Naoom Abu Abah Dr Nick Taylor Dr Charles Morisset
| U-Sense: Feasibility Study of "Human as a Sensor" in Incident Reporting Systems in a Smart Campus | 2023 |
|
Dr Maryam Mehrnezhad Dr Charles Morisset
| "I feel spied on and I don't have any control over my data": User Privacy Perception, Preferences and Trade-offs in University Smart Buildings | 2022 |
|
Dr Charles Morisset Dr John Mace
| Cybersecurity Roadmap for Active Buildings | 2022 |
|
Luca Arnaboldi Dr Ricardo Melo Czekster Dr Charles Morisset Dr Roberto Metere
| Modelling Load-Changing Attacks in Cyber-Physical Systems | 2020 |
|
Dr John Mace Dr Charles Morisset
| Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations | 2020 |
|
Dr Charles Morisset
| A framework for the extended evaluation of ABAC policies | 2019 |
|
Dr John Mace Dr Charles Morisset Louise Smith
| A Socio-Technical Ethical Process for Managing Access to Smart Building Data | 2019 |
|
Dr John Mace Dr Charles Morisset Dr Luke Smith
| A socio-technical ethical process for managing access to smart building data | 2019 |
|
Dr John Mace Dr Charles Morisset Dr Ken Pierce Dr Carl Gamble Professor John Fitzgerald et al. | A multi-modelling based approach to assessing the security of smart buildings | 2018 |
|
Martin Mansfield Dr Charles Morisset Dr Carl Gamble Dr John Mace Dr Ken Pierce et al. | Design Space Exploration for Secure Building Control | 2018 |
|
Dr Charles Morisset
| Efficient extended ABAC evaluation | 2018 |
|
Luca Arnaboldi Dr Charles Morisset
| Generating synthetic data for real world detection of DoS attacks in the IoT | 2018 |
|
Peter Carmichael Dr Charles Morisset
| Learning Decision Trees from Synthetic Data Models for Human Security Behaviour | 2018 |
|
Razgar Ebrahimy Dr Charles Morisset Professor Haris Patsios Dr Zoya Pourmirza
| Report on Smart Energy Systems and Cyber Security | 2018 |
|
Dr Charles Morisset
| VisABAC: A Tool for Visualising ABAC Policies | 2018 |
|
Dr John Mace Nipun Thekkummal Dr Charles Morisset Professor Aad van Moorsel
| ADaCS: A tool for Analysing Data Collection Strategies | 2017 |
|
Dr John Mace Nipun Thekkummal Dr Charles Morisset Professor Aad van Moorsel
| ADaCS: A Tool for Analysing Data Collection Strategies | 2017 |
|
Dr Iryna Yevseyeva Dr Charles Morisset Professor Aad van Moorsel
| Modeling and analysis of influence power for information security decisions | 2016 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| WRAD: Tool Support for Workflow Resiliency Analysis and Design | 2016 |
|
Dr Iryna Yevseyeva James Turland Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel et al. | Addressing consumerization of IT risks with nudging | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Impact of Policy Design on Workflow Resiliency Computation Time | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Impact of policy design on workflow resiliency computation time | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Modelling user availability in workflow resiliency analysis | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Modelling User Availability in Workflow Resiliency Analysis | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Modelling user availability in workflow resiliency analysis | 2015 |
|
Dr Charles Morisset
| On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval | 2015 |
|
Dr Charles Morisset
| Probabilistic cost enforcement of security policies | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Quantitative Workflow Resiliency | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Resiliency Variance in Workflows with Choice | 2015 |
|
Dr Iryna Yevseyeva Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel
| A Decision Making Model of Influencing Behavior in Information Security | 2014 |
|
Dr Iryna Yevseyeva Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel
| A Decision Making Model of Influencing Behavior in Information Security | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| A formal model for soft enforcement: Influencing the decision-maker | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| A Formal Model for Soft Enforcement: Influencing the Decision-Maker | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| A Formal Model for Soft Enforcement: Influencing the Decision-Maker | 2014 |
|
Dr Iryna Yevseyeva Dr Charles Morisset James Turland Professor Thomas Gross Professor Aad van Moorsel et al. | Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging | 2014 |
|
Dr Iryna Yevseyeva Dr Charles Morisset James Turland Professor Thomas Gross Christopher Laing et al. | Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| Formalization of Influencing in Information Security | 2014 |
|
Dr Charles Morisset
| Monotonicity and Completeness in Attribute-Based Access Control | 2014 |
|
Dr Charles Morisset
| Monotonicity and completeness in attribute-based access control | 2014 |
|
Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel Dr Iryna Yevseyeva
| Nudging for quantitative access control systems | 2014 |
|
Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel Dr Iryna Yevseyeva
| Nudging for Quantitative Access Control Systems | 2014 |
|
Dr Charles Morisset
| Quantitative evaluation of enforcement strategies position paper | 2014 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Quantitative Workflow Resiliency | 2014 |
|
Dr Charles Morisset
| Reduction of access control decisions | 2014 |
|
Suliman Alsuhibany Dr Charles Morisset Professor Aad van Moorsel
| Detection of attack strategies | 2013 |
|
Suliman Alsuhibany Ahmad Alonaizi Dr Charles Morisset Dr Christopher Smith Professor Aad van Moorsel et al. | Experimental investigation in the impact on security of the release order of defensive algorithms | 2013 |
|