Name
Affiliation
Papers
ANDREW SIMPSON
Oxford University Computing Laboratory, Oxford, United Kingdom
82
Collaborators
Citations 
PageRank 
114
282
49.37
Referers 
Referees 
References 
611
1324
706
Search Limit
1001000
Title
Citations
PageRank
Year
A Success Model For Cyber Threat Intelligence Management Platforms00.342021
On the Trade-Off Between Privacy and Utility in Mobile Services - A Qualitative Study.00.342019
Cyber Threat Information Sharing: Perceived Benefits and Barriers10.412019
Connected Vehicles - A Privacy Analysis.00.342019
Abstracting Syntactic Privacy Notions via Privacy Games.00.342019
Analysing and Evaluating Syntactic Privacy Games via a Recommender Systems Case Study.00.342019
Towards Better Understanding of Cyber Security Information Sharing00.342019
Teaching Introductory Formal Methods and Discrete Mathematics to Software Engineers - Reflections on a Modelling-Focussed Approach.00.342019
Towards Integrating Insurance Data into Information Security Investment Decision Making10.632018
Can We Evaluate the Impact of Cyber Security Information Sharing?00.342018
Analysis and Evaluation of Syntactic Privacy Notions and Games.00.342018
Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection.00.342018
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment.00.342018
Rethinking the Proposition of Privacy Engineering00.342018
Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study.10.352018
A Model-Based Approach To Support Privacy Compliance00.342018
On The Performance Of A Trustworthy Remote Entity In Comparison To Secure Multi-Party Computation00.342017
Towards A Principled Approach For Engineering Privacy By Design70.552017
The Use of Data Protection Regulatory Actions as a Data Source for Privacy Economics.10.352017
Personal Data Management: An Abstract Personal Data Lifecycle Model.10.382017
On the formal interpretation and behavioural consistency checking of SysML blocks00.342017
AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices.00.342017
Privacy Games for Syntactic Privacy Notions.00.342017
A Formal Model to Facilitate Security Testing in Modern Automotive Systems.00.342017
On small-scale IT users' system architectures and cyber security: A UK case study.10.352017
Exploring the use of Intel SGX for Secure Many-Party Applications.10.402016
Software Security Investment: The Right Amount of a Good Thing00.342016
Formal Models for Privacy.10.472016
Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation.50.442016
On safety and security requirements in emerging ubiquitous computing models10.362016
A case for the economics of secure software development.10.362016
Motivating Security Engineering with Economics: A Utility Function Approach00.342016
Privacy-Preserving Targeted Mobile Advertising: Formal Models And Analysis00.342016
Small-Scale Cyber Security10.362015
When The Winning Move Is Not To Play: Games Of Deterrence In Cyber Security20.382015
Experiences in developing and delivering a programme of part-time education in software and systems security00.342015
Policy‚ Statistics‚ and Questions: Reflections on UK Cyber Security Disclosures30.432015
A Formal Model of SysML Blocks using CSP for Assured Systems Engineering30.392014
Formal relational database design: an exercise in extending the formal template language00.342014
On a Process Algebraic Representation of Sequence Diagrams.20.382014
On the Cloud-Enabled Refinement Checking of Railway Signalling Interlockings.00.342013
Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in SysML.50.482013
Conformance checking of dynamic access control policies20.382011
Automatic conformance checking of role-based access control policies via alloy40.482011
On the modelling and analysis of amazon web services access policies60.562010
Formalising and validating RBAC-to-XACML translation using lightweight formal methods10.362010
On the secure sharing and aggregation of data to support systems biology research10.382010
Towards formally templated relational database representations in z10.352010
On the Construction and Verification of Self-modifying Access Control Policies00.342009
On the Secure Sharing of Legacy Data10.352009
  • 1
  • 2