Rosanne English

Orcid: 0000-0002-6475-2899

According to our database1, Rosanne English authored at least 20 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Research-led Active Learning Sessions in Cyber Security through Research Paper Reading.
Proceedings of the Computing Education Practice, 2023

Engaging Students in Threat Thinking with the Cyber Security Cinema.
Proceedings of the Computing Education Practice, 2023

Exploring Student Perceptions and Expectations of Cyber Security.
Proceedings of the Computing Education Practice, 2023

2022
Enhancing UK Computing Education Research Infrastructure with Doctoral Consortia.
Proceedings of the UKICER 2022: The United Kingdom and Ireland Computing Education Research Conference, Dublin, Ireland, September 1, 2022

Towards Integrated Graduate Skills for UK Computing Science Students.
Proceedings of the UKICER 2022: The United Kingdom and Ireland Computing Education Research Conference, Dublin, Ireland, September 1, 2022

2021
Opportunities to Fail: Using Peer-review to support Assessment Literacy in Cyber Security.
Proceedings of the Koli Calling '21: 21st Koli Calling International Conference on Computing Education Research, Joensuu, Finland, November 18, 2021

Improving Computer Science Student Graduate Skills Through Assessment.
Proceedings of the CEP '21: Computing Education Practice 2021, 2021

2020
Experiences of Assessment in Data and Security Courses using Personal Response Systems.
Proceedings of the ICEIT 2020, 2020

2019
Data Protection and Privacy Regulations as an Inter-Active-Constructive Practice.
Proceedings of the 3rd Conference on Computing Education Practice, 2019

Designing Computer Security Assessments to Reduce Plagiarism.
Proceedings of the 3rd Conference on Computing Education Practice, 2019

2016
Why don't UK citizens protest against privacy-invading dragnet surveillance?
Inf. Comput. Secur., 2016

2015
Simulating and modelling the effectiveness of graphical password intersection attacks.
Concurr. Comput. Pract. Exp., 2015

2014
You Have Three Tries Before Lockout. Why Three?.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

Modelling the Security of Recognition-Based Graphical Passwords.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

Page Retrievability Calculator.
Proceedings of the Advances in Information Retrieval, 2014

2012
Modelling the security of recognition-based graphical password schemes.
PhD thesis, 2012

The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Measuring the revised guessability of graphical passwords.
Proceedings of the 5th International Conference on Network and System Security, 2011

Towards a metric for recognition-based graphical password security.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Comparison of high capacity steganography techniques.
Proceedings of the Second International Conference of Soft Computing and Pattern Recognition, 2010


  Loading...