Security risk assessment in Internet of Things systems JRC Nurse, S Creese, D De Roure IT professional 19 (5), 20-26, 2017 | 138* | 2017 |
User k-anonymity for privacy preserving data mining of query logs G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca Information Processing & Management 48 (3), 476-487, 2012 | 65 | 2012 |
Baiting the hook: factors impacting susceptibility to phishing attacks C Iuga, JRC Nurse, A Erola Human-centric Computing and Information Sciences 6 (1), 8, 2016 | 52 | 2016 |
Smart insiders: exploring the threat from insiders using the internet-of-things JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese 2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015 | 44 | 2015 |
Exploiting social networks to provide privacy in personalized web search A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz Journal of Systems and Software 84 (10), 1734-1745, 2011 | 42 | 2011 |
Utility preserving query log anonymization via semantic microaggregation M Batet, A Erola, D Sánchez, J Castellà-Roca Information Sciences 242, 49-63, 2013 | 39 | 2013 |
The anatomy of online deception: What makes automated text convincing? RM Everett, JRC Nurse, A Erola Proceedings of the 31st Annual ACM symposium on applied computing, 1115-1120, 2016 | 29 | 2016 |
Semantic microaggregation for the anonymization of query logs A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra International Conference on Privacy in Statistical Databases, 127-137, 2010 | 25 | 2010 |
Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ... arXiv preprint arXiv:2006.11929, 2020 | 23 | 2020 |
Semantic microaggregation for the anonymization of query logs using the open directory project A Erola, J Castella-Roca, G Navarro-Arribas, V Torra SORT, 41-58, 2011 | 17 | 2011 |
Validating an insider threat detection system: A real scenario perspective I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese 2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016 | 14 | 2016 |
Investigating the leakage of sensitive personal and organisational information in email headers JRC Nurse, A Erola, M Goldsmith, S Creese Journal of Internet Services and Information Security 5 (1), 70-84, 2015 | 14 | 2015 |
Semantic Anonymisation of Set-valued Data. M Batet, A Erola, D Sánchez, J Castellà-Roca ICAART (1), 102-112, 2014 | 12 | 2014 |
The challenge of detecting sophisticated attacks: Insights from SOC Analysts O Akinrolabu, I Agrafiotis, A Erola Proceedings of the 13th International Conference on Availability …, 2018 | 9 | 2018 |
Formalising Policies for Insider-threat Detection: A Tripwire Grammar. I Agrafiotis, A Erola, M Goldsmith, S Creese J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8 (1), 26-43, 2017 | 9 | 2017 |
A tripwire grammar for insider threat detection I Agrafiotis, A Erola, M Goldsmith, S Creese Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016 | 9 | 2016 |
Analysing cyber-insurance claims to design harm-propagation trees L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese 2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019 | 4 | 2019 |
Analytics for characterising and measuring the naturalness of online personae JRC Nurse, A Erola, T Gibson-Robinson, M Goldsmith, S Creese Security Informatics 5 (1), 1-14, 2016 | 4 | 2016 |
Using search results to microaggregate query logs semantically A Erola, J Castella-Roca Data Privacy Management and Autonomous Spontaneous Security, 148-161, 2013 | 4 | 2013 |
RicherPicture: Semi-automated cyber defence using context-aware data analytics A Erola, I Agrafiotis, J Happa, M Goldsmith, S Creese, PA Legg 2017 International Conference On Cyber Situational Awareness, Data Analytics …, 2017 | 2 | 2017 |