Arnau Erola
Arnau Erola
Researcher, Department of Computer Science, University Of Oxford
Verified email at - Homepage
Cited by
Cited by
Security risk assessment in Internet of Things systems
JRC Nurse, S Creese, D De Roure
IT professional 19 (5), 20-26, 2017
User k-anonymity for privacy preserving data mining of query logs
G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca
Information Processing & Management 48 (3), 476-487, 2012
Baiting the hook: factors impacting susceptibility to phishing attacks
C Iuga, JRC Nurse, A Erola
Human-centric Computing and Information Sciences 6 (1), 8, 2016
Smart insiders: exploring the threat from insiders using the internet-of-things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015
Exploiting social networks to provide privacy in personalized web search
A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz
Journal of Systems and Software 84 (10), 1734-1745, 2011
Utility preserving query log anonymization via semantic microaggregation
M Batet, A Erola, D Sánchez, J Castellà-Roca
Information Sciences 242, 49-63, 2013
The anatomy of online deception: What makes automated text convincing?
RM Everett, JRC Nurse, A Erola
Proceedings of the 31st Annual ACM symposium on applied computing, 1115-1120, 2016
Semantic microaggregation for the anonymization of query logs
A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra
International Conference on Privacy in Statistical Databases, 127-137, 2010
Semantic microaggregation for the anonymization of query logs using the open directory project
A Erola, J Castella-Roca, G Navarro-Arribas, V Torra
SORT, 41-58, 2011
Validating an insider threat detection system: A real scenario perspective
I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese
2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016
Investigating the leakage of sensitive personal and organisational information in email headers
JRC Nurse, A Erola, M Goldsmith, S Creese
Journal of Internet Services and Information Security 5 (1), 70-84, 2015
Semantic Anonymisation of Set-valued Data.
M Batet, A Erola, D Sánchez, J Castellà-Roca
ICAART (1), 102-112, 2014
Formalising Policies for Insider-threat Detection: A Tripwire Grammar.
I Agrafiotis, A Erola, M Goldsmith, S Creese
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8 (1), 26-43, 2017
Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
arXiv preprint arXiv:2006.11929, 2020
The challenge of detecting sophisticated attacks: Insights from SOC Analysts
O Akinrolabu, I Agrafiotis, A Erola
Proceedings of the 13th International Conference on Availability …, 2018
A tripwire grammar for insider threat detection
I Agrafiotis, A Erola, M Goldsmith, S Creese
Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016
Analysing cyber-insurance claims to design harm-propagation trees
L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019
Analytics for characterising and measuring the naturalness of online personae
JRC Nurse, A Erola, T Gibson-Robinson, M Goldsmith, S Creese
Security Informatics 5 (1), 1-14, 2016
Using search results to microaggregate query logs semantically
A Erola, J Castella-Roca
Data Privacy Management and Autonomous Spontaneous Security, 148-161, 2013
An Independent Assessment of the Procedural Components of the Estonian Internet Voting System
J Nurse, I Agrafiotis, A Erola, M Bada, T Roberts, M Williams, M Goldsmith, ...
Working Paper 6--Cyber Studies Programme Working Paper Series in Department …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20