Identity Security in Cyberspace: Publications
-
[1]
A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks
Sadie Creese‚ Michael Goldsmith‚ Jason R.C. Nurse and Elizabeth Phillips
In 11th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−12). Pages 1124−1131. IEEE. 2012.
Details about A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | BibTeX data for A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | Download (pdf) of A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | DOI (10.1109/TrustCom.2012.22)
-
[2]
Applying Social Network Analysis to Security
Elizabeth Phillips‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In International Conference on Cyber Security for Sustainable Society. Pages 11–27. 2015.
Details about Applying Social Network Analysis to Security | BibTeX data for Applying Social Network Analysis to Security | Download (pdf) of Applying Social Network Analysis to Security
-
[3]
Identity attribution across CyberSpace and the Natural Space
D. Hodges‚ J.R.C. Nurse‚ M. Goldsmith and S. Creese
In The International Crime and Intelligence Analysis Conference. 2012.
Details about Identity attribution across CyberSpace and the Natural Space | BibTeX data for Identity attribution across CyberSpace and the Natural Space | Link to Identity attribution across CyberSpace and the Natural Space
-
[4]
Inferring Social Relationships from Technology−Level Device Connections
Jason R. C. Nurse‚ Jess Pumphrey‚ Thomas Gibson−Robinson‚ Michael Goldsmith and Sadie Creese
In 12th International Conference on Privacy‚ Security and Trust (PST). Pages 40 − 47. IEEE. 2014.
Details about Inferring Social Relationships from Technology−Level Device Connections | BibTeX data for Inferring Social Relationships from Technology−Level Device Connections | Download (pdf) of Inferring Social Relationships from Technology−Level Device Connections | DOI (10.1109/PST.2014.6890922)
-
[5]
Investigating the leakage of sensitive personal and organisational information in email headers
Jason R. C. Nurse‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Journal of Internet Services and Information Security. Vol. 5. No. 1. 2015.
Details about Investigating the leakage of sensitive personal and organisational information in email headers | BibTeX data for Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers
-
[6]
Predicting Graphical Passwords
Matthieu Devlin‚ Jason R. C. Nurse‚ Duncan Hodges‚ Michael Goldsmith and Sadie Creese
In Theo Tryfonas and Ioannis Askoxylakis, editors, International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 17th International Conference on Human−Computer Interaction (HCI). Pages 23–35. Springer. 2015.
Details about Predicting Graphical Passwords | BibTeX data for Predicting Graphical Passwords | Download (pdf) of Predicting Graphical Passwords | DOI (10.1007/978-3-319-20376-8_3)
-
[7]
Trustworthy and Effective Communication of Cybersecurity Risks: A Review
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 1st Workshop on Socio−Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). IEEE. 2011.
Details about Trustworthy and Effective Communication of Cybersecurity Risks: A Review | BibTeX data for Trustworthy and Effective Communication of Cybersecurity Risks: A Review | Download (pdf) of Trustworthy and Effective Communication of Cybersecurity Risks: A Review | DOI (10.1109/STAST.2011.6059257)