A Success Model For Cyber Threat Intelligence Management Platforms | 0 | 0.34 | 2021 |
On the Trade-Off Between Privacy and Utility in Mobile Services - A Qualitative Study. | 0 | 0.34 | 2019 |
Cyber Threat Information Sharing: Perceived Benefits and Barriers | 1 | 0.41 | 2019 |
Connected Vehicles - A Privacy Analysis. | 0 | 0.34 | 2019 |
Abstracting Syntactic Privacy Notions via Privacy Games. | 0 | 0.34 | 2019 |
Analysing and Evaluating Syntactic Privacy Games via a Recommender Systems Case Study. | 0 | 0.34 | 2019 |
Towards Better Understanding of Cyber Security Information Sharing | 0 | 0.34 | 2019 |
Teaching Introductory Formal Methods and Discrete Mathematics to Software Engineers - Reflections on a Modelling-Focussed Approach. | 0 | 0.34 | 2019 |
Towards Integrating Insurance Data into Information Security Investment Decision Making | 1 | 0.63 | 2018 |
Can We Evaluate the Impact of Cyber Security Information Sharing? | 0 | 0.34 | 2018 |
Analysis and Evaluation of Syntactic Privacy Notions and Games. | 0 | 0.34 | 2018 |
Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection. | 0 | 0.34 | 2018 |
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment. | 0 | 0.34 | 2018 |
Rethinking the Proposition of Privacy Engineering | 0 | 0.34 | 2018 |
Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study. | 1 | 0.35 | 2018 |
A Model-Based Approach To Support Privacy Compliance | 0 | 0.34 | 2018 |
On The Performance Of A Trustworthy Remote Entity In Comparison To Secure Multi-Party Computation | 0 | 0.34 | 2017 |
Towards A Principled Approach For Engineering Privacy By Design | 7 | 0.55 | 2017 |
The Use of Data Protection Regulatory Actions as a Data Source for Privacy Economics. | 1 | 0.35 | 2017 |
Personal Data Management: An Abstract Personal Data Lifecycle Model. | 1 | 0.38 | 2017 |
On the formal interpretation and behavioural consistency checking of SysML blocks | 0 | 0.34 | 2017 |
AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices. | 0 | 0.34 | 2017 |
Privacy Games for Syntactic Privacy Notions. | 0 | 0.34 | 2017 |
A Formal Model to Facilitate Security Testing in Modern Automotive Systems. | 0 | 0.34 | 2017 |
On small-scale IT users' system architectures and cyber security: A UK case study. | 1 | 0.35 | 2017 |
Exploring the use of Intel SGX for Secure Many-Party Applications. | 1 | 0.40 | 2016 |
Software Security Investment: The Right Amount of a Good Thing | 0 | 0.34 | 2016 |
Formal Models for Privacy. | 1 | 0.47 | 2016 |
Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation. | 5 | 0.44 | 2016 |
On safety and security requirements in emerging ubiquitous computing models | 1 | 0.36 | 2016 |
A case for the economics of secure software development. | 1 | 0.36 | 2016 |
Motivating Security Engineering with Economics: A Utility Function Approach | 0 | 0.34 | 2016 |
Privacy-Preserving Targeted Mobile Advertising: Formal Models And Analysis | 0 | 0.34 | 2016 |
Small-Scale Cyber Security | 1 | 0.36 | 2015 |
When The Winning Move Is Not To Play: Games Of Deterrence In Cyber Security | 2 | 0.38 | 2015 |
Experiences in developing and delivering a programme of part-time education in software and systems security | 0 | 0.34 | 2015 |
Policy‚ Statistics‚ and Questions: Reflections on UK Cyber Security Disclosures | 3 | 0.43 | 2015 |
A Formal Model of SysML Blocks using CSP for Assured Systems Engineering | 3 | 0.39 | 2014 |
Formal relational database design: an exercise in extending the formal template language | 0 | 0.34 | 2014 |
On a Process Algebraic Representation of Sequence Diagrams. | 2 | 0.38 | 2014 |
On the Cloud-Enabled Refinement Checking of Railway Signalling Interlockings. | 0 | 0.34 | 2013 |
Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in SysML. | 5 | 0.48 | 2013 |
Conformance checking of dynamic access control policies | 2 | 0.38 | 2011 |
Automatic conformance checking of role-based access control policies via alloy | 4 | 0.48 | 2011 |
On the modelling and analysis of amazon web services access policies | 6 | 0.56 | 2010 |
Formalising and validating RBAC-to-XACML translation using lightweight formal methods | 1 | 0.36 | 2010 |
On the secure sharing and aggregation of data to support systems biology research | 1 | 0.38 | 2010 |
Towards formally templated relational database representations in z | 1 | 0.35 | 2010 |
On the Construction and Verification of Self-modifying Access Control Policies | 0 | 0.34 | 2009 |
On the Secure Sharing of Legacy Data | 1 | 0.35 | 2009 |