Modelling and Analysis of Security Protocols P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe Addison Wesley, 2001 | 835* | 2001 |
Programming in occam 2 G Jones, M Goldsmith Prentice-Hall, 1988 | 423 | 1988 |
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate I Agrafiotis, JRC Nurse, M Goldsmith, S Creese, D Upton Journal of Cybersecurity 4 (1), tyy006, 2018 | 388 | 2018 |
Understanding Insider Threat: A Framework for Characterising Attacks JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ... IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT 2014 …, 2014 | 299 | 2014 |
PB-PKI: a privacy-aware blockchain-based PKI LM Axon, M Goldsmith SECRYPT 2017, 2016 | 255 | 2016 |
Insider attacks in cloud computing AJ Duncan, S Creese, M Goldsmith 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 190 | 2012 |
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment P Legg, O Buckley, M Goldsmith, S Creese IEEE Systems Journal 99, 1-10, 2015 | 180 | 2015 |
Hierarchical compression for model-checking CSP or how to check 10^20 dining philosophers for deadlock A Roscoe, P Gardiner, M Goldsmith, J Hulance, D Jackson, J Scattergood Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995 | 179 | 1995 |
What is intransitive noninterference? AW Roscoe, MH Goldsmith Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE …, 1999 | 168 | 1999 |
Guidelines for usable cybersecurity: past and present JRC Nurse, S Creese, M Goldsmith, K Lamberts Cyberspace Safety and Security (CSS), 2011 Third International Workshop on …, 2011 | 128 | 2011 |
Towards a conceptual model and reasoning structure for insider threat detection P Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ... Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013 | 115 | 2013 |
Trustworthy and effective communication of cybersecurity risks: a review JRC Nurse, S Creese, M Goldsmith, K Lamberts 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) at 5th …, 2011 | 99 | 2011 |
The perfect ‘spy’ for model-checking cryptoprotocols AW Roscoe, MH Goldsmith Proceedings of DIMACS workshop on the design and formal verification of …, 1997 | 89 | 1997 |
FDR2 user manual P Gardiner, M Goldsmith, J Hulance, D Jackson, AW Roscoe, ... Formal Systems (Europe) Ltd, 2000 | 88* | 2000 |
Understanding the radical mind: Identifying signals to detect extremist content on twitter M Nouh, JRC Nurse, M Goldsmith 2019 IEEE International Conference on Intelligence and Security Informatics …, 2019 | 87 | 2019 |
Identifying attack patterns for insider threat detection I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith Computer Fraud & Security 2015 (7), 9-17, 2015 | 79 | 2015 |
Unwinding Ariadne's identity thread: Privacy risks with fitness trackers and online social networks A Aktypi, JRC Nurse, M Goldsmith Proceedings of the 2017 on Multimedia Privacy and Security, 1-11, 2017 | 73 | 2017 |
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat PA Legg, O Buckley, M Goldsmith, S Creese International Symposium on Technologies for Homeland Security, 2015 | 72 | 2015 |
Authentication for pervasive computing S Creese, M Goldsmith, B Roscoe, I Zakiuddin Security in Pervasive Computing, 439-488, 2004 | 72 | 2004 |
Information Quality and Trustworthiness: A Topical State-of-the-Art Review JRC Nurse, SS Rahman, S Creese, M Goldsmith, K Lamberts International Conference on Computer Applications and Network Security, 2011 | 63 | 2011 |