default search action
Louise Axon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Louise Axon, Arnau Erola, Ioannis Agrafiotis, Ganbayar Uuganbayar, Michael Goldsmith, Sadie Creese:
Ransomware as a Predator: Modelling the Systemic Risk to Prey. DTRAP 4(4): 55:1-55:38 (2023) - [c9]Enrico Calandro, Louise Axon, Carsten Rudolph, Wallace Chigona:
Introduction to the Minitrack on International Perspectives for Cybersecurity. HICSS 2023: 4838 - [i5]Louise Axon, Dimitrios Panagiotakopoulos, Samuel Ayo, Carolina Sanchez-Hernandez, Yan Zong, Simon Brown, Lei Zhang, Michael Goldsmith, Sadie Creese, Weisi Guo:
Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI. CoRR abs/2304.14095 (2023) - 2022
- [j6]Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. Comput. Secur. 113: 102545 (2022) - [j5]Louise Axon, Katherine Fletcher, Arianna Schuler Scott, Marcel Stolz, Robert Hannigan, Ali El Kaafarani, Michael Goldsmith, Sadie Creese:
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda. DTRAP 3(4): 34:1-34:27 (2022) - [c8]Enrico Calandro, Carsten Rudolph, Wallace Chigona, Louise Axon:
Introduction to the Minitrack on International Perspectives for Cybersecurity. HICSS 2022: 1-2 - [c7]Bushra A. AlAhmadi, Louise Axon, Ivan Martinovic:
99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms. USENIX Security Symposium 2022: 2783-2800 - [i4]Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab:
An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version). IACR Cryptol. ePrint Arch. 2022: 1440 (2022) - 2021
- [j4]Louise Axon, Jassim Happa, Alastair Janse van Rensburg, Michael Goldsmith, Sadie Creese:
Sonification to Support the Monitoring Tasks of Security Operations Centres. IEEE Trans. Dependable Secur. Comput. 18(3): 1227-1244 (2021) - [c6]Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Control Effectiveness: a Capture-the-Flag Study. ARES 2021: 87:1-87:10 - [c5]Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. ARES 2021: 91:1-91:10 - 2020
- [j3]Louise Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice. J. Cybersecur. 6(1): tyaa004 (2020) - [c4]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CyberSA 2020: 1-8 - [i3]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CoRR abs/2008.04713 (2020)
2010 – 2019
- 2019
- [j2]Louise Axon, Jassim Happa, Michael Goldsmith, Sadie Creese:
Hearing attacks in network data: An effectiveness study. Comput. Secur. 83: 367-388 (2019) - [c3]Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Analysing cyber-insurance claims to design harm-propagation trees. CyberSA 2019: 1-4 - 2018
- [b1]Louise Axon:
Sonification for network-security monitoring. University of Oxford, UK, 2018 - [j1]Louise Axon, Michael Goldsmith, Sadie Creese:
Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain. Adv. Comput. 111: 229-278 (2018) - [i2]Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese:
Future Scenarios and Challenges for Security and Privacy. CoRR abs/1807.05746 (2018) - [i1]Louise M. Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Sonification in security operations centres: what do security practitioners think? CoRR abs/1807.06706 (2018) - 2017
- [c2]Louise Axon, Michael Goldsmith:
PB-PKI: A Privacy-aware Blockchain-based PKI. SECRYPT 2017: 311-318 - 2016
- [c1]Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese:
Future scenarios and challenges for security and privacy. RTSI 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint