Follow
Rosanne English
Title
Cited by
Cited by
Year
Towards a metric for recognition-based graphical password security
R English, R Poet
2011 5th International Conference on Network and System Security, 239-243, 2011
262011
Comparison of high capacity steganography techniques
R English
2010 International Conference of Soft Computing and Pattern Recognition, 448-453, 2010
212010
The effectiveness of intersection attack countermeasures for graphical passwords
R English, R Poet
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
132012
Measuring the revised guessability of graphical passwords
R English, R Poet
2011 5th International Conference on Network and System Security, 364-368, 2011
122011
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
K Renaud, S Flowerday, R English, M Volkamer
Information & Computer Security 24 (4), 400-415, 2016
82016
Exploring student perceptions and expectations of cyber security
R English, J Maguire
Proceedings of the 7th Conference on Computing Education Practice, 25-28, 2023
72023
Page retrievability calculator
L Azzopardi, R English, C Wilkie, D Maxwell
Advances in Information Retrieval: 36th European Conference on IR Research …, 2014
62014
Data protection and privacy regulations as an inter-active-constructive practice
J Maguire, R English, S Draper
Proceedings of the 3rd Conference on Computing Education Practice, 1-4, 2019
52019
Towards integrated graduate skills for UK computing science students
R English, A Hayes
Proceedings of the 2022 Conference on United Kingdom & Ireland Computing …, 2022
32022
You have three tries to lockout. Why three?
K Renaud, R English, T Wynne, F Weber
3*2014
Enhancing UK computing education research infrastructure with doctoral consortia
J Maguire, S Fincher, Q Cutts, R English
Proceedings of the 2022 Conference on United Kingdom & Ireland Computing …, 2022
22022
Opportunities to fail: Using peer-review to support assessment literacy in cyber security
J Maguire, R English
Proceedings of the 21st Koli Calling International Conference on Computing …, 2021
22021
Simulating and modelling the effectiveness of graphical password intersection attacks
R English
Concurrency and Computation: Practice and Experience 27 (12), 3089-3107, 2015
22015
Modelling the Security of Recognition-Based Graphical Passwords.
R English
HAISA, 112-121, 2014
22014
Challenges and opportunities of teaching cybersecurity in UK university computing programmes
T Prickett, L Yang, A Irons, K Miller, P Brooke, T Crick, A Hayes, ...
Cybersecurity teaching in higher education, 1-35, 2012
22012
Improving Computer Science Student Graduate Skills Through Assessment
R English, J Maguire, A Hayes
Proceedings of the 5th Conference on Computing Education Practice, 38-38, 2021
12021
Building in resilience through graduate skills computer science assessment
R English, J Maguire
12020
Designing computer security assessments to reduce plagiarism
R English
Proceedings of the 3rd Conference on Computing Education Practice, 1-4, 2019
12019
led active learning sessions in cyber security through research paper reading
J Maguire, R English, S Draper
Proceedings of the 7th Conference on Computing Education Practice, 33-36, 2023
2023
Engaging students in threat thinking with the cyber security cinema
J Maguire, R English, S Draper
Proceedings of the 7th Conference on Computing Education Practice, 13-16, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20