Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ... Computers & Security 105, 102248, 2021 | 288 | 2021 |
Baiting the hook: factors impacting susceptibility to phishing attacks C Iuga, JRC Nurse, A Erola Human-centric Computing and Information Sciences 6 (1), 1-20, 2016 | 87 | 2016 |
User k-anonymity for privacy preserving data mining of query logs G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca Information Processing & Management 48 (3), 476-487, 2012 | 73 | 2012 |
Smart insiders: exploring the threat from insiders using the internet-of-things JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese 2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015 | 53 | 2015 |
Exploiting social networks to provide privacy in personalized web search A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz Journal of Systems and Software 84 (10), 1734-1745, 2011 | 49 | 2011 |
Utility preserving query log anonymization via semantic microaggregation M Batet, A Erola, D Sánchez, J Castellà-Roca Information Sciences 242, 49-63, 2013 | 42 | 2013 |
The anatomy of online deception: What makes automated text convincing? RM Everett, JRC Nurse, A Erola Proceedings of the 31st Annual ACM symposium on applied computing, 1115-1120, 2016 | 35 | 2016 |
Semantic microaggregation for the anonymization of query logs A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra International Conference on Privacy in Statistical Databases, 127-137, 2010 | 25 | 2010 |
The challenge of detecting sophisticated attacks: Insights from SOC Analysts O Akinrolabu, I Agrafiotis, A Erola Proceedings of the 13th International Conference on Availability …, 2018 | 19 | 2018 |
Validating an insider threat detection system: A real scenario perspective I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese 2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016 | 18 | 2016 |
Semantic microaggregation for the anonymization of query logs using the open directory project A Erola, J Castella-Roca, G Navarro-Arribas, V Torra SORT, 41-58, 2011 | 17 | 2011 |
Investigating the leakage of sensitive personal and organisational information in email headers JRC Nurse, A Erola, M Goldsmith, S Creese Journal of Internet Services and Information Security 5 (1), 70-84, 2015 | 16 | 2015 |
The data that drives cyber insurance: A study into the underwriting and claims processes JRC Nurse, L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese 2020 International conference on cyber situational awareness, data analytics …, 2020 | 14 | 2020 |
Formalising policies for insider-threat detection: A tripwire grammar. I Agrafiotis, A Erola, M Goldsmith, S Creese J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8 (1), 26-43, 2017 | 13 | 2017 |
A tripwire grammar for insider threat detection I Agrafiotis, A Erola, M Goldsmith, S Creese Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016 | 13 | 2016 |
Semantic Anonymisation of Set-valued Data. M Batet, A Erola, D Sánchez, J Castellà-Roca ICAART (1), 102-112, 2014 | 13 | 2014 |
Analysing cyber-insurance claims to design harm-propagation trees L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese 2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019 | 10 | 2019 |
RicherPicture: Semi-automated cyber defence using context-aware data analytics A Erola, I Agrafiotis, J Happa, M Goldsmith, S Creese, PA Legg 2017 International Conference on Cyber Situational Awareness, Data Analytics …, 2017 | 6 | 2017 |
Analytics for characterising and measuring the naturalness of online personae JRC Nurse, A Erola, T Gibson-Robinson, M Goldsmith, S Creese Security Informatics 5 (1), 1-14, 2016 | 5 | 2016 |
Using search results to microaggregate query logs semantically A Erola, J Castella-Roca Data Privacy Management and Autonomous Spontaneous Security, 148-161, 2013 | 5 | 2013 |