Obserwuj
Sadie Creese
Sadie Creese
Professor of Cybersecurity
Zweryfikowany adres z cs.ox.ac.uk
Tytuł
Cytowane przez
Cytowane przez
Rok
Security risk assessment in Internet of Things systems
JRC Nurse, S Creese, D De Roure
IT professional 19 (5), 20-26, 2017
255*2017
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE security and privacy workshops, 214-228, 2014
2502014
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
I Agrafiotis, JRC Nurse, M Goldsmith, S Creese, D Upton
Journal of Cybersecurity 4 (1), tyy006, 2018
2142018
Insider attacks in cloud computing
AJ Duncan, S Creese, M Goldsmith
2012 IEEE 11th international conference on trust, security and privacy in …, 2012
1662012
Individual differences in cyber security behaviors: an examination of who is sharing passwords
M Whitty, J Doodson, S Creese, D Hodges
Cyberpsychology, Behavior, and Social Networking 18 (1), 3-7, 2015
1492015
Automated insider threat detection system using user and role-based profile assessment
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal 11 (2), 503-512, 2015
1412015
Guidelines for usable cybersecurity: Past and present
JRC Nurse, S Creese, M Goldsmith, K Lamberts
2011 third international workshop on cyberspace safety and security (CSS), 21-26, 2011
1082011
Towards a conceptual model and reasoning structure for insider threat detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
1022013
Trustworthy and effective communication of cybersecurity risks: A review
JRC Nurse, S Creese, M Goldsmith, K Lamberts
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
772011
The cloud: understanding the security, privacy and trust challenges
N Robinson, L Valeri, J Cave, T Starkey, H Graux, S Creese, PP Hopkins
Privacy and Trust Challenges (November 30, 2010), 2010
732010
The perfect storm: The privacy paradox and the Internet-of-Things
M Williams, JRC Nurse, S Creese
2016 11th International Conference on Availability, Reliability and Security …, 2016
722016
Authentication for pervasive computing
S Creese, M Goldsmith, B Roscoe, I Zakiuddin
Security in pervasive computing, 439-488, 2004
722004
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
652015
The danger from within.
DM Upton, S Creese
Harvard business review 92 (9), 94-101, 2014
622014
Privacy is the boring bit: user perceptions and behaviour in the internet-of-things
M Williams, JRC Nurse, S Creese
2017 15th Annual Conference on Privacy, Security and Trust (PST), 181-18109, 2017
612017
Data protection-aware design for cloud services
S Creese, P Hopkins, S Pearson, Y Shen
Cloud Computing, 119-130, 2009
612009
Caught in the act of an insider attack: detection and assessment of insider threat
PA Legg, O Buckley, M Goldsmith, S Creese
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
592015
Information quality and trustworthiness: A topical state-of-the-art review
JRC Nurse, SS Rahman, S Creese, M Goldsmith, K Lamberts
IEEE, 2011
592011
The attacker in ubiquitous computing environments: Formalising the threat model
AW Roscoe, SJ Creese, MH Goldsmith, I Zakiuddin
592003
Exploiting empirical engagement in authentication protocol design
S Creese, M Goldsmith, R Harrison, B Roscoe, P Whittaker, I Zakiuddin
Security in Pervasive Computing, 119-133, 2005
572005
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20