Follow
Arnau Erola
Arnau Erola
Researcher, Department of Computer Science, University Of Oxford
Verified email at cs.ox.ac.uk - Homepage
Title
Cited by
Cited by
Year
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
Computers & Security 105, 102248, 2021
2882021
Baiting the hook: factors impacting susceptibility to phishing attacks
C Iuga, JRC Nurse, A Erola
Human-centric Computing and Information Sciences 6 (1), 1-20, 2016
872016
User k-anonymity for privacy preserving data mining of query logs
G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca
Information Processing & Management 48 (3), 476-487, 2012
732012
Smart insiders: exploring the threat from insiders using the internet-of-things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015
532015
Exploiting social networks to provide privacy in personalized web search
A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz
Journal of Systems and Software 84 (10), 1734-1745, 2011
492011
Utility preserving query log anonymization via semantic microaggregation
M Batet, A Erola, D Sánchez, J Castellà-Roca
Information Sciences 242, 49-63, 2013
422013
The anatomy of online deception: What makes automated text convincing?
RM Everett, JRC Nurse, A Erola
Proceedings of the 31st Annual ACM symposium on applied computing, 1115-1120, 2016
352016
Semantic microaggregation for the anonymization of query logs
A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra
International Conference on Privacy in Statistical Databases, 127-137, 2010
252010
The challenge of detecting sophisticated attacks: Insights from SOC Analysts
O Akinrolabu, I Agrafiotis, A Erola
Proceedings of the 13th International Conference on Availability …, 2018
192018
Validating an insider threat detection system: A real scenario perspective
I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese
2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016
182016
Semantic microaggregation for the anonymization of query logs using the open directory project
A Erola, J Castella-Roca, G Navarro-Arribas, V Torra
SORT, 41-58, 2011
172011
Investigating the leakage of sensitive personal and organisational information in email headers
JRC Nurse, A Erola, M Goldsmith, S Creese
Journal of Internet Services and Information Security 5 (1), 70-84, 2015
162015
The data that drives cyber insurance: A study into the underwriting and claims processes
JRC Nurse, L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2020 International conference on cyber situational awareness, data analytics …, 2020
142020
Formalising policies for insider-threat detection: A tripwire grammar.
I Agrafiotis, A Erola, M Goldsmith, S Creese
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8 (1), 26-43, 2017
132017
A tripwire grammar for insider threat detection
I Agrafiotis, A Erola, M Goldsmith, S Creese
Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016
132016
Semantic Anonymisation of Set-valued Data.
M Batet, A Erola, D Sánchez, J Castellà-Roca
ICAART (1), 102-112, 2014
132014
Analysing cyber-insurance claims to design harm-propagation trees
L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019
102019
RicherPicture: Semi-automated cyber defence using context-aware data analytics
A Erola, I Agrafiotis, J Happa, M Goldsmith, S Creese, PA Legg
2017 International Conference on Cyber Situational Awareness, Data Analytics …, 2017
62017
Analytics for characterising and measuring the naturalness of online personae
JRC Nurse, A Erola, T Gibson-Robinson, M Goldsmith, S Creese
Security Informatics 5 (1), 1-14, 2016
52016
Using search results to microaggregate query logs semantically
A Erola, J Castella-Roca
Data Privacy Management and Autonomous Spontaneous Security, 148-161, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20