Sadie Creese
Orcid: 0000-0002-2414-9657Affiliations:
- University of Oxford, UK
According to our database1,
Sadie Creese
authored at least 108 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on twitter.com
-
on orcid.org
-
on cs.ox.ac.uk
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI.
CoRR, 2023
2022
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations.
J. Inf. Secur. Appl., 2022
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda.
DTRAP, 2022
Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise.
Comput. Secur., 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Pers. Ubiquitous Comput., 2021
The social and cultural shaping of cybersecurity capacity building: a comparative study of nations and regions.
Pers. Ubiquitous Comput., 2021
CoRR, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice.
J. Cybersecur., 2020
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020
2019
<i>(Smart)Watch Out!</i> encouraging privacy-protective behavior through interactive games.
Int. J. Hum. Comput. Stud., 2019
Comput. Hum. Behav., 2019
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019
Proceedings of the International Conference on Cyber Situational Awareness, 2019
2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate.
J. Cybersecur., 2018
CoRR, 2018
If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems.
CoRR, 2018
Adv. Comput., 2018
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
2017
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment.
IEEE Syst. J., 2017
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
J. Internet Serv. Appl., 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017
2016
Secur. Informatics, 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Investigating the leakage of sensitive personal and organisational information in email headers.
J. Internet Serv. Inf. Secur., 2015
Concurr. Comput. Pract. Exp., 2015
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords.
Cyberpsychology Behav. Soc. Netw., 2015
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015
Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Pathways to identity: using visualization to aid law enforcement in identification tasks.
Secur. Informatics, 2014
J. Internet Serv. Inf. Secur., 2014
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.
J. Internet Serv. Inf. Secur., 2014
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Social Computing and Social Media, 2014
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Theory and Practice of Computer Graphics, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Building a better intelligence machine: A new approach to capability review and development.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment.
Proceedings of the Critical Information Infrastructures Security, 2012
2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation.
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011
A logical high-level framework for Critical Infrastructure resilience and risk assessment.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011
Proceedings of the Critical Information Infrastructure Security, 2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
2010
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010
EnCoRe: Towards a Holistic Approach to Privacy.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Privacy and Identity Management for Life, 2010
Proceedings of the Privacy and Identity Management for Life, 2010
A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract.
Proceedings of the Critical Information Infrastructures Security, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
2009
IEEE Intell. Syst., 2009
Proceedings of the Privacy and Identity Management for Life, 2009
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
2008
Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-design.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008
2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
2004
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
2001
PhD thesis, 2001
2000
Data Independent Induction over Structured Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
1999
Formal Verification of Arbitrary Network Topologies.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Proceedings of the Parallel and Distributed Processing, 1999
Verifying an infinite family of inductions simultaneously using data independence and FDR.
Proceedings of the Formal Methods for Protocol Engineering and Distributed Systems, 1999