A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate I Agrafiotis, JRC Nurse, M Goldsmith, S Creese, D Upton Journal of Cybersecurity 4 (1), tyy006, 2018 | 352 | 2018 |
Security risk assessment in internet of things systems JRC Nurse, S Creese, D De Roure IT professional 19 (5), 20-26, 2017 | 319* | 2017 |
Understanding insider threat: A framework for characterising attacks JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ... 2014 IEEE security and privacy workshops, 214-228, 2014 | 290 | 2014 |
Individual differences in cyber security behaviors: an examination of who is sharing passwords M Whitty, J Doodson, S Creese, D Hodges Cyberpsychology, Behavior, and Social Networking 18 (1), 3-7, 2015 | 191 | 2015 |
Insider attacks in cloud computing AJ Duncan, S Creese, M Goldsmith 2012 IEEE 11th international conference on trust, security and privacy in …, 2012 | 190 | 2012 |
Automated insider threat detection system using user and role-based profile assessment PA Legg, O Buckley, M Goldsmith, S Creese IEEE Systems Journal 11 (2), 503-512, 2015 | 174 | 2015 |
Guidelines for usable cybersecurity: Past and present JRC Nurse, S Creese, M Goldsmith, K Lamberts 2011 third international workshop on cyberspace safety and security (CSS), 21-26, 2011 | 125 | 2011 |
Towards a conceptual model and reasoning structure for insider threat detection PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ... Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013 | 112 | 2013 |
Trustworthy and effective communication of cybersecurity risks: A review JRC Nurse, S Creese, M Goldsmith, K Lamberts 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011 | 95 | 2011 |
The perfect storm: The privacy paradox and the Internet-of-Things M Williams, JRC Nurse, S Creese 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 86 | 2016 |
Privacy is the boring bit: user perceptions and behaviour in the internet-of-things M Williams, JRC Nurse, S Creese 2017 15th Annual Conference on Privacy, Security and Trust (PST), 181-18109, 2017 | 79 | 2017 |
The cloud: understanding the security, privacy and trust challenges N Robinson, L Valeri, J Cave, T Starkey, H Graux, S Creese, PP Hopkins Privacy and Trust Challenges (November 30, 2010), 2010 | 76 | 2010 |
Identifying attack patterns for insider threat detection I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith Computer Fraud & Security 2015 (7), 9-17, 2015 | 75 | 2015 |
Authentication for pervasive computing S Creese, M Goldsmith, B Roscoe, I Zakiuddin Security in pervasive computing, 439-488, 2004 | 72 | 2004 |
Caught in the act of an insider attack: detection and assessment of insider threat PA Legg, O Buckley, M Goldsmith, S Creese 2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015 | 70 | 2015 |
The danger from within. DM Upton, S Creese Harvard business review 92 (9), 94-101, 2014 | 64 | 2014 |
Information quality and trustworthiness: A topical state-of-the-art review JRC Nurse, SS Rahman, S Creese, M Goldsmith, K Lamberts IEEE, 2011 | 63 | 2011 |
Data protection-aware design for cloud services S Creese, P Hopkins, S Pearson, Y Shen Cloud Computing, 119-130, 2009 | 62 | 2009 |
Smart insiders: exploring the threat from insiders using the internet-of-things JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese 2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015 | 60 | 2015 |
The attacker in ubiquitous computing environments: Formalising the threat model A Roscoe, S Creese, M Goldsmith, I Zakiuddin | 59 | 2003 |