Modelling and Analysis of Security Protocols P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe Addison Wesley, 2001 | 801* | 2001 |
Programming in occam 2 G Jones, M Goldsmith Prentice-Hall, 1988 | 401 | 1988 |
Understanding Insider Threat: A Framework for Characterising Attacks JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ... IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT 2014 …, 2014 | 225 | 2014 |
Hierarchical compression for model-checking CSP or how to check 10^20 dining philosophers for deadlock A Roscoe, P Gardiner, M Goldsmith, J Hulance, D Jackson, J Scattergood Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995 | 170 | 1995 |
What is intransitive noninterference? AW Roscoe, MH Goldsmith Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE …, 1999 | 162 | 1999 |
Insider attacks in cloud computing AJ Duncan, S Creese, M Goldsmith 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 155 | 2012 |
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate I Agrafiotis, JRC Nurse, M Goldsmith, S Creese, D Upton Journal of Cybersecurity 4 (1), tyy006, 2018 | 150 | 2018 |
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment P Legg, O Buckley, M Goldsmith, S Creese IEEE Systems Journal 99, 1-10, 2015 | 129 | 2015 |
PB-PKI: a privacy-aware blockchain-based PKI LM Axon, M Goldsmith SECRYPT 2017, 2016 | 113 | 2016 |
Guidelines for usable cybersecurity: past and present JRC Nurse, S Creese, M Goldsmith, K Lamberts Cyberspace Safety and Security (CSS), 2011 Third International Workshop on …, 2011 | 102 | 2011 |
Towards a conceptual model and reasoning structure for insider threat detection P Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ... Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013 | 96 | 2013 |
The perfect ‘spy’ for model-checking cryptoprotocols AW Roscoe, MH Goldsmith Proceedings of DIMACS workshop on the design and formal verification of …, 1997 | 85 | 1997 |
FDR2 user manual P Gardiner, M Goldsmith, J Hulance, D Jackson, AW Roscoe, ... Formal Systems (Europe) Ltd, 2000 | 82* | 2000 |
Authentication for pervasive computing S Creese, M Goldsmith, B Roscoe, I Zakiuddin Security in Pervasive Computing, 439-488, 2004 | 71 | 2004 |
Trustworthy and effective communication of cybersecurity risks: a review JRC Nurse, S Creese, M Goldsmith, K Lamberts 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) at 5th …, 2011 | 67 | 2011 |
Identifying attack patterns for insider threat detection I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith Computer Fraud & Security 2015 (7), 9-17, 2015 | 62 | 2015 |
The Attacker in Ubiquitous Computing Environments: Formalising the Threat Model S Creese, M Goldsmith, B Roscoe, I Zakiuddin Formal Aspects of Security and Trust, 2003 | 61* | 2003 |
Exploiting empirical engagement in authentication protocol design S Creese, M Goldsmith, R Harrison, B Roscoe, P Whittaker, I Zakiuddin Security in Pervasive Computing, 119-133, 2005 | 57 | 2005 |
Information Quality and Trustworthiness: A Topical State-of-the-Art Review JRC Nurse, SS Rahman, S Creese, M Goldsmith, K Lamberts International Conference on Computer Applications and Network Security, 2011 | 56 | 2011 |
Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese 2015 International Workshop on Secure Internet of Things (SIoT), 2015 | 53 | 2015 |