default search action
Sadie Creese
Person information
- affiliation: University of Oxford, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c66]Ahmed Salman, Sadie Creese, Michael Goldsmith:
Position Paper: Leveraging Large Language Models for Cybersecurity Compliance. EuroS&P Workshops 2024: 496-503 - 2023
- [j36]Louise Axon, Arnau Erola, Ioannis Agrafiotis, Ganbayar Uuganbayar, Michael Goldsmith, Sadie Creese:
Ransomware as a Predator: Modelling the Systemic Risk to Prey. DTRAP 4(4): 55:1-55:38 (2023) - [i12]Louise Axon, Dimitrios Panagiotakopoulos, Samuel Ayo, Carolina Sanchez-Hernandez, Yan Zong, Simon Brown, Lei Zhang, Michael Goldsmith, Sadie Creese, Weisi Guo:
Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI. CoRR abs/2304.14095 (2023) - 2022
- [j35]Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. Comput. Secur. 113: 102545 (2022) - [j34]Ruth Shillair, Patricia Esteve-González, William H. Dutton, Sadie Creese, Eva Nagyfejeo, Basie von Solms:
Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Comput. Secur. 119: 102756 (2022) - [j33]Louise Axon, Katherine Fletcher, Arianna Schuler Scott, Marcel Stolz, Robert Hannigan, Ali El Kaafarani, Michael Goldsmith, Sadie Creese:
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda. DTRAP 3(4): 34:1-34:27 (2022) - [j32]Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations. J. Inf. Secur. Appl. 67: 103167 (2022) - 2021
- [j31]Jassim Happa, Ioannis Agrafiotis, Martin Helmhout, Thomas Bashford-Rogers, Michael Goldsmith, Sadie Creese:
Assessing a Decision Support Tool for SOC Analysts. DTRAP 2(3): 22:1-22:35 (2021) - [j30]Jassim Happa, Thomas Bashford-Rogers, Alastair Janse van Rensburg, Michael Goldsmith, Sadie Creese:
Deception in Network Defences Using Unpredictability. DTRAP 2(4): 29:1-29:26 (2021) - [j29]Jongkil Jay Jeong, Gillian C. Oliver, Eunsuk Kang, Sadie Creese, Peter Thomas:
The current state of research on people, culture and cybersecurity. Pers. Ubiquitous Comput. 25(5): 809-812 (2021) - [j28]Sadie Creese, William H. Dutton, Patricia Esteve-González:
The social and cultural shaping of cybersecurity capacity building: a comparative study of nations and regions. Pers. Ubiquitous Comput. 25(5): 941-955 (2021) - [j27]Louise Axon, Jassim Happa, Alastair Janse van Rensburg, Michael Goldsmith, Sadie Creese:
Sonification to Support the Monitoring Tasks of Security Operations Centres. IEEE Trans. Dependable Secur. Comput. 18(3): 1227-1244 (2021) - [c65]Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Control Effectiveness: a Capture-the-Flag Study. ARES 2021: 87:1-87:10 - [c64]Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. ARES 2021: 91:1-91:10 - [i11]Gregory Falco, Paul Cornish, Sadie Creese, Madeline Carr, Myriam Dunn Cavelty, Claudia Eckert, Herbert Lin, Gen Goto, Jamie Saunders, Andrew Grotto, Howard E. Shrobe, Sean Kanuck, Lawrence Susskind, Arvind Parthasarathi:
Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance. CoRR abs/2107.14065 (2021) - 2020
- [j26]Selina Y. Cho, Jassim Happa, Sadie Creese:
Capturing Tacit Knowledge in Security Operation Centers. IEEE Access 8: 42021-42041 (2020) - [j25]Carsten Rudolph, Sadie Creese, Sameer Sharma:
Cybersecurity in Pacific Island nations. Commun. ACM 63(4): 53-54 (2020) - [j24]Louise Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice. J. Cybersecur. 6(1): tyaa004 (2020) - [c63]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CyberSA 2020: 1-8 - [i10]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CoRR abs/2008.04713 (2020)
2010 – 2019
- 2019
- [j23]Jassim Happa, Thomas Bashford-Rogers, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Anomaly Detection Using Pattern-of-Life Visual Metaphors. IEEE Access 7: 154018-154034 (2019) - [j22]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Comput. Hum. Behav. 99: 38-54 (2019) - [j21]Louise Axon, Jassim Happa, Michael Goldsmith, Sadie Creese:
Hearing attacks in network data: An effectiveness study. Comput. Secur. 83: 367-388 (2019) - [j20]Rodrigo Carvalho, Michael Goldsmith, Sadie Creese:
Investigating Malware Campaigns With Semantic Technologies. IEEE Secur. Priv. 17(1): 43-54 (2019) - [j19]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
(Smart)Watch Out! encouraging privacy-protective behavior through interactive games. Int. J. Hum. Comput. Stud. 132: 121-137 (2019) - [c62]Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Analysing cyber-insurance claims to design harm-propagation trees. CyberSA 2019: 1-4 - [c61]Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing. Cyber Security 2019: 1-9 - [c60]Arianna Schuler Scott, Michael Goldsmith, Harriet Teare, Helena Webb, Sadie Creese:
Why We Trust Dynamic Consent to Deliver on Privacy. IFIPTM 2019: 28-38 - [i9]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. CoRR abs/1905.05222 (2019) - 2018
- [j18]Louise Axon, Michael Goldsmith, Sadie Creese:
Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain. Adv. Comput. 111: 229-278 (2018) - [j17]Ioannis Agrafiotis, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, David Upton:
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1): tyy006 (2018) - [j16]Cheyenne Atapour, Ioannis Agrafiotis, Sadie Creese:
Modeling Advanced Persistent Threats to enhance anomaly detection techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(4): 71-102 (2018) - [c59]Jassim Happa, Nick Moffat, Michael Goldsmith, Sadie Creese:
Run-Time Monitoring of Data-Handling Violations. CyberICPS/SECPRE@ESORICS 2018: 213-232 - [c58]Haozhe Zhang, Ioannis Agrafiotis, Arnau Erola, Sadie Creese, Michael Goldsmith:
A State Machine System for Insider Threat Detection. GraMSec@FLoC 2018: 111-129 - [i8]Jason R. C. Nurse, Petar Radanliev, Sadie Creese, David De Roure:
If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. CoRR abs/1806.10906 (2018) - [i7]Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese:
Future Scenarios and Challenges for Security and Privacy. CoRR abs/1807.05746 (2018) - [i6]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
The Perfect Storm: The Privacy Paradox and the Internet-of-Things. CoRR abs/1807.05754 (2018) - [i5]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy Salience: Taxonomies and Research Opportunities. CoRR abs/1807.05756 (2018) - [i4]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
"Privacy is the Boring Bit": User Perceptions and Behaviour in the Internet-of-Things. CoRR abs/1807.05761 (2018) - [i3]Louise M. Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Sonification in security operations centres: what do security practitioners think? CoRR abs/1807.06706 (2018) - [i2]Aastha Madaan, Jason R. C. Nurse, David De Roure, Kieron O'Hara, Wendy Hall, Sadie Creese:
A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines. CoRR abs/1809.05904 (2018) - [i1]Jason R. C. Nurse, Sadie Creese, David De Roure:
Security Risk Assessment in Internet of Things Systems. CoRR abs/1811.03290 (2018) - 2017
- [j15]Jason R. C. Nurse, Sadie Creese, David De Roure:
Security Risk Assessment in Internet of Things Systems. IT Prof. 19(5): 20-26 (2017) - [j14]Daniel W. Woods, Ioannis Agrafiotis, Jason R. C. Nurse, Sadie Creese:
Mapping the coverage of security controls in cyber insurance proposal forms. J. Internet Serv. Appl. 8(1): 8:1-8:13 (2017) - [j13]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
Formalising Policies for Insider-threat Detection: A Tripwire Grammar. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 26-43 (2017) - [j12]Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese:
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment. IEEE Syst. J. 11(2): 503-512 (2017) - [c57]Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, Philip A. Legg:
RicherPicture: Semi-automated cyber defence using context-aware data analytics. CyberSA 2017: 1-8 - [c56]Jason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese:
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. HCI (22) 2017: 366-383 - [c55]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things. PST 2017: 181-190 - 2016
- [j11]Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Analytics for characterising and measuring the naturalness of online personae. Secur. Informatics 5(1): 3 (2016) - [c54]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
The Perfect Storm: The Privacy Paradox and the Internet-of-Things. ARES 2016: 644-652 - [c53]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
A Tripwire Grammar for Insider Threat Detection. MIST@CCS 2016: 105-108 - [c52]Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
A Pragmatic System-failure Assessment and Response Model. ICISSP 2016: 503-508 - [c51]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy Salience: Taxonomies and Research Opportunities. Privacy and Identity Management 2016: 263-278 - [c50]Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese:
Future scenarios and challenges for security and privacy. RTSI 2016: 1-6 - [c49]Ioannis Agrafiotis, Arnau Erola, Jassim Happa, Michael Goldsmith, Sadie Creese:
Validating an Insider Threat Detection System: A Real Scenario Perspective. IEEE Symposium on Security and Privacy Workshops 2016: 286-295 - 2015
- [j10]Monica T. Whitty, James Doodson, Sadie Creese, Duncan Hodges:
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords. Cyberpsychology Behav. Soc. Netw. 18(1): 3-7 (2015) - [j9]Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
An overview of insider attacks in cloud computing. Concurr. Comput. Pract. Exp. 27(12): 2964-2981 (2015) - [j8]Jason R. C. Nurse, Arnau Erola, Michael Goldsmith, Sadie Creese:
Investigating the leakage of sensitive personal and organisational information in email headers. J. Internet Serv. Inf. Secur. 5(1): 70-84 (2015) - [c48]Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, Koen Lamberts:
Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content. CIT/IUCC/DASC/PICom 2015: 461-468 - [c47]Rodrigo Carvalho, Michael Goldsmith, Sadie Creese:
Applying Semantic Technologies to Fight Online Banking Fraud. EISIC 2015: 61-68 - [c46]Matthieu Devlin, Jason R. C. Nurse, Duncan Hodges, Michael Goldsmith, Sadie Creese:
Predicting Graphical Passwords. HCI (22) 2015: 23-35 - [c45]Jason R. C. Nurse, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things. SIoT 2015: 5-14 - 2014
- [j7]Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese:
Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis. J. Internet Serv. Inf. Secur. 4(4): 1-13 (2014) - [j6]Ioannis Agrafiotis, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. J. Internet Serv. Inf. Secur. 4(4): 127-137 (2014) - [j5]Joseph Bruce, Jean Scholtz, Duncan Hodges, Lia R. Emanuel, Danaë Stanton Fraser, Sadie Creese, Oriana Love:
Pathways to identity: using visualization to aid law enforcement in identification tasks. Secur. Informatics 3(1): 12 (2014) - [c44]Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. HCI (24) 2014: 270-281 - [c43]Monica T. Whitty, James Doodson, Sadie Creese, Duncan Hodges:
Image Choice to Represent the Self in Different Online Environments. HCI (22) 2014: 528-537 - [c42]Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Inferring social relationships from technology-level device connections. PST 2014: 40-47 - [c41]Jason R. C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, Monica T. Whitty:
Understanding Insider Threat: A Framework for Characterising Attacks. IEEE Symposium on Security and Privacy Workshops 2014: 214-228 - [c40]Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. STAST 2014: 8-15 - 2013
- [j4]Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 20-37 (2013) - [c39]Duncan Hodges, Sadie Creese:
Breaking the Arc: Risk control for Big Data. IEEE BigData 2013: 613-621 - [c38]Sadie Creese, Duncan Hodges, Sue Jamison-Powell, Monica T. Whitty:
Relationships between Password Choices, Perceptions of Risk and Security Expertise. HCI (27) 2013: 80-89 - [c37]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Syed Sadiqur Rahman:
Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics. HCI (27) 2013: 316-325 - [c36]Duncan Hodges, Sadie Creese:
Building a better intelligence machine: A new approach to capability review and development. ISI 2013: 113-115 - [c35]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Communicating trustworthiness using radar graphs: A detailed look. PST 2013: 333-339 - [c34]James Nicholls, Dominik Peters, Albert Slawinski, Thomas Spoor, Sergiu Vicol, Jassim Happa, Michael Goldsmith, Sadie Creese:
NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data. TPCG 2013: 9-16 - [c33]Adrian J. Duncan, Sadie Creese, Michael Goldsmith, Jamie S. Quinton:
Cloud Computing: Insider Attacks on Virtual Machines during Migration. TrustCom/ISPA/IUCC 2013: 493-500 - [c32]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Building Confidence in Information-Trustworthiness Metrics for Decision Support. TrustCom/ISPA/IUCC 2013: 535-543 - 2012
- [j3]Nikolaos Papanikolaou, Sadie Creese, Michael Goldsmith:
Refinement checking for privacy policies. Sci. Comput. Program. 77(10-11): 1198-1209 (2012) - [j2]Jennifer T. Jackson, Sadie Creese:
Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors. IEEE Trans. Dependable Secur. Comput. 9(6): 930-943 (2012) - [c31]Adedayo Oyelakin Adetoye, Sadie Creese, Michael Goldsmith:
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment. CRITIS 2012: 155-167 - [c30]Duncan Hodges, Sadie Creese, Michael Goldsmith:
A Model for Identity in the Cyber and Natural Universes. EISIC 2012: 115-122 - [c29]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Rachel Craddock, Glyn Jones:
An initial usability evaluation of the secure situation awareness system. ISCRAM 2012 - [c28]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Using Information Trustworthiness Advice in Decision Making. STAST 2012: 35-42 - [c27]Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
Insider Attacks in Cloud Computing. TrustCom 2012: 857-862 - [c26]Sadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips:
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. TrustCom 2012: 1124-1131 - 2011
- [c25]Jennifer T. Jackson, Sadie Creese, Mark S. Leeson:
Biodiversity: A security approach for ad hoc networks. CICS 2011: 186-193 - [c24]Adedayo Oyelakin Adetoye, Michael Goldsmith, Sadie Creese:
Analysis of Dependencies in Critical Infrastructures. CRITIS 2011: 18-29 - [c23]Sadie Creese, Michael Goldsmith, Adedayo Adetoye:
A logical high-level framework for Critical Infrastructure resilience and risk assessment. CSS 2011: 7-14 - [c22]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Guidelines for usable cybersecurity: Past and present. CSS 2011: 21-26 - [c21]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Developing a Strategy for Automated Privacy Testing Suites. PrimeLife 2011: 32-44 - [c20]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation. PrimeLife 2011: 232-244 - [c19]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Trustworthy and effective communication of cybersecurity risks: A review. STAST 2011: 60-68 - [c18]Syed Sadiqur Rahman, Sadie Creese, Michael Goldsmith:
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources. STM 2011: 223-238 - 2010
- [c17]M. Auty, Sadie Creese, Michael Goldsmith, Paul Hopkins:
Inadequacies of Current Risk Controls for the Cloud. CloudCom 2010: 659-666 - [c16]Adedayo Adetoye, Sadie Creese, Michael Goldsmith, Paul Hopkins:
A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract. CRITIS 2010: 153-156 - [c15]Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements. PrimeLife 2010: 258-270 - [c14]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements. PrimeLife 2010: 271-282 - [c13]Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson:
EnCoRe: Towards a Holistic Approach to Privacy. SECRYPT 2010: 171-176 - [c12]Michael Goldsmith, Sadie Creese:
Refinement-Friendly Bigraphs and Spygraphs. SEFM 2010: 203-207
2000 – 2009
- 2009
- [j1]Sadie Creese, Koen Lamberts:
Can Cognitive Science Help Us Make Online Risk More Tangible?. IEEE Intell. Syst. 24(6): 32-36 (2009) - [c11]Sadie Creese, Paul Hopkins, Siani Pearson, Yun Shen:
Data Protection-Aware Design for Cloud Services. CloudCom 2009: 119-130 - [c10]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data. PrimeLife 2009: 246-258 - 2008
- [c9]Sadie Creese, Michael Goldsmith:
Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-design. SASO Workshops 2008: 73-77 - 2006
- [c8]Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao:
Bootstrapping multi-party ad-hoc security. SAC 2006: 369-375 - 2005
- [c7]Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin:
Exploiting Empirical Engagement in Authentication Protocol Design. SPC 2005: 119-133 - 2004
- [c6]Sadie Creese:
Industrial Strength CSP: Opportunities and Challenges in Model-Checking. 25 Years Communicating Sequential Processes 2004: 292-292 - 2003
- [c5]Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin:
Authentication for Pervasive Computing. SPC 2003: 116-129 - 2001
- [b1]S. J. Creese:
Data independent induction : CSP model checking or arbitary sized networks. University of Oxford, UK, 2001 - 2000
- [c4]S. J. Creese, A. W. Roscoe:
Data Independent Induction over Structured Networks. PDPTA 2000
1990 – 1999
- 1999
- [c3]S. J. Creese, A. W. Roscoe:
Verifying an infinite family of inductions simultaneously using data independence and FDR. FORTE 1999: 437-452 - [c2]S. J. Creese, Joy N. Reed:
Verifying End-to-End Protocols using Induction with CSP/FDR. IPPS/SPDP Workshops 1999: 1243-1257 - [c1]S. J. Creese, A. W. Roscoe:
Formal Verification of Arbitrary Network Topologies. PDPTA 1999: 1033-1039
Coauthor Index
aka: Louise M. Axon
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint