Seguir
Michael Goldsmith
Michael Goldsmith
Associate Professor and Senior Research Fellow, Cybersecurity Analytics Group, Department of
Dirección de correo verificada de cs.ox.ac.uk
Título
Citado por
Citado por
Año
Modelling and Analysis of Security Protocols
P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe
Addison Wesley, 2001
822*2001
Programming in occam 2
G Jones, M Goldsmith
Prentice-Hall, 1988
4241988
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
I Agrafiotis, JRC Nurse, M Goldsmith, S Creese, D Upton
Journal of Cybersecurity 4 (1), tyy006, 2018
3132018
Understanding Insider Threat: A Framework for Characterising Attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT 2014 …, 2014
2822014
PB-PKI: a privacy-aware blockchain-based PKI
LM Axon, M Goldsmith
SECRYPT 2017, 2016
2432016
Insider attacks in cloud computing
AJ Duncan, S Creese, M Goldsmith
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
1902012
Hierarchical compression for model-checking CSP or how to check 10^20 dining philosophers for deadlock
A Roscoe, P Gardiner, M Goldsmith, J Hulance, D Jackson, J Scattergood
Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995
1781995
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
P Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal 99, 1-10, 2015
1712015
What is intransitive noninterference?
AW Roscoe, MH Goldsmith
Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE …, 1999
1651999
Guidelines for usable cybersecurity: past and present
JRC Nurse, S Creese, M Goldsmith, K Lamberts
Cyberspace Safety and Security (CSS), 2011 Third International Workshop on …, 2011
1192011
Towards a conceptual model and reasoning structure for insider threat detection
P Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
1142013
Trustworthy and effective communication of cybersecurity risks: a review
JRC Nurse, S Creese, M Goldsmith, K Lamberts
1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) at 5th …, 2011
922011
The perfect ‘spy’ for model-checking cryptoprotocols
AW Roscoe, MH Goldsmith
Proceedings of DIMACS workshop on the design and formal verification of …, 1997
881997
FDR2 user manual
P Gardiner, M Goldsmith, J Hulance, D Jackson, AW Roscoe, ...
Formal Systems (Europe) Ltd, 2000
86*2000
Understanding the radical mind: Identifying signals to detect extremist content on twitter
M Nouh, JRC Nurse, M Goldsmith
2019 IEEE International Conference on Intelligence and Security Informatics …, 2019
752019
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
732015
Authentication for pervasive computing
S Creese, M Goldsmith, B Roscoe, I Zakiuddin
Security in Pervasive Computing, 439-488, 2004
722004
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
PA Legg, O Buckley, M Goldsmith, S Creese
International Symposium on Technologies for Homeland Security, 2015
702015
Unwinding Ariadne's identity thread: Privacy risks with fitness trackers and online social networks
A Aktypi, JRC Nurse, M Goldsmith
Proceedings of the 2017 on Multimedia Privacy and Security, 1-11, 2017
642017
Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
2015 International Workshop on Secure Internet of Things (SIoT), 2015
602015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20