Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Louise Axon"'
Autor:
Louise Axon, Arnau Erola, Ioannis Agrafiotis, Ganbayar Uuganbayar, Michael Goldsmith, Sadie Creese
The accelerated pace with which companies, governments and institutions embrace digital transformation is creating opportunities for economic prosperity, but also increases the threat landscape. Recent orchestrated cyber-attacks have revealed the unp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bd153ffd3af6f7571a11d172cc75a242
https://doi.org/10.1145/3579648
https://doi.org/10.1145/3579648
Publikováno v:
Proceedings of the Annual Hawaii International Conference on System Sciences.
Autor:
Arnau Erola, Sadie Creese, Michael Goldsmith, Louise Axon, Ioannis Agrafiotis, Jason R. C. Nurse
In the face of increasing numbers of cyber-attacks, it is critical for organisations to understand the risk they are exposed to even after deploying security controls. This residual risk forms part of the ongoing operational environment, and must be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7349ad788e87b4ca50d01b3e69202d3c
https://kar.kent.ac.uk/91647/11/1-s2.0-S0167404821003692-main.pdf
https://kar.kent.ac.uk/91647/11/1-s2.0-S0167404821003692-main.pdf
Autor:
Arnau Erola, Jason R. C. Nurse, Louise Axon, Alastair Janse van Rensburg, Michael Goldsmith, Sadie Creese
Publikováno v:
ARES
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the security of their systems. Determining prioritisation of the deployment of controls and understanding their likely impact on overall cybersecurity post
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cc4182936dcae9e539c5253b42b961b8
https://ora.ox.ac.uk/objects/uuid:978f019e-a900-443b-bb5d-c30f624874ca
https://ora.ox.ac.uk/objects/uuid:978f019e-a900-443b-bb5d-c30f624874ca
Autor:
Louise Axon, Michael Goldsmith, Sadie Creese, Alastair Janse van Rensburg, Ioannis Agrafiotis, Arnau Erola
Publikováno v:
ARES
As cybersecurity breaches continue to increase in number and cost, and the demand for cyber-insurance rises, the ability to reason accurately about an organisation’s residual risk is of paramount importance. Security controls are integral to risk p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a96d1ea1e303092c702e80082f58cb8d
https://doi.org/10.1145/3465481.3470095
https://doi.org/10.1145/3465481.3470095
Publikováno v:
Computers & Security. 83:367-388
Sonification, in which data is represented as sound, can be used to turn network attacks and network-security information into audio signals. This could complement the range of security-monitoring tools currently used in Security Operations Centres (
Publikováno v:
Journal of the Audio Engineering Society. 66:1016-1032
Mappings from parameters of data to parameters of sound form the basis of parameter-mapping sonification. The mappings used and their design can impact the utility of sonification systems, and the ability of users to interpret them. While some prior
Publikováno v:
SSRN Electronic Journal.
This working paper introduces ‘structured field coding’ (SFC) as an approach to coding observations based on multiple methods, quantitative as well as qualitative. This approach differs from open field coding in providing a structure for coding o
Autor:
Sadie Creese, Ioannis Agrafiotis, Louise Axon, Jason R. C. Nurse, Arnau Erola, Michael Goldsmith
Publikováno v:
CyberSA 2020
Cyber insurance is a key component in risk management, intended to transfer risks and support business recovery in the event of a cyber incident. As cyber insurance is still a new concept in practice and research, there are many unanswered questions
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::91b8ef88531b297db950e42b38a5134c
Sonification (the representation of data as sound) may offer a solution to some of the network-security monitoring challenges faced in security operations centres (SOCs). Prior work has shown that sonification can present network-security information
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7284798991c3b9411bf03cb1372851c4
https://ora.ox.ac.uk/objects/uuid:abda0d07-c8d2-46e7-9b7f-b861d0d6583e
https://ora.ox.ac.uk/objects/uuid:abda0d07-c8d2-46e7-9b7f-b861d0d6583e