Arnau Erola

Orcid: 0000-0002-3049-4430

According to our database1, Arnau Erola authored at least 27 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Ransomware as a Predator: Modelling the Systemic Risk to Prey.
DTRAP, 2023

2022
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations.
J. Inf. Secur. Appl., 2022

A system to calculate Cyber Value-at-Risk.
Comput. Secur., 2022

2021
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
Comput. Secur., 2021

Control Effectiveness: a Capture-the-Flag Study.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Practitioners' Views on Cybersecurity Control Adoption and Effectiveness.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

2019
Analysing cyber-insurance claims to design harm-propagation trees.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

2018
A State Machine System for Insider Threat Detection.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018

The challenge of detecting sophisticated attacks: Insights from SOC Analysts.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Formalising Policies for Insider-threat Detection: A Tripwire Grammar.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

RicherPicture: Semi-automated cyber defence using context-aware data analytics.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
Analytics for characterising and measuring the naturalness of online personae.
Secur. Informatics, 2016

Baiting the hook: factors impacting susceptibility to phishing attacks.
Hum. centric Comput. Inf. Sci., 2016

Validating an Insider Threat Detection System: A Real Scenario Perspective.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

The anatomy of online deception: what makes automated text convincing?
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

A Tripwire Grammar for Insider Threat Detection.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Investigating the leakage of sensitive personal and organisational information in email headers.
J. Internet Serv. Inf. Secur., 2015

Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

2014
Semantic Anonymisation of Set-valued Data.
Proceedings of the ICAART 2014, 2014

2013
Contributions to privacy in web search engines.
PhD thesis, 2013

Utility preserving query log anonymization via semantic microaggregation.
Inf. Sci., 2013

Using Search Results to Microaggregate Query Logs Semantically.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
User k-anonymity for privacy preserving data mining of query logs.
Inf. Process. Manag., 2012

2011
Exploiting social networks to provide privacy in personalized web search.
J. Syst. Softw., 2011

2010
Semantic Microaggregation for the Anonymization of Query Logs.
Proceedings of the Privacy in Statistical Databases, 2010


  Loading...