Sadie Creese

Orcid: 0000-0002-2414-9657

Affiliations:
  • University of Oxford, UK


According to our database1, Sadie Creese authored at least 103 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI.
CoRR, 2023

2022
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations.
J. Inf. Secur. Appl., 2022

Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise.
Comput. Secur., 2022

A system to calculate Cyber Value-at-Risk.
Comput. Secur., 2022

2021
Sonification to Support the Monitoring Tasks of Security Operations Centres.
IEEE Trans. Dependable Secur. Comput., 2021

The current state of research on people, culture and cybersecurity.
Pers. Ubiquitous Comput., 2021

The social and cultural shaping of cybersecurity capacity building: a comparative study of nations and regions.
Pers. Ubiquitous Comput., 2021

Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance.
CoRR, 2021

Control Effectiveness: a Capture-the-Flag Study.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Practitioners' Views on Cybersecurity Control Adoption and Effectiveness.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice.
J. Cybersecur., 2020

Cybersecurity in Pacific Island nations.
Commun. ACM, 2020

Capturing Tacit Knowledge in Security Operation Centers.
IEEE Access, 2020

The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

2019
<i>(Smart)Watch Out!</i> encouraging privacy-protective behavior through interactive games.
Int. J. Hum. Comput. Stud., 2019

Investigating Malware Campaigns With Semantic Technologies.
IEEE Secur. Priv., 2019

Hearing attacks in network data: An effectiveness study.
Comput. Secur., 2019

Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study.
Comput. Hum. Behav., 2019

Anomaly Detection Using Pattern-of-Life Visual Metaphors.
IEEE Access, 2019

Why We Trust Dynamic Consent to Deliver on Privacy.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Analysing cyber-insurance claims to design harm-propagation trees.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

2018
Modeling Advanced Persistent Threats to enhance anomaly detection techniques.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate.
J. Cybersecur., 2018

A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines.
CoRR, 2018

Sonification in security operations centres: what do security practitioners think?
CoRR, 2018

If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems.
CoRR, 2018

Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain.
Adv. Comput., 2018

A State Machine System for Insider Threat Detection.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018

Run-Time Monitoring of Data-Handling Violations.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

2017
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment.
IEEE Syst. J., 2017

Formalising Policies for Insider-threat Detection: A Tripwire Grammar.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Mapping the coverage of security controls in cyber insurance proposal forms.
J. Internet Serv. Appl., 2017

Security Risk Assessment in Internet of Things Systems.
IT Prof., 2017

Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

RicherPicture: Semi-automated cyber defence using context-aware data analytics.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
Analytics for characterising and measuring the naturalness of online personae.
Secur. Informatics, 2016

Validating an Insider Threat Detection System: A Real Scenario Perspective.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Future scenarios and challenges for security and privacy.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Privacy Salience: Taxonomies and Research Opportunities.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

A Pragmatic System-failure Assessment and Response Model.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A Tripwire Grammar for Insider Threat Detection.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

The Perfect Storm: The Privacy Paradox and the Internet-of-Things.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Investigating the leakage of sensitive personal and organisational information in email headers.
J. Internet Serv. Inf. Secur., 2015

An overview of insider attacks in cloud computing.
Concurr. Comput. Pract. Exp., 2015

Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords.
Cyberpsychology Behav. Soc. Netw., 2015

Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

Predicting Graphical Passwords.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Applying Semantic Technologies to Fight Online Banking Fraud.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Pathways to identity: using visualization to aid law enforcement in identification tasks.
Secur. Informatics, 2014

Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis.
J. Internet Serv. Inf. Secur., 2014

Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.
J. Internet Serv. Inf. Secur., 2014

Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

Understanding Insider Threat: A Framework for Characterising Attacks.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Inferring social relationships from technology-level device connections.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Image Choice to Represent the Self in Different Online Environments.
Proceedings of the Social Computing and Social Media, 2014

A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Building Confidence in Information-Trustworthiness Metrics for Decision Support.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Cloud Computing: Insider Attacks on Virtual Machines during Migration.
Proceedings of the 12th IEEE International Conference on Trust, 2013

NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data.
Proceedings of the Theory and Practice of Computer Graphics, 2013

Communicating trustworthiness using radar graphs: A detailed look.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Building a better intelligence machine: A new approach to capability review and development.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Relationships between Password Choices, Perceptions of Risk and Security Expertise.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Breaking the Arc: Risk control for Big Data.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors.
IEEE Trans. Dependable Secur. Comput., 2012

Refinement checking for privacy policies.
Sci. Comput. Program., 2012

Insider Attacks in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Using Information Trustworthiness Advice in Decision Making.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

An initial usability evaluation of the secure situation awareness system.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

A Model for Identity in the Cyber and Natural Universes.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Trustworthy and effective communication of cybersecurity risks: A review.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation.
Proceedings of the Privacy and Identity Management for Life, 2011

Developing a Strategy for Automated Privacy Testing Suites.
Proceedings of the Privacy and Identity Management for Life, 2011

Guidelines for usable cybersecurity: Past and present.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

A logical high-level framework for Critical Infrastructure resilience and risk assessment.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

Analysis of Dependencies in Critical Infrastructures.
Proceedings of the Critical Information Infrastructure Security, 2011

Biodiversity: A security approach for ad hoc networks.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
Refinement-Friendly Bigraphs and Spygraphs.
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010

EnCoRe: Towards a Holistic Approach to Privacy.
Proceedings of the SECRYPT 2010, 2010

A Conceptual Model for Privacy Policies with Consent and Revocation Requirements.
Proceedings of the Privacy and Identity Management for Life, 2010

Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements.
Proceedings of the Privacy and Identity Management for Life, 2010

A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract.
Proceedings of the Critical Information Infrastructures Security, 2010

Inadequacies of Current Risk Controls for the Cloud.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Can Cognitive Science Help Us Make Online Risk More Tangible?.
IEEE Intell. Syst., 2009

Reaching for Informed Revocation: Shutting Off the Tap on Personal Data.
Proceedings of the Privacy and Identity Management for Life, 2009

Data Protection-Aware Design for Cloud Services.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

2008
Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-design.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

2006
Bootstrapping multi-party ad-hoc security.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

2005
Exploiting Empirical Engagement in Authentication Protocol Design.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

2004
Industrial Strength CSP: Opportunities and Challenges in Model-Checking.
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004

2003
Authentication for Pervasive Computing.
Proceedings of the Security in Pervasive Computing, 2003

2001
Data independent induction : CSP model checking or arbitary sized networks.
PhD thesis, 2001

2000
Data Independent Induction over Structured Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

1999
Formal Verification of Arbitrary Network Topologies.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Verifying End-to-End Protocols using Induction with CSP/FDR.
Proceedings of the Parallel and Distributed Processing, 1999

Verifying an infinite family of inductions simultaneously using data independence and FDR.
Proceedings of the Formal Methods for Protocol Engineering and Distributed Systems, 1999


  Loading...