Newcastle University
Toggle Main Menu
Toggle Search
Home
Browse
Latest
Policies
About
Home
Browse
Latest
Policies
About
ePrints
Browse by author
Browsing publications by
Dr Charles Morisset.
Newcastle Authors
Title
Year
Full text
Naoom Abu Abah
Dr Nick Taylor
Dr Charles Morisset
U-Sense: Feasibility Study of "Human as a Sensor" in Incident Reporting Systems in a Smart Campus
2023
Dr Maryam Mehrnezhad
Dr Charles Morisset
"I feel spied on and I don't have any control over my data": User Privacy Perception, Preferences and Trade-offs in University Smart Buildings
2022
Dr Charles Morisset
Dr John Mace
Cybersecurity Roadmap for Active Buildings
2022
Luca Arnaboldi
Dr Ricardo Melo Czekster
Dr Charles Morisset
Dr Roberto Metere
Modelling Load-Changing Attacks in Cyber-Physical Systems
2020
Dr John Mace
Dr Charles Morisset
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations
2020
Dr Charles Morisset
A framework for the extended evaluation of ABAC policies
2019
Dr John Mace
Dr Charles Morisset
Louise Smith
A Socio-Technical Ethical Process for Managing Access to Smart Building Data
2019
Dr John Mace
Dr Charles Morisset
Dr Luke Smith
A socio-technical ethical process for managing access to smart building data
2019
Dr John Mace
Dr Charles Morisset
Dr Ken Pierce
Dr Carl Gamble
Professor John Fitzgerald
et al.
A multi-modelling based approach to assessing the security of smart buildings
2018
Martin Mansfield
Dr Charles Morisset
Dr Carl Gamble
Dr John Mace
Dr Ken Pierce
et al.
Design Space Exploration for Secure Building Control
2018
Dr Charles Morisset
Efficient extended ABAC evaluation
2018
Luca Arnaboldi
Dr Charles Morisset
Generating synthetic data for real world detection of DoS attacks in the IoT
2018
Peter Carmichael
Dr Charles Morisset
Learning Decision Trees from Synthetic Data Models for Human Security Behaviour
2018
Razgar Ebrahimy
Dr Charles Morisset
Professor Haris Patsios
Dr Zoya Pourmirza
Report on Smart Energy Systems and Cyber Security
2018
Dr Charles Morisset
VisABAC: A Tool for Visualising ABAC Policies
2018
Dr John Mace
Nipun Thekkummal
Dr Charles Morisset
Professor Aad van Moorsel
ADaCS: A tool for Analysing Data Collection Strategies
2017
Dr John Mace
Nipun Thekkummal
Dr Charles Morisset
Professor Aad van Moorsel
ADaCS: A Tool for Analysing Data Collection Strategies
2017
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Aad van Moorsel
Modeling and analysis of influence power for information security decisions
2016
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
WRAD: Tool Support for Workflow Resiliency Analysis and Design
2016
Dr Iryna Yevseyeva
James Turland
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
et al.
Addressing consumerization of IT risks with nudging
2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Impact of Policy Design on Workflow Resiliency Computation Time
2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Impact of policy design on workflow resiliency computation time
2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Modelling user availability in workflow resiliency analysis
2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Modelling User Availability in Workflow Resiliency Analysis
2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Modelling user availability in workflow resiliency analysis
2015
Dr Charles Morisset
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval
2015
Dr Charles Morisset
Probabilistic cost enforcement of security policies
2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Quantitative Workflow Resiliency
2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Resiliency Variance in Workflows with Choice
2015
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
A Decision Making Model of Influencing Behavior in Information Security
2014
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
A Decision Making Model of Influencing Behavior in Information Security
2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A formal model for soft enforcement: Influencing the decision-maker
2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A Formal Model for Soft Enforcement: Influencing the Decision-Maker
2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A Formal Model for Soft Enforcement: Influencing the Decision-Maker
2014
Dr Iryna Yevseyeva
Dr Charles Morisset
James Turland
Professor Thomas Gross
Professor Aad van Moorsel
et al.
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging
2014
Dr Iryna Yevseyeva
Dr Charles Morisset
James Turland
Professor Thomas Gross
Christopher Laing
et al.
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging
2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
Formalization of Influencing in Information Security
2014
Dr Charles Morisset
Monotonicity and Completeness in Attribute-Based Access Control
2014
Dr Charles Morisset
Monotonicity and completeness in attribute-based access control
2014
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
Dr Iryna Yevseyeva
Nudging for quantitative access control systems
2014
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
Dr Iryna Yevseyeva
Nudging for Quantitative Access Control Systems
2014
Dr Charles Morisset
Quantitative evaluation of enforcement strategies position paper
2014
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Quantitative Workflow Resiliency
2014
Dr Charles Morisset
Reduction of access control decisions
2014
Suliman Alsuhibany
Dr Charles Morisset
Professor Aad van Moorsel
Detection of attack strategies
2013
Suliman Alsuhibany
Ahmad Alonaizi
Dr Charles Morisset
Dr Christopher Smith
Professor Aad van Moorsel
et al.
Experimental investigation in the impact on security of the release order of defensive algorithms
2013