Michael Goldsmith
Orcid: 0000-0001-7808-0600
According to our database1,
Michael Goldsmith
authored at least 109 papers
between 1985 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on viaf.org
-
on id.loc.gov
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Big Data Res., 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI.
CoRR, 2023
2022
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations.
J. Inf. Secur. Appl., 2022
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda.
DTRAP, 2022
A comparison of online hate on reddit and 4chan: a case study of the 2020 US election.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Int. J. Embed. Syst., 2020
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice.
J. Cybersecur., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020
Design and deployment of a real-time AI-based telehealth system for deterioration prediction of critical-care patients in a large children's hospital.
Proceedings of the AMIA 2020, 2020
2019
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement.
CoRR, 2019
Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019
Proceedings of the International Conference on Cyber Situational Awareness, 2019
Leveraging temporal patterns in physiological variables for prediction of critical events in single ventricle infants.
Proceedings of the AMIA 2019, 2019
2018
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate.
J. Cybersecur., 2018
CoRR, 2018
Adv. Comput., 2018
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018
2017
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment.
IEEE Syst. J., 2017
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017
2016
Secur. Informatics, 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
2015
Investigating the leakage of sensitive personal and organisational information in email headers.
J. Internet Serv. Inf. Secur., 2015
Concurr. Comput. Pract. Exp., 2015
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015
Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
J. Internet Serv. Inf. Secur., 2014
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.
J. Internet Serv. Inf. Secur., 2014
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Proceedings of the 35th Communicating Process Architectures, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Theory and Practice of Computer Graphics, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment.
Proceedings of the Critical Information Infrastructures Security, 2012
Proceedings of the Computer Aided Verification - 24th International Conference, 2012
2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation.
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011
A logical high-level framework for Critical Infrastructure resilience and risk assessment.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011
Proceedings of the Critical Information Infrastructure Security, 2011
2010
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010
EnCoRe: Towards a Holistic Approach to Privacy.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Privacy and Identity Management for Life, 2010
Proceedings of the Privacy and Identity Management for Life, 2010
A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract.
Proceedings of the Critical Information Infrastructures Security, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
2009
Proceedings of the thirty-second Communicating Process Architectures Conference, 2009
Proceedings of the Privacy and Identity Management for Life, 2009
2008
Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-design.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008
A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking.
Proceedings of the Formal Methods and Software Engineering, 2008
2007
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007
2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
2004
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004
2003
Proceedings of the Model Checking Software, 2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the FME 2003: Formal Methods, 2003
1999
Challenges to Process-Algebraic Property-Checking.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
1998
Proceedings of the Applied Formal Methods, 1998
1995
Hierarchical Compression for Model-Checking CSP or How to Check 10<sup>20</sup> Dining Philosophers for Deadlock.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1995
1987
Proceedings of the STACS 87, 1987
1985
Programming in occam 2.
Prentice Hall international series in computer science, Prentice Hall, ISBN: 978-0-13-730334-2, 1985