Identity Security in Cyberspace: Publications
Click here to download all publications in a single bibtex file
@article{negc2015email,
title = "Investigating the leakage of sensitive personal and organisational information in email headers",
author = "Jason R. C. Nurse and Arnau Erola and Michael Goldsmith and Sadie Creese",
year = "2015",
journal = "Journal of Internet Services and Information Security",
number = "1",
url = "http://isyou.info/jisis/vol5/no1/jisis-2015-vol5-no1-04.pdf",
volume = "5",
}
@inproceedings{dnhgc2015predictinggps,
title = "Predicting Graphical Passwords",
author = "Matthieu Devlin and Jason R. C. Nurse and Duncan Hodges and Michael Goldsmith and Sadie Creese",
year = "2015",
booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 17th International Conference on Human-Computer Interaction (HCI)",
editor = "Theo Tryfonas and Ioannis Askoxylakis",
pages = "23--35",
publisher = "Springer",
series = "9190",
doi = "10.1007/978-3-319-20376-8_3",
}
@inproceedings{ephillips2015snasecurity,
title = "Applying Social Network Analysis to Security",
author = "Elizabeth Phillips and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese",
year = "2015",
booktitle = "International Conference on Cyber Security for Sustainable Society",
pages = "11--27",
}
@inproceedings{npggc14,
title = "Inferring Social Relationships from Technology-Level Device Connections",
author = "Jason R. C. Nurse and Jess Pumphrey and Thomas Gibson-Robinson and Michael Goldsmith and Sadie Creese",
year = "2014",
booktitle = "12th International Conference on Privacy, Security and Trust (PST)",
pages = "40 - 47",
publisher = "IEEE",
doi = "10.1109/PST.2014.6890922",
}
@inproceedings{cgnptrustcom2012,
title = "A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks",
author = "Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C. and Phillips, Elizabeth",
year = "2012",
booktitle = "11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)",
pages = "1124-1131",
publisher = "IEEE",
doi = "10.1109/TrustCom.2012.22",
}
@inproceedings{hngc2012,
title = "Identity attribution across CyberSpace and the Natural Space",
author = "Hodges, D. and Nurse, J.R.C. and Goldsmith, M. and Creese, S.",
year = "2012",
booktitle = "The International Crime and Intelligence Analysis Conference",
url = "http://www.ucl.ac.uk/jdi/events/int-CIA-conf",
}
@inproceedings{ncglstast2011,
title = "Trustworthy and Effective Communication of Cybersecurity Risks: A Review",
author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
year = "2011",
booktitle = "The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011)",
publisher = "IEEE",
doi = "10.1109/STAST.2011.6059257",
}