default search action
Arnau Erola
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Louise Axon
, Arnau Erola
, Ioannis Agrafiotis, Ganbayar Uuganbayar, Michael Goldsmith
, Sadie Creese
:
Ransomware as a Predator: Modelling the Systemic Risk to Prey. DTRAP 4(4): 55:1-55:38 (2023) - [e1]Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier J. A. Bellekens, Hanan Hindy, Martin Gilje Jaatun:
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media, Cyber Science 2022, Wales, UK, June 20-21, 2022. Springer Proceedings in Complexity, Springer 2023, ISBN 978-981-19-6414-5 [contents] - 2022
- [j10]Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. Comput. Secur. 113: 102545 (2022) - [j9]Arnau Erola
, Ioannis Agrafiotis, Michael Goldsmith
, Sadie Creese:
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations. J. Inf. Secur. Appl. 67: 103167 (2022) - 2021
- [j8]Harjinder Singh Lallie
, Lynsay A. Shepherd
, Jason R. C. Nurse
, Arnau Erola, Gregory Epiphaniou
, Carsten Maple, Xavier J. A. Bellekens
:
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105: 102248 (2021) - [c15]Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Control Effectiveness: a Capture-the-Flag Study. ARES 2021: 87:1-87:10 - [c14]Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. ARES 2021: 91:1-91:10 - 2020
- [c13]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CyberSA 2020: 1-8 - [i2]Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens:
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. CoRR abs/2006.11929 (2020) - [i1]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CoRR abs/2008.04713 (2020)
2010 – 2019
- 2019
- [c12]Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Analysing cyber-insurance claims to design harm-propagation trees. CyberSA 2019: 1-4 - 2018
- [c11]Olusola Akinrolabu, Ioannis Agrafiotis, Arnau Erola:
The challenge of detecting sophisticated attacks: Insights from SOC Analysts. ARES 2018: 55:1-55:9 - [c10]Haozhe Zhang, Ioannis Agrafiotis, Arnau Erola, Sadie Creese, Michael Goldsmith:
A State Machine System for Insider Threat Detection. GraMSec@FLoC 2018: 111-129 - 2017
- [j7]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
Formalising Policies for Insider-threat Detection: A Tripwire Grammar. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 26-43 (2017) - [c9]Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, Philip A. Legg
:
RicherPicture: Semi-automated cyber defence using context-aware data analytics. CyberSA 2017: 1-8 - [c8]Jason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese:
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. HCI (22) 2017: 366-383 - 2016
- [j6]Cristian Iuga, Jason R. C. Nurse, Arnau Erola:
Baiting the hook: factors impacting susceptibility to phishing attacks. Hum. centric Comput. Inf. Sci. 6: 8 (2016) - [j5]Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Analytics for characterising and measuring the naturalness of online personae. Secur. Informatics 5(1): 3 (2016) - [c7]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
A Tripwire Grammar for Insider Threat Detection. MIST@CCS 2016: 105-108 - [c6]Richard M. Everett, Jason R. C. Nurse, Arnau Erola:
The anatomy of online deception: what makes automated text convincing? SAC 2016: 1115-1120 - [c5]Ioannis Agrafiotis, Arnau Erola, Jassim Happa, Michael Goldsmith, Sadie Creese:
Validating an Insider Threat Detection System: A Real Scenario Perspective. IEEE Symposium on Security and Privacy Workshops 2016: 286-295 - 2015
- [j4]Jason R. C. Nurse, Arnau Erola, Michael Goldsmith, Sadie Creese:
Investigating the leakage of sensitive personal and organisational information in email headers. J. Internet Serv. Inf. Secur. 5(1): 70-84 (2015) - [c4]Jason R. C. Nurse, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things. SIoT 2015: 5-14 - 2014
- [c3]Montserrat Batet, Arnau Erola, David Sánchez, Jordi Castellà-Roca:
Semantic Anonymisation of Set-valued Data. ICAART (1) 2014: 102-112 - 2013
- [b1]Arnau Erola:
Contributions to privacy in web search engines. University of Rovira i Virgili, Spain, 2013 - [j3]Montserrat Batet
, Arnau Erola, David Sánchez
, Jordi Castellà-Roca
:
Utility preserving query log anonymization via semantic microaggregation. Inf. Sci. 242: 49-63 (2013) - [c2]Arnau Erola, Jordi Castellà-Roca
:
Using Search Results to Microaggregate Query Logs Semantically. DPM/SETOP 2013: 148-161 - 2012
- [j2]Guillermo Navarro-Arribas
, Vicenç Torra
, Arnau Erola, Jordi Castellà-Roca
:
User k-anonymity for privacy preserving data mining of query logs. Inf. Process. Manag. 48(3): 476-487 (2012) - 2011
- [j1]Arnau Erola, Jordi Castellà-Roca
, Alexandre Viejo
, Josep Maria Mateo-Sanz
:
Exploiting social networks to provide privacy in personalized web search. J. Syst. Softw. 84(10): 1734-1745 (2011) - 2010
- [c1]Arnau Erola, Jordi Castellà-Roca
, Guillermo Navarro-Arribas
, Vicenç Torra
:
Semantic Microaggregation for the Anonymization of Query Logs. Privacy in Statistical Databases 2010: 127-137
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint