Follow
Louise Axon
Title
Cited by
Cited by
Year
PB-PKI: a privacy-aware blockchain-based PKI
L Axon, M Goldsmith
International Conference on Security and Cryptography (SECRYPT), 2016
2432016
99% False Positives: A Qualitative Study of {SOC} Analysts' Perspectives on Security Alarms
BA Alahmadi, L Axon, I Martinovic
31st USENIX Security Symposium (USENIX Security 22), 2783-2800, 2022
682022
The data that drives cyber insurance: A study into the underwriting and claims processes
JRC Nurse, L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2020 International conference on cyber situational awareness, data analytics …, 2020
442020
Sonification in security operations centres: what do security practitioners think?
LM Axon, B Alahmadi, JRC Nurse, M Goldsmith, S Creese
Workshop on Usable Security (USEC), NDSS, 2018
342018
Privacy requirements in cybersecurity applications of blockchain
L Axon, M Goldsmith, S Creese
Advances in Computers 111, 229-278, 2018
302018
A system to calculate Cyber Value-at-Risk
A Erola, I Agrafiotis, JRC Nurse, L Axon, M Goldsmith, S Creese
Computers & Security 113, 102545, 2022
232022
A Formalised Approach to Designing Sonification Systems for Network− Security Monitoring
L Axon, J Nurse
International Journal on Advances in Security, 2017
202017
Future scenarios and challenges for security and privacy
M Williams, L Axon, JRC Nurse, S Creese
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
182016
Analysing cyber-insurance claims to design harm-propagation trees
L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019
132019
Reflecting on the Use of Sonification for Network Monitoring
L Axon, S Creese, M Goldsmith, JRC Nurse
SECURWARE 2016 : The Tenth International Conference on Emerging Security …, 2016
132016
Privacy-awareness in blockchain-based PKI [J]
L Axon
Oxford University Research Archive, 2015
92015
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice
L Axon, BA AlAhmadi, JRC Nurse, M Goldsmith, S Creese
Journal of Cybersecurity 6 (1), tyaa004, 2020
82020
Future Series: Cybersecurity, emerging technology and systemic risk
S Creese, J Saunders, L Axon, W Dixon
World Economic Forum, 2020
72020
Sonification to support the monitoring tasks of security operations centres
L Axon, J Happa, AJ van Rensburg, M Goldsmith, S Creese
IEEE Transactions on Dependable and Secure Computing 18 (3), 1227-1244, 2019
72019
Hearing Attacks in Network Data: an Effectiveness Study
L Axon, J Happa, M Goldsmith, S Creese
Computers & Security 83, 367-388, 2019
72019
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness
L Axon, A Erola, A Janse van Rensburg, JRC Nurse, M Goldsmith, ...
International Workshop on Information Security Methodology and Replication …, 2021
42021
Sonification mappings: estimating effectiveness, polarities and scaling in an online experiment
L Axon, M Goldsmith, S Creese
Journal of the Audio Engineering Society 66 (12), 1016-1032, 2018
42018
Emerging cybersecurity capability gaps in the industrial internet of things: Overview and research agenda
L Axon, K Fletcher, AS Scott, M Stolz, R Hannigan, AE Kaafarani, ...
Digital Threats: Research and Practice 3 (4), 1-27, 2022
32022
Ransomware as a Predator: Modelling the Systemic Risk to Prey
L Axon, A Erola, I Agrafiotis, G Uuganbayar, M Goldsmith, S Creese
Digital Threats: Research and Practice 4 (4), 1-38, 2023
22023
Structured Field Coding and Its Application to National Assessments
WH Dutton, L Axon, C Weisser Harris
Available at SSRN 3781600, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20