Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ... Computers & security 105, 102248, 2021 | 748 | 2021 |
Baiting the hook: factors impacting susceptibility to phishing attacks C Iuga, JRC Nurse, A Erola Human-centric Computing and Information Sciences 6, 1-20, 2016 | 140 | 2016 |
User k-anonymity for privacy preserving data mining of query logs G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca Information Processing & Management 48 (3), 476-487, 2012 | 81 | 2012 |
Smart insiders: exploring the threat from insiders using the internet-of-things JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese 2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015 | 59 | 2015 |
Exploiting social networks to provide privacy in personalized web search A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz Journal of Systems and Software 84 (10), 1734-1745, 2011 | 53 | 2011 |
The anatomy of online deception: What makes automated text convincing? RM Everett, JRC Nurse, A Erola Proceedings of the 31st Annual ACM symposium on applied computing, 1115-1120, 2016 | 49 | 2016 |
The data that drives cyber insurance: A study into the underwriting and claims processes JRC Nurse, L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese 2020 International conference on cyber situational awareness, data analytics …, 2020 | 47 | 2020 |
Utility preserving query log anonymization via semantic microaggregation M Batet, A Erola, D Sánchez, J Castellà-Roca Information Sciences 242, 49-63, 2013 | 45 | 2013 |
The challenge of detecting sophisticated attacks: Insights from SOC Analysts O Akinrolabu, I Agrafiotis, A Erola Proceedings of the 13th international conference on availability …, 2018 | 32 | 2018 |
A system to calculate Cyber Value-at-Risk A Erola, I Agrafiotis, JRC Nurse, L Axon, M Goldsmith, S Creese Computers & Security 113, 102545, 2022 | 30 | 2022 |
Semantic microaggregation for the anonymization of query logs A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra Privacy in Statistical Databases: UNESCO Chair in Data Privacy …, 2010 | 26 | 2010 |
Validating an insider threat detection system: A real scenario perspective I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese 2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016 | 22 | 2016 |
Investigating the leakage of sensitive personal and organisational information in email headers JRC Nurse, A Erola, M Goldsmith, S Creese Journal of Internet Services and Information Security 5 (1), 70-84, 2015 | 18 | 2015 |
Semantic microaggregation for the anonymization of query logs using the open directory project A Erola, J Castella-Roca, G Navarro-Arribas, V Torra SORT, 41-58, 2011 | 18 | 2011 |
A tripwire grammar for insider threat detection I Agrafiotis, A Erola, M Goldsmith, S Creese Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016 | 16 | 2016 |
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations A Erola, I Agrafiotis, M Goldsmith, S Creese Journal of Information Security and Applications 67, 103167, 2022 | 15 | 2022 |
Analysing cyber-insurance claims to design harm-propagation trees L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese 2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019 | 13 | 2019 |
Formalising policies for insider-threat detection: A tripwire grammar. I Agrafiotis, A Erola, M Goldsmith, S Creese J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8 (1), 26-43, 2017 | 13 | 2017 |
Semantic Anonymisation of Set-valued Data. M Batet, A Erola, D Sánchez, J Castellà-Roca ICAART (1), 102-112, 2014 | 13 | 2014 |
RicherPicture: Semi-automated cyber defence using context-aware data analytics A Erola, I Agrafiotis, J Happa, M Goldsmith, S Creese, PA Legg 2017 International Conference On Cyber Situational Awareness, Data Analytics …, 2017 | 11 | 2017 |