Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Nurse, JRC"'
Publikováno v:
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media ISBN: 9789811964138
International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2022)
International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2022)
The consumer Internet of Things (IoT) is a fast-growing area of technology, increasingly embedded in the public and private spheres, including both in and on bodies. There are various security concerns and academic investigations into potential risks
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eb0aad6c96faab54d151a23b029294a4
https://ora.ox.ac.uk/objects/uuid:f2c3134b-a6bc-4071-b207-ec7f7cedb118
https://ora.ox.ac.uk/objects/uuid:f2c3134b-a6bc-4071-b207-ec7f7cedb118
Publikováno v:
37th ACM/SIGAPP Symposium On Applied Computing
The rapid integration of the Internet into our daily lives has led to many benefits but also to a number of new, wide-spread threats such as online hate, trolling, bullying, and generally aggressive behaviours. While research has traditionally explor
In this RISJ factsheet we analyse 720,799 news-related tweets from a larger dataset of 4.4 million tweets collected during the 2017 German Federal Election to examine the role of digital-born and legacy news media in online political discussions in G
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3e142798b41330eb73e6568d125bb341
https://ora.ox.ac.uk/objects/uuid:310d1c47-a226-4f61-9aba-baa6e98e3adc
https://ora.ox.ac.uk/objects/uuid:310d1c47-a226-4f61-9aba-baa6e98e3adc
Autor:
Bada, M, Nurse, JRC
PurposeThe purpose of this study is to focus on organisation’s cybersecurity strategy and propose a high-level programme for cybersecurity education and awareness to be used when targeting small- and medium-sized enterprises/businesses (SMEs/SMBs)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ec695237cfedd6fb0f8dc85ee435d832
https://www.repository.cam.ac.uk/handle/1810/291895
https://www.repository.cam.ac.uk/handle/1810/291895
Publikováno v:
Computers & Security. 87:101600
Traditional frameworks for risk assessment do not work well for cloud computing. While recent work has often focussed on the risks faced by firms adopting or selecting cloud services, there has been little research on how cloud providers might assess
Autor:
Nurse, JRC, Bertino, E
As society has embraced technology and systems to promote services, trade and ubiquitous communication, it has also inadvertently exposed itself to a plethora of security risks. One of the most significant of these risks is that of insider threat, wh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::78ea58e6bc3c4bf9c03bbef7ab4180f1
https://kar.kent.ac.uk/67469/1/jowua-v8n1-0.pdf
https://kar.kent.ac.uk/67469/1/jowua-v8n1-0.pdf
Computer network attackers chain system exploits together to achieve their goals, which range from stealing data to corrupting systems. Attack graphs represent these paths through the network, and provide the basis for calculating many security metri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1064::33d332a34e3e17444717779f790b70f1
https://ora.ox.ac.uk/objects/uuid:b156c235-d097-4ba4-bd5a-927833f02ea0
https://ora.ox.ac.uk/objects/uuid:b156c235-d097-4ba4-bd5a-927833f02ea0
Autor:
Nouh, MA
“The Internet is the crime scene of the 21st century.” The complexity of cybercrimes is constantly increasing with advanced tools, attack vectors, and Modus Operandi adopted by offenders every day. Criminals have easy access to advanced technical
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1064::1ba443a826946832cd2307465393b457
https://ora.ox.ac.uk/objects/uuid:5e9a7848-792a-48f8-b214-7aed34ce7be7
https://ora.ox.ac.uk/objects/uuid:5e9a7848-792a-48f8-b214-7aed34ce7be7
Autor:
Stevens F; School of Computing, University of Kent, Canterbury, United Kingdom., Nurse JRC; School of Computing, University of Kent, Canterbury, United Kingdom., Arief B; School of Computing, University of Kent, Canterbury, United Kingdom.
Publikováno v:
Cyberpsychology, behavior and social networking [Cyberpsychol Behav Soc Netw] 2021 Jun; Vol. 24 (6), pp. 367-376. Date of Electronic Publication: 2020 Nov 12.
Autor:
Lallie HS; WMG, University of Warwick, Coventry, UK., Shepherd LA; School of Design and Informatics, Abertay University, Dundee, UK., Nurse JRC; School of Computing, University of Kent, Canterbury, UK., Erola A; Department of Computer Science, University of Oxford, Oxford, UK., Epiphaniou G; WMG, University of Warwick, Coventry, UK., Maple C; WMG, University of Warwick, Coventry, UK., Bellekens X; Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, UK.
Publikováno v:
Computers & security [Comput Secur] 2021 Jun; Vol. 105, pp. 102248. Date of Electronic Publication: 2021 Mar 03.