Identity Security in Cyberspace: Publications
Investigating the leakage of sensitive personal and organisational information in email headers
Jason R. C. Nurse‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Journal of Internet Services and Information Security. Vol. 5. No. 1. 2015.
Predicting Graphical Passwords
Matthieu Devlin‚ Jason R. C. Nurse‚ Duncan Hodges‚ Michael Goldsmith and Sadie Creese
In Theo Tryfonas and Ioannis Askoxylakis, editors, International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 17th International Conference on Human−Computer Interaction (HCI). Pages 23–35. Springer. 2015.
Applying Social Network Analysis to Security
Elizabeth Phillips‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In International Conference on Cyber Security for Sustainable Society. Pages 11–27. 2015.
Inferring Social Relationships from Technology−Level Device Connections
Jason R. C. Nurse‚ Jess Pumphrey‚ Thomas Gibson−Robinson‚ Michael Goldsmith and Sadie Creese
In 12th International Conference on Privacy‚ Security and Trust (PST). Pages 40 − 47. IEEE. 2014.
A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks
Sadie Creese‚ Michael Goldsmith‚ Jason R.C. Nurse and Elizabeth Phillips
In 11th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−12). Pages 1124−1131. IEEE. 2012.
Identity attribution across CyberSpace and the Natural Space
D. Hodges‚ J.R.C. Nurse‚ M. Goldsmith and S. Creese
In The International Crime and Intelligence Analysis Conference. 2012.
Trustworthy and Effective Communication of Cybersecurity Risks: A Review
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 1st Workshop on Socio−Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). IEEE. 2011.