Identity Security in Cyberspace: Publications
Click here to download all publications in a single bibtex file
@article{negc2015email, title = "Investigating the leakage of sensitive personal and organisational information in email headers", author = "Jason R. C. Nurse and Arnau Erola and Michael Goldsmith and Sadie Creese", year = "2015", journal = "Journal of Internet Services and Information Security", number = "1", url = "http://isyou.info/jisis/vol5/no1/jisis-2015-vol5-no1-04.pdf", volume = "5", }
@inproceedings{dnhgc2015predictinggps, title = "Predicting Graphical Passwords", author = "Matthieu Devlin and Jason R. C. Nurse and Duncan Hodges and Michael Goldsmith and Sadie Creese", year = "2015", booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 17th International Conference on Human-Computer Interaction (HCI)", editor = "Theo Tryfonas and Ioannis Askoxylakis", pages = "23--35", publisher = "Springer", series = "9190", doi = "10.1007/978-3-319-20376-8_3", }
@inproceedings{ephillips2015snasecurity, title = "Applying Social Network Analysis to Security", author = "Elizabeth Phillips and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese", year = "2015", booktitle = "International Conference on Cyber Security for Sustainable Society", pages = "11--27", }
@inproceedings{npggc14, title = "Inferring Social Relationships from Technology-Level Device Connections", author = "Jason R. C. Nurse and Jess Pumphrey and Thomas Gibson-Robinson and Michael Goldsmith and Sadie Creese", year = "2014", booktitle = "12th International Conference on Privacy, Security and Trust (PST)", pages = "40 - 47", publisher = "IEEE", doi = "10.1109/PST.2014.6890922", }
@inproceedings{cgnptrustcom2012, title = "A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks", author = "Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C. and Phillips, Elizabeth", year = "2012", booktitle = "11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)", pages = "1124-1131", publisher = "IEEE", doi = "10.1109/TrustCom.2012.22", }
@inproceedings{hngc2012, title = "Identity attribution across CyberSpace and the Natural Space", author = "Hodges, D. and Nurse, J.R.C. and Goldsmith, M. and Creese, S.", year = "2012", booktitle = "The International Crime and Intelligence Analysis Conference", url = "http://www.ucl.ac.uk/jdi/events/int-CIA-conf", }
@inproceedings{ncglstast2011, title = "Trustworthy and Effective Communication of Cybersecurity Risks: A Review", author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen", year = "2011", booktitle = "The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011)", publisher = "IEEE", doi = "10.1109/STAST.2011.6059257", }