David Wall

Affiliations:
  • University of Leeds, UK


According to our database1, David Wall authored at least 13 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Modelling the Cybercrime Cascade Effect in Data Crime.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
An empirical study of ransomware attacks on organizations: an assessment of severity and salient factors affecting vulnerability.
J. Cybersecur., 2020

AI (Artificial Intelligence) and Cybercrime: balancing expectations with delivery.
Proceedings of the WebSci '20: 12th ACM Conference on Web Science, 2020

Crime and/or Punishment: Joining the Dots between Crime, Legality and HCI.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

Resolving the cybersecurity Data Sharing Paradox to scale up cybersecurity via a co-production approach towards data sharing.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Information Security Behavior: A Cross-Cultural Comparison of Irish and US Employees.
Inf. Syst. Manag., 2019

The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures.
Comput. Secur., 2019

Cascade and Chain Effects in Big Data Cybercrime: Lessons from the TalkTalk hack.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

2017
How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime?
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Towards a Conceptualisation of Cloud (Cyber) Crime.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Identifying Changes in the Cybersecurity Threat Landscape Using the LDA-Web Topic Modelling Data Search Engine.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2015
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015


  Loading...