Arnau Erola
Arnau Erola
Researcher, Department of Computer Science, University Of Oxford
Verified email at cs.ox.ac.uk - Homepage
TitleCited byYear
Security risk assessment in Internet of Things systems
JRC Nurse, S Creese, D De Roure
IT professional 19 (5), 20-26, 2017
85*2017
User k-anonymity for privacy preserving data mining of query logs
G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca
Information Processing & Management 48 (3), 476-487, 2012
542012
Exploiting social networks to provide privacy in personalized web search
A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz
Journal of Systems and Software 84 (10), 1734-1745, 2011
382011
Utility preserving query log anonymization via semantic microaggregation
M Batet, A Erola, D Sánchez, J Castellà-Roca
Information Sciences 242, 49-63, 2013
372013
Smart insiders: exploring the threat from insiders using the internet-of-things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015
352015
Baiting the hook: factors impacting susceptibility to phishing attacks
C Iuga, JRC Nurse, A Erola
Human-centric Computing and Information Sciences 6 (1), 8, 2016
302016
Semantic microaggregation for the anonymization of query logs
A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra
International Conference on Privacy in Statistical Databases, 127-137, 2010
252010
The anatomy of online deception: What makes automated text convincing?
RM Everett, JRC Nurse, A Erola
Proceedings of the 31st Annual ACM symposium on applied computing, 1115-1120, 2016
202016
Semantic microaggregation for the anonymization of query logs using the open directory project
A Erola, J Castella-Roca, G Navarro-Arribas, V Torra
SORT, 41-58, 2011
152011
Investigating the leakage of sensitive personal and organisational information in email headers
JRC Nurse, A Erola, M Goldsmith, S Creese
Journal of Internet Services and Information Security 5 (1), 70-84, 2015
132015
Validating an insider threat detection system: A real scenario perspective
I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese
2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016
102016
Semantic Anonymisation of Set-valued Data.
M Batet, A Erola, D Sánchez, J Castellà-Roca
ICAART (1), 102-112, 2014
92014
Formalising Policies for Insider-threat Detection: A Tripwire Grammar.
I Agrafiotis, A Erola, M Goldsmith, S Creese
JoWUA 8 (1), 26-43, 2017
82017
The challenge of detecting sophisticated attacks: Insights from SOC Analysts
O Akinrolabu, I Agrafiotis, A Erola
Proceedings of the 13th International Conference on Availability …, 2018
52018
A tripwire grammar for insider threat detection
I Agrafiotis, A Erola, M Goldsmith, S Creese
Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016
42016
Analysing cyber-insurance claims to design harm-propagation trees
L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019
22019
An Independent Assessment of the Procedural Components of the Estonian Internet Voting System
J Nurse, I Agrafiotis, A Erola, M Bada, T Roberts, M Williams, M Goldsmith, ...
Working Paper 6--Cyber Studies Programme Working Paper Series in Department …, 2016
22016
Using search results to microaggregate query logs semantically
A Erola, J Castella-Roca
Data Privacy Management and Autonomous Spontaneous Security, 148-161, 2013
22013
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System
JRC Nurse, I Agrafiotis, A Erola, M Bada, T Roberts, M Williams, ...
International Conference on Human Aspects of Information Security, Privacy …, 2017
12017
Analytics for characterising and measuring the naturalness of online personae
JRC Nurse, A Erola, T Gibson-Robinson, M Goldsmith, S Creese
Security Informatics 5 (1), 3, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20