Lorena Montoya

Orcid: 0000-0001-6403-9834

According to our database1, Lorena Montoya authored at least 16 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach.
ACM Trans. Cyber Phys. Syst., 2019

Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats.
Mob. Networks Appl., 2019

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of \"Thinking Like a Thief\".
IEEE Secur. Priv., 2019

2017
Spear phishing in organisations explained.
Inf. Comput. Secur., 2017

Priming and warnings are not effective to prevent social engineering attacks.
Comput. Hum. Behav., 2017

Outlining an 'Evaluation Continuum': Structuring Evaluation Methodologies for Infrastructure-Related Decision Making Tools.
Proceedings of the Smart Grid Inspired Future Technologies, 2017

Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
Threat Navigator: Grouping and Ranking Malicious External Threats to Current and Future Urban Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2016

Assessing Loss Event Frequencies of Smart Grid Cyber Threats: Encoding Flexibility into FAIR Using Bayesian Network Approach.
Proceedings of the Smart Grid Inspired Future Technologies, 2016

Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies.
Proceedings of the IEEE International Smart Cities Conference, 2016

A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Regression Nodes: Extending Attack Trees with Data from Social Sciences.
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015

2013
Applying the Lost-Letter Technique to Assess IT Risk Behaviour.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

How "Digital" is Traditional Crime?
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

2003
Geo-data acquisition through mobile GIS and digital video: an urban disaster management perspective.
Environ. Model. Softw., 2003


  Loading...