Toggle Main Menu Toggle Search

Open Access padlockePrints

Browsing publications by Dr Charles Morisset.

Newcastle AuthorsTitleYearFull text
Naoom Abu Abah
Dr Nick Taylor
Dr Charles Morisset
U-Sense: Feasibility Study of "Human as a Sensor" in Incident Reporting Systems in a Smart Campus2023
Dr Maryam Mehrnezhad
Dr Charles Morisset
"I feel spied on and I don't have any control over my data": User Privacy Perception, Preferences and Trade-offs in University Smart Buildings2022
Dr Charles Morisset
Dr John Mace
Cybersecurity Roadmap for Active Buildings2022
Luca Arnaboldi
Dr Ricardo Melo Czekster
Dr Charles Morisset
Dr Roberto Metere
Modelling Load-Changing Attacks in Cyber-Physical Systems2020
Dr John Mace
Dr Charles Morisset
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations2020
Dr Charles Morisset
A framework for the extended evaluation of ABAC policies2019
Dr John Mace
Dr Charles Morisset
Louise Smith
A Socio-Technical Ethical Process for Managing Access to Smart Building Data2019
Dr John Mace
Dr Charles Morisset
Dr Luke Smith
A socio-technical ethical process for managing access to smart building data2019
Dr John Mace
Dr Charles Morisset
Dr Ken Pierce
Dr Carl Gamble
Professor John Fitzgerald
et al.
A multi-modelling based approach to assessing the security of smart buildings2018
Martin Mansfield
Dr Charles Morisset
Dr Carl Gamble
Dr John Mace
Dr Ken Pierce
et al.
Design Space Exploration for Secure Building Control2018
Dr Charles Morisset
Efficient extended ABAC evaluation2018
Luca Arnaboldi
Dr Charles Morisset
Generating synthetic data for real world detection of DoS attacks in the IoT2018
Peter Carmichael
Dr Charles Morisset
Learning Decision Trees from Synthetic Data Models for Human Security Behaviour2018
Razgar Ebrahimy
Dr Charles Morisset
Dr Haris Patsios
Dr Zoya Pourmirza
Report on Smart Energy Systems and Cyber Security2018
Dr Charles Morisset
VisABAC: A Tool for Visualising ABAC Policies2018
Dr John Mace
Nipun Thekkummal
Dr Charles Morisset
Professor Aad van Moorsel
ADaCS: A tool for Analysing Data Collection Strategies2017
Dr John Mace
Nipun Thekkummal
Dr Charles Morisset
Professor Aad van Moorsel
ADaCS: A Tool for Analysing Data Collection Strategies2017
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Aad van Moorsel
Modeling and analysis of influence power for information security decisions2016
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
WRAD: Tool Support for Workflow Resiliency Analysis and Design2016
Dr Iryna Yevseyeva
James Turland
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
et al.
Addressing consumerization of IT risks with nudging2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Impact of Policy Design on Workflow Resiliency Computation Time2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Impact of policy design on workflow resiliency computation time2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Modelling user availability in workflow resiliency analysis2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Modelling User Availability in Workflow Resiliency Analysis2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Modelling user availability in workflow resiliency analysis2015
Dr Charles Morisset
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval2015
Dr Charles Morisset
Probabilistic cost enforcement of security policies2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Quantitative Workflow Resiliency2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Resiliency Variance in Workflows with Choice2015
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
A Decision Making Model of Influencing Behavior in Information Security2014
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
A Decision Making Model of Influencing Behavior in Information Security2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A formal model for soft enforcement: Influencing the decision-maker2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A Formal Model for Soft Enforcement: Influencing the Decision-Maker2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A Formal Model for Soft Enforcement: Influencing the Decision-Maker2014
Dr Iryna Yevseyeva
Dr Charles Morisset
James Turland
Professor Thomas Gross
Professor Aad van Moorsel
et al.
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging2014
Dr Iryna Yevseyeva
Dr Charles Morisset
James Turland
Professor Thomas Gross
Christopher Laing
et al.
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
Formalization of Influencing in Information Security2014
Dr Charles Morisset
Monotonicity and Completeness in Attribute-Based Access Control2014
Dr Charles Morisset
Monotonicity and completeness in attribute-based access control2014
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
Dr Iryna Yevseyeva
Nudging for quantitative access control systems2014
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
Dr Iryna Yevseyeva
Nudging for Quantitative Access Control Systems2014
Dr Charles Morisset
Quantitative evaluation of enforcement strategies position paper2014
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Quantitative Workflow Resiliency2014
Dr Charles Morisset
Reduction of access control decisions2014
Suliman Alsuhibany
Dr Charles Morisset
Professor Aad van Moorsel
Detection of attack strategies2013
Suliman Alsuhibany
Ahmad Alonaizi
Dr Charles Morisset
Dr Christopher Smith
Professor Aad van Moorsel
et al.
Experimental investigation in the impact on security of the release order of defensive algorithms2013