Michael Goldsmith

Orcid: 0000-0001-7808-0600

According to our database1, Michael Goldsmith authored at least 109 papers between 1985 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Unmasking hate in the pandemic: A cross-platform study of the COVID-19 infodemic.
Big Data Res., 2024

Position Paper: Leveraging Large Language Models for Cybersecurity Compliance.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
Ransomware as a Predator: Modelling the Systemic Risk to Prey.
DTRAP, 2023

Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI.
CoRR, 2023

2022
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations.
J. Inf. Secur. Appl., 2022

Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda.
DTRAP, 2022

A system to calculate Cyber Value-at-Risk.
Comput. Secur., 2022

A comparison of online hate on reddit and 4chan: a case study of the 2020 US election.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
Sonification to Support the Monitoring Tasks of Security Operations Centres.
IEEE Trans. Dependable Secur. Comput., 2021

Deception in Network Defences Using Unpredictability.
DTRAP, 2021

Assessing a Decision Support Tool for SOC Analysts.
DTRAP, 2021

A Novel Behavioural Screenlogger Detection System.
Proceedings of the Information Security - 24th International Conference, 2021

Control Effectiveness: a Capture-the-Flag Study.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Practitioners' Views on Cybersecurity Control Adoption and Effectiveness.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
A survey on screenlogger attacks as well as countermeasures.
Int. J. Embed. Syst., 2020

Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice.
J. Cybersecur., 2020

Dataset Construction and Analysis of Screenshot Malware.
Proceedings of the 19th IEEE International Conference on Trust, 2020

#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

Design and deployment of a real-time AI-based telehealth system for deterioration prediction of critical-care patients in a large children's hospital.
Proceedings of the AMIA 2020, 2020

2019
Investigating Malware Campaigns With Semantic Technologies.
IEEE Secur. Priv., 2019

Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement.
CoRR, 2019

Hearing attacks in network data: An effectiveness study.
Comput. Secur., 2019

Anomaly Detection Using Pattern-of-Life Visual Metaphors.
IEEE Access, 2019

Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Why We Trust Dynamic Consent to Deliver on Privacy.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

Black-Box Attacks via the Speech Interface Using Linguistically Crafted Input.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Attack and Defence Modelling for Attacks via the Speech Interface.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Analysing cyber-insurance claims to design harm-propagation trees.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

Leveraging temporal patterns in physiological variables for prediction of critical events in single ventricle infants.
Proceedings of the AMIA 2019, 2019

2018
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate.
J. Cybersecur., 2018

Nonsense Attacks on Google Assistant.
CoRR, 2018

Sonification in security operations centres: what do security practitioners think?
CoRR, 2018

Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain.
Adv. Comput., 2018

Wider Research Applications of Dynamic Consent.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

A State Machine System for Insider Threat Detection.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018

Run-Time Monitoring of Data-Handling Violations.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment.
IEEE Syst. J., 2017

Formalising Policies for Insider-threat Detection: A Tripwire Grammar.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

PB-PKI: A Privacy-aware Blockchain-based PKI.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

RicherPicture: Semi-automated cyber defence using context-aware data analytics.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

2016
Analytics for characterising and measuring the naturalness of online personae.
Secur. Informatics, 2016

Validating an Insider Threat Detection System: A Real Scenario Perspective.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

A Pragmatic System-failure Assessment and Response Model.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Towards Designing a Multipurpose Cybercrime Intelligence Framework.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

A Tripwire Grammar for Insider Threat Detection.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Investigating the leakage of sensitive personal and organisational information in email headers.
J. Internet Serv. Inf. Secur., 2015

An overview of insider attacks in cloud computing.
Concurr. Comput. Pract. Exp., 2015

Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

Predicting Graphical Passwords.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Applying Semantic Technologies to Fight Online Banking Fraud.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis.
J. Internet Serv. Inf. Secur., 2014

Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.
J. Internet Serv. Inf. Secur., 2014

Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

Understanding Insider Threat: A Framework for Characterising Attacks.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Inferring social relationships from technology-level device connections.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

The Meaning and Implementation of SKIP in CSP.
Proceedings of the 35th Communicating Process Architectures, 2013

Building Confidence in Information-Trustworthiness Metrics for Decision Support.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Cloud Computing: Insider Attacks on Virtual Machines during Migration.
Proceedings of the 12th IEEE International Conference on Trust, 2013

NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data.
Proceedings of the Theory and Practice of Computer Graphics, 2013

Communicating trustworthiness using radar graphs: A detailed look.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

2012
Refinement checking for privacy policies.
Sci. Comput. Program., 2012

Insider Attacks in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Using Information Trustworthiness Advice in Decision Making.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

An initial usability evaluation of the secure situation awareness system.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

A Model for Identity in the Cyber and Natural Universes.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment.
Proceedings of the Critical Information Infrastructures Security, 2012

Recent Developments in FDR.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

2011
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Trustworthy and effective communication of cybersecurity risks: A review.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation.
Proceedings of the Privacy and Identity Management for Life, 2011

Developing a Strategy for Automated Privacy Testing Suites.
Proceedings of the Privacy and Identity Management for Life, 2011

Guidelines for usable cybersecurity: Past and present.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

A logical high-level framework for Critical Infrastructure resilience and risk assessment.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

Analysis of Dependencies in Critical Infrastructures.
Proceedings of the Critical Information Infrastructure Security, 2011

2010
Refinement-Friendly Bigraphs and Spygraphs.
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010

EnCoRe: Towards a Holistic Approach to Privacy.
Proceedings of the SECRYPT 2010, 2010

A Conceptual Model for Privacy Policies with Consent and Revocation Requirements.
Proceedings of the Privacy and Identity Management for Life, 2010

Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements.
Proceedings of the Privacy and Identity Management for Life, 2010

A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract.
Proceedings of the Critical Information Infrastructures Security, 2010

Inadequacies of Current Risk Controls for the Cloud.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Beyond Mobility : What Next After CSP/pi?
Proceedings of the thirty-second Communicating Process Architectures Conference, 2009

Reaching for Informed Revocation: Shutting Off the Tap on Personal Data.
Proceedings of the Privacy and Identity Management for Life, 2009

2008
Assumption-Commitment Support for CSP Model Checking.
J. Autom. Reason., 2008

Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-design.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking.
Proceedings of the Formal Methods and Software Engineering, 2008

2007
Preface.
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007

2006
Bootstrapping multi-party ad-hoc security.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

2005
Exploiting Empirical Engagement in Authentication Protocol Design.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

2004
Operational Semantics for Fun and Profit.
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004

2003
A Methodology for Model-Checking Ad-hoc Networks.
Proceedings of the Model Checking Software, 2003

Authentication for Pervasive Computing.
Proceedings of the Security in Pervasive Computing, 2003

Watchdog Transformations for Property-Oriented Model-Checking.
Proceedings of the FME 2003: Formal Methods, 2003

1999
Challenges to Process-Algebraic Property-Checking.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1998
Critical Systems Validation and Verification with CSP and FDR.
Proceedings of the Applied Formal Methods, 1998

1995
Hierarchical Compression for Model-Checking CSP or How to Check 10<sup>20</sup> Dining Philosophers for Deadlock.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1995

1987
An Algebraic Transformation System for Occam Programs.
Proceedings of the STACS 87, 1987

1985
Programming in occam 2.
Prentice Hall international series in computer science, Prentice Hall, ISBN: 978-0-13-730334-2, 1985


  Loading...