Zobrazeno 1 - 10
of 224
pro vyhledávání: '"Michael Goldsmith"'
Publikováno v:
IEEE Access, Vol 7, Pp 154018-154034 (2019)
Complex dependencies exist across the technology estate, users and purposes of machines. This can make it difficult to efficiently detect attacks. Visualization to date is mainly used to communicate patterns of raw logs, or to visualize the output of
Externí odkaz:
https://doaj.org/article/93ade28ec9b5475f9c05ed365c061854
Autor:
Jassim Happa, Michael Goldsmith
Publikováno v:
PSU Research Review, Vol 1, Iss 2, Pp 76-90 (2017)
Purpose – Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are o
Externí odkaz:
https://doaj.org/article/c5cc85e21e094d0d8861c358c75f7e65
Publikováno v:
Journal of Information Policy. 12:353-386
This article explores the implications of a shift to working from home (WFH) in the context of the COVID-19 pandemic. The literature and news coverage of this topic focuses on rising concerns over cybersecurity. Based on in-depth exploratory intervie
Autor:
Louise Axon, Arnau Erola, Ioannis Agrafiotis, Ganbayar Uuganbayar, Michael Goldsmith, Sadie Creese
The accelerated pace with which companies, governments and institutions embrace digital transformation is creating opportunities for economic prosperity, but also increases the threat landscape. Recent orchestrated cyber-attacks have revealed the unp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bd153ffd3af6f7571a11d172cc75a242
https://doi.org/10.1145/3579648
https://doi.org/10.1145/3579648
Autor:
Michael Goldsmith, Martin Helmhout, Sadie Creese, Thomas Bashford-Rogers, Ioannis Agrafiotis, Jassim Happa
Publikováno v:
Digital Threats: Research and Practice. 2:1-35
It is difficult to discern real-world consequences of attacks on an enterprise when investigating network-centric data alone. In recent years, many tools have been developed to help understand attacks using visualisation, but few aim to predict real-
Autor:
William H. Dutton, Sadie Creese, Patricia Esteve-Gonzalez, Michael Goldsmith, Carolin Weisser Harris
Publikováno v:
SSRN Electronic Journal.
Autor:
Sadie Creese, William H. Dutton, Patricia Esteve-González, Michael Goldsmith, Eva Nagyfejeo, Jamie Saunders, Basie von Solms, Carolin Weisser Harris
Publikováno v:
SSRN Electronic Journal.
Autor:
Michael Goldsmith
Publikováno v:
Journal of the Polynesian Society. 128:457-474
This paper examines the similarities and differences between the forms of external rule established in nineteenth-century Tuvalu first by the London Missionary Society and then by the British government through its imperial outreach. These raise the
Autor:
Arnau Erola, Sadie Creese, Michael Goldsmith, Louise Axon, Ioannis Agrafiotis, Jason R. C. Nurse
In the face of increasing numbers of cyber-attacks, it is critical for organisations to understand the risk they are exposed to even after deploying security controls. This residual risk forms part of the ongoing operational environment, and must be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7349ad788e87b4ca50d01b3e69202d3c
https://kar.kent.ac.uk/91647/11/1-s2.0-S0167404821003692-main.pdf
https://kar.kent.ac.uk/91647/11/1-s2.0-S0167404821003692-main.pdf
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030913557
Among the various types of spyware, screenloggers are distinguished by their ability to capture screenshots. This gives them considerable nuisance capacity, giving rise to theft of sensitive data or, failing that, to serious invasions of the privacy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::930f3eefdc5aae3effd26be50193d138
https://ora.ox.ac.uk/objects/uuid:e9f75ec6-bd35-4741-8f93-c28ee482f902
https://ora.ox.ac.uk/objects/uuid:e9f75ec6-bd35-4741-8f93-c28ee482f902