default search action
Sadie Creese
- > Home > Persons > Sadie Creese
Publications
- 2022
- [j32]Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. Comput. Secur. 113: 102545 (2022) - [j30]Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations. J. Inf. Secur. Appl. 67: 103167 (2022) - 2021
- [c65]Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Control Effectiveness: a Capture-the-Flag Study. ARES 2021: 87:1-87:10 - 2020
- [c63]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CyberSA 2020: 1-8 - [i10]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CoRR abs/2008.04713 (2020) - 2019
- [j23]Jassim Happa, Thomas Bashford-Rogers, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Anomaly Detection Using Pattern-of-Life Visual Metaphors. IEEE Access 7: 154018-154034 (2019) - [c62]Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Analysing cyber-insurance claims to design harm-propagation trees. CyberSA 2019: 1-4 - 2018
- [j17]Ioannis Agrafiotis, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, David Upton:
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1): tyy006 (2018) - [j16]Cheyenne Atapour, Ioannis Agrafiotis, Sadie Creese:
Modeling Advanced Persistent Threats to enhance anomaly detection techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(4): 71-102 (2018) - [c58]Haozhe Zhang, Ioannis Agrafiotis, Arnau Erola, Sadie Creese, Michael Goldsmith:
A State Machine System for Insider Threat Detection. GraMSec@FLoC 2018: 111-129 - 2017
- [j14]Daniel W. Woods, Ioannis Agrafiotis, Jason R. C. Nurse, Sadie Creese:
Mapping the coverage of security controls in cyber insurance proposal forms. J. Internet Serv. Appl. 8(1): 8:1-8:13 (2017) - [j13]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
Formalising Policies for Insider-threat Detection: A Tripwire Grammar. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 26-43 (2017) - [c57]Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, Philip A. Legg:
RicherPicture: Semi-automated cyber defence using context-aware data analytics. CyberSA 2017: 1-8 - [c56]Jason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese:
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. HCI (22) 2017: 366-383 - 2016
- [c53]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
A Tripwire Grammar for Insider Threat Detection. MIST@CCS 2016: 105-108 - [c52]Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
A Pragmatic System-failure Assessment and Response Model. ICISSP 2016: 503-508 - [c49]Ioannis Agrafiotis, Arnau Erola, Jassim Happa, Michael Goldsmith, Sadie Creese:
Validating an Insider Threat Detection System: A Real Scenario Perspective. IEEE Symposium on Security and Privacy Workshops 2016: 286-295 - 2015
- [c45]Jason R. C. Nurse, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things. SIoT 2015: 5-14 - 2014
- [j6]Ioannis Agrafiotis, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. J. Internet Serv. Inf. Secur. 4(4): 127-137 (2014) - [c44]Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. HCI (24) 2014: 270-281 - 2013
- [j4]Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 20-37 (2013) - [c35]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Communicating trustworthiness using radar graphs: A detailed look. PST 2013: 333-339 - [c32]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Building Confidence in Information-Trustworthiness Metrics for Decision Support. TrustCom/ISPA/IUCC 2013: 535-543 - 2011
- [c21]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Developing a Strategy for Automated Privacy Testing Suites. PrimeLife 2011: 32-44 - [c20]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation. PrimeLife 2011: 232-244 - 2010
- [c14]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements. PrimeLife 2010: 271-282 - 2009
- [c10]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data. PrimeLife 2009: 246-258
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint