Follow
Louise Axon
Title
Cited by
Cited by
Year
PB-PKI: a privacy-aware blockchain-based PKI
L Axon, M Goldsmith
International Conference on Security and Cryptography (SECRYPT), 2016
204*2016
Sonification in security operations centres: what do security practitioners think?
LM Axon, B Alahmadi, JRC Nurse, M Goldsmith, S Creese
Workshop on Usable Security (USEC), NDSS, 2018
312018
Privacy requirements in cybersecurity applications of blockchain
L Axon, M Goldsmith, S Creese
Advances in Computers 111, 229-278, 2018
182018
A Formalised Approach to Designing Sonification Systems for Network− Security Monitoring
L Axon, J Nurse
International Journal on Advances in Security, 2017
182017
Future scenarios and challenges for security and privacy
M Williams, L Axon, JRC Nurse, S Creese
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
172016
The data that drives cyber insurance: A study into the underwriting and claims processes
JRC Nurse, L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2020 International conference on cyber situational awareness, data analytics …, 2020
142020
Reflecting on the Use of Sonification for Network Monitoring
L Axon, S Creese, M Goldsmith, JRC Nurse
SECURWARE 2016 : The Tenth International Conference on Emerging Security …, 2016
132016
Analysing cyber-insurance claims to design harm-propagation trees
L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019
102019
Hearing Attacks in Network Data: an Effectiveness Study
L Axon, J Happa, M Goldsmith, S Creese
Computers & Security 83, 367-388, 2019
62019
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice
L Axon, BA AlAhmadi, JRC Nurse, M Goldsmith, S Creese
Journal of Cybersecurity 6 (1), tyaa004, 2020
52020
Sonification to support the monitoring tasks of security operations centres
L Axon, J Happa, AJ van Rensburg, M Goldsmith, S Creese
IEEE Transactions on Dependable and Secure Computing 18 (3), 1227-1244, 2019
52019
Sonification mappings: estimating effectiveness, polarities and scaling in an online experiment
L Axon, M Goldsmith, S Creese
Journal of the Audio Engineering Society 66 (12), 1016-1032, 2018
32018
99% False Positives: A Qualitative Study of SOC Analysts’ Perspectives on Security Alarms
BA Alahmadi, L Axon, I Martinovic
Proceedings of the 31st USENIX Security Symposium (USENIX Security), Boston …, 2022
12022
A system to calculate cyber-value-at-risk
A Erola, I Agrafiotis, JRC Nurse, L Axon, M Goldsmith, S Creese
Computers & Security 113, 102545, 2022
12022
Introduction to the Minitrack on International Perspectives for Cybersecurity
E Calandro, C Rudolph, W Chigona, L Axon
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
2022
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness
L Axon, A Erola, A Janse van Rensburg, JRC Nurse, M Goldsmith, ...
International Workshop on Information Security Methodology and Replication …, 2021
2021
Emerging cybersecurity capability gaps in the industrial internet of things: overview and research agenda
L Axon, K Fletcher, M Stolz, R Hannigan, A El Kaafarani, M Goldsmith, ...
ACM Digital Threats: Research and Practice, 2021
2021
Control effectiveness: a capture-the-flag study
A Erola, L Axon, A Janse Van Rensburg, I Agrafiotis, M Goldsmith, ...
International Workshop on Information Security Methodology and Replication …, 2021
2021
Sonification for network-security monitoring
L Axon
University of Oxford, 2018
2018
Revisiting linkability for vehicular communications: Continuous linkability
L Axon
2015
The system can't perform the operation now. Try again later.
Articles 1–20