Author of the publication

If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems.

, , , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing., , and . Cyber Security, page 1-9. IEEE, (2019)(Smart)Watch Out! encouraging privacy-protective behavior through interactive games., , and . Int. J. Hum. Comput. Stud., (2019)The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes., , , , , and . CoRR, (2020)Automated Insider Threat Detection System Using User and Role-Based Profile Assessment., , , and . IEEE Syst. J., 11 (2): 503-512 (2017)Can Cognitive Science Help Us Make Online Risk More Tangible?., and . IEEE Intelligent Systems, 24 (6): 32-36 (2009)Privacy Salience: Taxonomies and Research Opportunities., , and . CoRR, (2018)"Privacy is the Boring Bit": User Perceptions and Behaviour in the Internet-of-Things., , and . CoRR, (2018)Investigating the leakage of sensitive personal and organisational information in email headers., , , and . J. Internet Serv. Inf. Secur., 5 (1): 70-84 (2015)Trustworthy and effective communication of cybersecurity risks: A review., , , and . STAST, page 60-68. IEEE, (2011)Hearing attacks in network data: An effectiveness study., , , and . Comput. Secur., (2019)