Michael Goldsmith
Michael Goldsmith
Department of Computer Science,
Robert Hooke Building
Directions Postal Address
Selected Publications
-
The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance
Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith‚ Jason R.C. Nurse and David Upton
No. RR−17−01. DCS. Oxford‚ UK. 2017.
Details about The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance | BibTeX data for The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance | Download (pdf) of The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance
-
Reflecting on the Use of Sonification for Network Monitoring
Louise Axon‚ Sadie Creese‚ Michael Goldsmith and Jason R.C. Nurse
In 10th International Conference on Emerging Security Information‚ Systems and Technologies. Pages 254–261. 2016.
Details about Reflecting on the Use of Sonification for Network Monitoring | BibTeX data for Reflecting on the Use of Sonification for Network Monitoring | Download (pdf) of Reflecting on the Use of Sonification for Network Monitoring
-
Identifying attack patterns for insider threat detection
Ioannis Agrafiotis‚ Jason R. C. Nurse‚ Oliver Buckley‚ Phil Legg‚ Sadie Creese and Michael Goldsmith
In Computer Fraud & Security. No. 7. Pages 9–17. July, 2015.
Details about Identifying attack patterns for insider threat detection | BibTeX data for Identifying attack patterns for insider threat detection | DOI (10.1016/S1361-3723(15)30066-X) | Link to Identifying attack patterns for insider threat detection