundation. 2020.
Details about Foresight Review of Cyber Security for the Industrial IoT | BibTeX data for Foresight Review of Cyber Security for the Industrial IoT
-
[2]
Future Series: Cybersecurity‚ Emerging Technology and Systemic Risk
Sadie Creese‚ Jamie Saunders‚ Louise Axon and William Dixon
World Economic Forum. 2020.
Details about Future Series: Cybersecurity‚ Emerging Technology and Systemic Risk | BibTeX data for Future Series: Cybersecurity‚ Emerging Technology and Systemic Risk
Theses
-
[1]
Sonification for network−security monitoring
Louise Axon
PhD Thesis University of Oxford. 2018.
Details about Sonification for network−security monitoring | BibTeX data for Sonification for network−security monitoring