Louise Axon

Orcid: 0000-0001-5979-7630

According to our database1, Louise Axon authored at least 17 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI.
CoRR, 2023

Introduction to the Minitrack on International Perspectives for Cybersecurity.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version).
IACR Cryptol. ePrint Arch., 2022

A system to calculate Cyber Value-at-Risk.
Comput. Secur., 2022

99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Sonification to Support the Monitoring Tasks of Security Operations Centres.
IEEE Trans. Dependable Secur. Comput., 2021

Control Effectiveness: a Capture-the-Flag Study.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Practitioners' Views on Cybersecurity Control Adoption and Effectiveness.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice.
J. Cybersecur., 2020

The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

2019
Hearing attacks in network data: An effectiveness study.
Comput. Secur., 2019

Analysing cyber-insurance claims to design harm-propagation trees.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

2018
Sonification for network-security monitoring.
PhD thesis, 2018

Sonification in security operations centres: what do security practitioners think?
CoRR, 2018

Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain.
Adv. Comput., 2018

2017
PB-PKI: A Privacy-aware Blockchain-based PKI.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

2016
Future scenarios and challenges for security and privacy.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016


  Loading...