关注
Alastair Janse van Rensburg
Alastair Janse van Rensburg
在 cs.ox.ac.uk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Sonification to support the monitoring tasks of security operations centres
L Axon, J Happa, AJ van Rensburg, M Goldsmith, S Creese
IEEE Transactions on Dependable and Secure Computing 18 (3), 1227-1244, 2019
112019
Attacker-Parametrised Attack Graphs
A Janse van Rensburg, JRC Nurse, M Goldsmith
SECURWARE 2016, 2016
112016
Practitioners’ views on cybersecurity control adoption and effectiveness
L Axon, A Erola, A Janse van Rensburg, JRC Nurse, M Goldsmith, ...
Proceedings of the 16th International Conference on Availability …, 2021
72021
Deception in network defences using unpredictability
J Happa, T Bashford-Rogers, AJ Van Rensburg, M Goldsmith, S Creese
Digital Threats: Research and Practice (DTRAP) 2 (4), 1-26, 2021
52021
Black-box attacks via the speech interface using linguistically crafted input
MK Bispham, AJ van Rensburg, I Agrafiotis, M Goldsmith
Information Systems Security and Privacy: 5th International Conference …, 2020
22020
Control effectiveness: A capture-the-flag study
A Erola, L Axon, A Janse van Rensburg, I Agrafiotis, M Goldsmith, ...
Proceedings of the 16th International Conference on Availability …, 2021
12021
Generation and analysis of attack graphs on computer networks
A Janse van Rensburg
University of Oxford, 2018
2018
Stereoscopic cyber security visualisations
A van Rensburg
2015
系统目前无法执行此操作,请稍后再试。
文章 1–8