Sonification to support the monitoring tasks of security operations centres L Axon, J Happa, AJ van Rensburg, M Goldsmith, S Creese IEEE Transactions on Dependable and Secure Computing 18 (3), 1227-1244, 2019 | 11 | 2019 |
Attacker-Parametrised Attack Graphs A Janse van Rensburg, JRC Nurse, M Goldsmith SECURWARE 2016, 2016 | 11 | 2016 |
Practitioners’ views on cybersecurity control adoption and effectiveness L Axon, A Erola, A Janse van Rensburg, JRC Nurse, M Goldsmith, ... Proceedings of the 16th International Conference on Availability …, 2021 | 7 | 2021 |
Deception in network defences using unpredictability J Happa, T Bashford-Rogers, AJ Van Rensburg, M Goldsmith, S Creese Digital Threats: Research and Practice (DTRAP) 2 (4), 1-26, 2021 | 5 | 2021 |
Black-box attacks via the speech interface using linguistically crafted input MK Bispham, AJ van Rensburg, I Agrafiotis, M Goldsmith Information Systems Security and Privacy: 5th International Conference …, 2020 | 2 | 2020 |
Control effectiveness: A capture-the-flag study A Erola, L Axon, A Janse van Rensburg, I Agrafiotis, M Goldsmith, ... Proceedings of the 16th International Conference on Availability …, 2021 | 1 | 2021 |
Generation and analysis of attack graphs on computer networks A Janse van Rensburg University of Oxford, 2018 | | 2018 |
Stereoscopic cyber security visualisations A van Rensburg | | 2015 |