关注
Arnau Erola
Arnau Erola
Researcher, Department of Computer Science, University Of Oxford
在 cs.ox.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
Computers & security 105, 102248, 2021
8012021
Baiting the hook: factors impacting susceptibility to phishing attacks
C Iuga, JRC Nurse, A Erola
Human-centric Computing and Information Sciences 6, 1-20, 2016
1492016
User k-anonymity for privacy preserving data mining of query logs
G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca
Information Processing & Management 48 (3), 476-487, 2012
822012
Smart insiders: exploring the threat from insiders using the internet-of-things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015
612015
Exploiting social networks to provide privacy in personalized web search
A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz
Journal of Systems and Software 84 (10), 1734-1745, 2011
532011
The anatomy of online deception: What makes automated text convincing?
RM Everett, JRC Nurse, A Erola
Proceedings of the 31st Annual ACM symposium on applied computing, 1115-1120, 2016
502016
The data that drives cyber insurance: A study into the underwriting and claims processes
JRC Nurse, L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2020 International conference on cyber situational awareness, data analytics …, 2020
492020
Utility preserving query log anonymization via semantic microaggregation
M Batet, A Erola, D Sánchez, J Castellà-Roca
Information Sciences 242, 49-63, 2013
452013
The challenge of detecting sophisticated attacks: Insights from SOC Analysts
O Akinrolabu, I Agrafiotis, A Erola
Proceedings of the 13th international conference on availability …, 2018
432018
A system to calculate Cyber Value-at-Risk
A Erola, I Agrafiotis, JRC Nurse, L Axon, M Goldsmith, S Creese
Computers & Security 113, 102545, 2022
332022
Semantic microaggregation for the anonymization of query logs
A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra
Privacy in Statistical Databases: UNESCO Chair in Data Privacy …, 2010
262010
Validating an insider threat detection system: A real scenario perspective
I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese
2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016
222016
Investigating the leakage of sensitive personal and organisational information in email headers
JRC Nurse, A Erola, M Goldsmith, S Creese
Journal of Internet Services and Information Security 5 (1), 70-84, 2015
192015
A tripwire grammar for insider threat detection
I Agrafiotis, A Erola, M Goldsmith, S Creese
Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016
182016
Semantic microaggregation for the anonymization of query logs using the open directory project
A Erola, J Castella-Roca, G Navarro-Arribas, V Torra
SORT, 41-58, 2011
182011
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
A Erola, I Agrafiotis, M Goldsmith, S Creese
Journal of Information Security and Applications 67, 103167, 2022
162022
RicherPicture: Semi-automated cyber defence using context-aware data analytics
A Erola, I Agrafiotis, J Happa, M Goldsmith, S Creese, PA Legg
2017 International Conference On Cyber Situational Awareness, Data Analytics …, 2017
142017
Formalising policies for insider-threat detection: A tripwire grammar.
I Agrafiotis, A Erola, M Goldsmith, S Creese
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8 (1), 26-43, 2017
142017
Analysing cyber-insurance claims to design harm-propagation trees
L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019
132019
Semantic Anonymisation of Set-valued Data.
M Batet, A Erola, D Sánchez, J Castellà-Roca
ICAART (1), 102-112, 2014
132014
系统目前无法执行此操作,请稍后再试。
文章 1–20