Obserwuj
Michael Goldsmith
Michael Goldsmith
Associate Professor and Senior Research Fellow, Cybersecurity Analytics Group, Department of
Zweryfikowany adres z cs.ox.ac.uk
Tytuł
Cytowane przez
Cytowane przez
Rok
Modelling and Analysis of Security Protocols
P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe
Addison Wesley, 2001
822*2001
Programming in occam 2
G Jones, M Goldsmith
Prentice-Hall, 1988
4241988
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
I Agrafiotis, JRC Nurse, M Goldsmith, S Creese, D Upton
Journal of Cybersecurity 4 (1), tyy006, 2018
3132018
Understanding Insider Threat: A Framework for Characterising Attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT 2014 …, 2014
2822014
PB-PKI: a privacy-aware blockchain-based PKI
LM Axon, M Goldsmith
SECRYPT 2017, 2016
2432016
Insider attacks in cloud computing
AJ Duncan, S Creese, M Goldsmith
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
1902012
Hierarchical compression for model-checking CSP or how to check 10^20 dining philosophers for deadlock
A Roscoe, P Gardiner, M Goldsmith, J Hulance, D Jackson, J Scattergood
Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995
1781995
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
P Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal 99, 1-10, 2015
1712015
What is intransitive noninterference?
AW Roscoe, MH Goldsmith
Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE …, 1999
1651999
Guidelines for usable cybersecurity: past and present
JRC Nurse, S Creese, M Goldsmith, K Lamberts
Cyberspace Safety and Security (CSS), 2011 Third International Workshop on …, 2011
1192011
Towards a conceptual model and reasoning structure for insider threat detection
P Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
1142013
Trustworthy and effective communication of cybersecurity risks: a review
JRC Nurse, S Creese, M Goldsmith, K Lamberts
1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) at 5th …, 2011
922011
The perfect ‘spy’ for model-checking cryptoprotocols
AW Roscoe, MH Goldsmith
Proceedings of DIMACS workshop on the design and formal verification of …, 1997
881997
FDR2 user manual
P Gardiner, M Goldsmith, J Hulance, D Jackson, AW Roscoe, ...
Formal Systems (Europe) Ltd, 2000
86*2000
Understanding the radical mind: Identifying signals to detect extremist content on twitter
M Nouh, JRC Nurse, M Goldsmith
2019 IEEE International Conference on Intelligence and Security Informatics …, 2019
752019
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
732015
Authentication for pervasive computing
S Creese, M Goldsmith, B Roscoe, I Zakiuddin
Security in Pervasive Computing, 439-488, 2004
722004
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
PA Legg, O Buckley, M Goldsmith, S Creese
International Symposium on Technologies for Homeland Security, 2015
702015
Unwinding Ariadne's identity thread: Privacy risks with fitness trackers and online social networks
A Aktypi, JRC Nurse, M Goldsmith
Proceedings of the 2017 on Multimedia Privacy and Security, 1-11, 2017
642017
Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
2015 International Workshop on Secure Internet of Things (SIoT), 2015
602015
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20