PB-PKI: a privacy-aware blockchain-based PKI L Axon, M Goldsmith International Conference on Security and Cryptography (SECRYPT), 2016 | 263 | 2016 |
99% false positives: A qualitative study of {SOC} analysts' perspectives on security alarms BA Alahmadi, L Axon, I Martinovic 31st USENIX Security Symposium (USENIX Security 22), 2783-2800, 2022 | 145 | 2022 |
The data that drives cyber insurance: A study into the underwriting and claims processes JRC Nurse, L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese 2020 International conference on cyber situational awareness, data analytics …, 2020 | 55 | 2020 |
A system to calculate Cyber Value-at-Risk A Erola, I Agrafiotis, JRC Nurse, L Axon, M Goldsmith, S Creese Computers & Security 113, 102545, 2022 | 37 | 2022 |
Privacy requirements in cybersecurity applications of blockchain L Axon, M Goldsmith, S Creese Advances in Computers 111, 229-278, 2018 | 35 | 2018 |
Sonification in security operations centres: what do security practitioners think? LM Axon, B Alahmadi, JRC Nurse, M Goldsmith, S Creese Workshop on Usable Security (USEC), NDSS, 2018 | 34 | 2018 |
A Formalised Approach to Designing Sonification Systems for Network− Security Monitoring L Axon, J Nurse International Journal on Advances in Security, 2017 | 21 | 2017 |
Future scenarios and challenges for security and privacy M Williams, L Axon, JRC Nurse, S Creese 2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016 | 21 | 2016 |
Analysing cyber-insurance claims to design harm-propagation trees L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese 2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019 | 14 | 2019 |
Reflecting on the Use of Sonification for Network Monitoring L Axon, S Creese, M Goldsmith, JRC Nurse SECURWARE 2016 : The Tenth International Conference on Emerging Security …, 2016 | 13 | 2016 |
Emerging cybersecurity capability gaps in the industrial internet of things: Overview and research agenda L Axon, K Fletcher, AS Scott, M Stolz, R Hannigan, AE Kaafarani, ... Digital Threats: Research and Practice 3 (4), 1-27, 2022 | 12 | 2022 |
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice L Axon, BA AlAhmadi, JRC Nurse, M Goldsmith, S Creese Journal of Cybersecurity 6 (1), tyaa004, 2020 | 11 | 2020 |
Sonification to support the monitoring tasks of security operations centres L Axon, J Happa, AJ van Rensburg, M Goldsmith, S Creese IEEE Transactions on Dependable and Secure Computing 18 (3), 1227-1244, 2019 | 11 | 2019 |
Hearing Attacks in Network Data: an Effectiveness Study L Axon, J Happa, M Goldsmith, S Creese Computers & Security 83, 367-388, 2019 | 11 | 2019 |
Future Series: Cybersecurity, emerging technology and systemic risk S Creese, J Saunders, L Axon, W Dixon World Economic Forum, 2020 | 10 | 2020 |
Privacy-awareness in blockchain-based PKI [J] L Axon Oxford University Research Archive, 2015 | 9 | 2015 |
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness L Axon, A Erola, A Janse van Rensburg, JRC Nurse, M Goldsmith, ... International Workshop on Information Security Methodology and Replication …, 2021 | 7 | 2021 |
Sonification mappings: estimating effectiveness, polarities and scaling in an online experiment L Axon, M Goldsmith, S Creese Journal of the Audio Engineering Society 66 (12), 1016-1032, 2018 | 6 | 2018 |
Ransomware as a Predator: Modelling the Systemic Risk to Prey L Axon, A Erola, I Agrafiotis, G Uuganbayar, M Goldsmith, S Creese Digital Threats: Research and Practice 4 (4), 1-38, 2023 | 5 | 2023 |
Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI L Axon, D Panagiotakopoulos, S Ayo, C Sanchez-Hernandez, Y Zong, ... arXiv preprint arXiv:2304.14095, 2023 | 2 | 2023 |