Follow
Arnau Erola
Arnau Erola
Researcher, Department of Computer Science, University Of Oxford
Verified email at cs.ox.ac.uk - Homepage
Title
Cited by
Cited by
Year
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
Computers & security 105, 102248, 2021
7092021
Baiting the hook: factors impacting susceptibility to phishing attacks
C Iuga, JRC Nurse, A Erola
Human-centric Computing and Information Sciences 6, 1-20, 2016
1342016
User k-anonymity for privacy preserving data mining of query logs
G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca
Information Processing & Management 48 (3), 476-487, 2012
802012
Smart insiders: exploring the threat from insiders using the internet-of-things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015
602015
Exploiting social networks to provide privacy in personalized web search
A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz
Journal of Systems and Software 84 (10), 1734-1745, 2011
532011
The anatomy of online deception: What makes automated text convincing?
RM Everett, JRC Nurse, A Erola
Proceedings of the 31st Annual ACM symposium on applied computing, 1115-1120, 2016
482016
Utility preserving query log anonymization via semantic microaggregation
M Batet, A Erola, D Sánchez, J Castellà-Roca
Information Sciences 242, 49-63, 2013
452013
The data that drives cyber insurance: A study into the underwriting and claims processes
JRC Nurse, L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2020 International conference on cyber situational awareness, data analytics …, 2020
442020
The challenge of detecting sophisticated attacks: Insights from SOC Analysts
O Akinrolabu, I Agrafiotis, A Erola
Proceedings of the 13th international conference on availability …, 2018
302018
Semantic microaggregation for the anonymization of query logs
A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra
Privacy in Statistical Databases: UNESCO Chair in Data Privacy …, 2010
252010
A system to calculate Cyber Value-at-Risk
A Erola, I Agrafiotis, JRC Nurse, L Axon, M Goldsmith, S Creese
Computers & Security 113, 102545, 2022
232022
Validating an insider threat detection system: A real scenario perspective
I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese
2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016
222016
Semantic microaggregation for the anonymization of query logs using the open directory project
A Erola, J Castella-Roca, G Navarro-Arribas, V Torra
SORT, 41-58, 2011
182011
Investigating the leakage of sensitive personal and organisational information in email headers
JRC Nurse, A Erola, M Goldsmith, S Creese
Journal of Internet Services and Information Security 5 (1), 70-84, 2015
162015
A tripwire grammar for insider threat detection
I Agrafiotis, A Erola, M Goldsmith, S Creese
Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016
152016
Semantic Anonymisation of Set-valued Data.
M Batet, A Erola, D Sánchez, J Castellà-Roca
ICAART (1), 102-112, 2014
142014
Analysing cyber-insurance claims to design harm-propagation trees
L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2019 International Conference On Cyber Situational Awareness, Data Analytics …, 2019
132019
Formalising policies for insider-threat detection: A tripwire grammar.
I Agrafiotis, A Erola, M Goldsmith, S Creese
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8 (1), 26-43, 2017
132017
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
A Erola, I Agrafiotis, M Goldsmith, S Creese
Journal of Information Security and Applications 67, 103167, 2022
112022
RicherPicture: Semi-automated cyber defence using context-aware data analytics
A Erola, I Agrafiotis, J Happa, M Goldsmith, S Creese, PA Legg
2017 International Conference On Cyber Situational Awareness, Data Analytics …, 2017
112017
The system can't perform the operation now. Try again later.
Articles 1–20