-
281
A survey of keylogger and screenlogger attacks in the banking sector and countermeasures to them
Published 2018Conference item -
282
-
283
-
284
A formalised approach to designing sonification systems for network-security monitoring
Published 2017Journal article -
285
-
286
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
Published 2022Journal article -
287
-
288
-
289
-
290
Investigating the leakage of sensitive personal and organisational information in email headers
Published 2015Journal article -
291
-
292
-
293
-
294
The attacker in ubiquitous computing environments: formalising the threat model
Published 2003Conference item -
295
A Modelling Approach for Interdependency in Digital Systems−of−Systems Security
Published 2011Conference item -
296
Investigating the leakage of sensitive personal and organisational information in email headers
Published 2015Journal article -
297
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data.
Published 2009Conference item -
298
-
299
-
300