Papers from Members, Experts, and Project Partners

Every month we ask our network for the papers they have recently published, and compliment that by recent publications from leading journals in digital trust, identity, privacy, and security. You can check our top list of journals and conferences here, and the list of papers below.

Paper/Issue/ReportAuthorsPublished In/By
CybSafe Research Library
Globally accessible archive of research into the human aspect of cyber security
Volume 33, issue 4, October 2020
Crypto + server infrastructure.
N/AJournal of Cryptology
A framework for effective corporate communication after cyber security incidentsRichard Knight, Jason R.C.NurseComputers & Security, Volume 99
Emotional AI and Children: Ethics, Parents. Governance
Andrew McStay, Gilad RosnerN/A
A framework to assess evidence quality in cyber security policy making
Policy briefing
Madeline Carr, Siraj ShaikhRISCS
Is your chatbot GDPR compliant?: Open issues in agent designRahime Belen Sağlam, Jason R. C. NurseCUI '20: Proceedings of the 2nd Conference on Conversational User Interfaces
Cyber Diplomacy: A Systematic Literature ReviewAmel Attatfa, Karen Renaud, Stefano DePaoliProcedia Computer Science Volume 176
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims ProcessesJason R.C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chainsPetar Radanliev, David De Roure, Kevin Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La’Treall Maddox, Pete BurnapCybersecurity volume 3
No two gangs are alike: The digital divide in street gangs’ differential adaptations to social mediaAndrew Whittaker, James Densley, Karin S.MoserComputers in Human Behavior Volume 110
The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research DirectionsChristina Katsini, Yasmeen Abdrabou, George E. Raptis, Mohamed Khamis, Florian AltCHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network SystemsXiong Li, Jieyao Peng, Mohammad S. Obaidat, Fan Wu, Muhammad Khurram Khan, Chaoyang ChenIEEE Systems Journal Volume 14, Issue 1
A New Detection and Prevention System for ARP Attacks Using Static EntrySherin Hijazi, Mohammad S. ObaidatIEEE Systems Journal Volume 13, Issue 3
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate PredictionsMuhammad Saad, Jinchun Choi, DaeHun Nyang, Joongheon Kim, Aziz MohaisenIEEE Systems Journal Volume 14, Issue 1

Call for Events is now open! We're supporting Members and Expert Fellows to lead activities that explore aspects of TIPS in the Digital Economy. We will help to organise the activity with up to £5,000 to cover the associated costs.