Michael Goldsmith
#118,766
Most Influential Person Now
Computer scientist
Michael Goldsmith 's AcademicInfluence.com Rankings
Michael Goldsmith computer-science Degrees
Computer Science
#5424
World Rank
#5732
Historical Rank
Database
#8689
World Rank
#9113
Historical Rank

Download Badge
Computer Science
Michael Goldsmith 's Degrees
- PhD Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Michael Goldsmith Influential?
(Suggest an Edit or Addition)According to Wikipedia, Michael Goldsmith is a British computer scientist, senior research fellow and Lecturer at the University of Oxford, England. He is a member of Oxford University's Department of Computer Science. He is an associate director of Oxford University's Cyber Security Centre, and an Oxford Martin Fellow of The Global Cyber Security Capacity Centre. He is a fellow of Worcester College, Oxford.
Michael Goldsmith 's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Modelling and analysis of security protocols (2001) (321)
- Programming in occam 2 (1985) (224)
- Understanding Insider Threat: A Framework for Characterising Attacks (2014) (174)
- A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (2018) (131)
- Insider Attacks in Cloud Computing (2012) (112)
- Automated Insider Threat Detection System Using User and Role-Based Profile Assessment (2017) (111)
- PB-PKI: A Privacy-aware Blockchain-based PKI (2017) (107)
- Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection (2013) (70)
- Guidelines for usable cybersecurity: Past and present (2011) (69)
- Authentication for Pervasive Computing (2003) (65)
- Trustworthy and effective communication of cybersecurity risks: A review (2011) (61)
- FDR2 user manual (2000) (51)
- Information Quality and Trustworthiness: A Topical State−of−the−Art Review (2011) (51)
- The perfect spy for model−checking crypto−protocols (1997) (50)
- The attacker in ubiquitous computing environments: formalising the threat model (2003) (49)
- Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks (2017) (48)
- Caught in the act of an insider attack: detection and assessment of insider threat (2015) (48)
- Identifying attack patterns for insider threat detection (2015) (46)
- Exploiting Empirical Engagement in Authentication Protocol Design (2005) (43)
- An overview of insider attacks in cloud computing (2015) (40)
- Two sides of the coin: measuring and communicating the trustworthiness of online information (2014) (39)
- Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things (2015) (36)
- Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter (2019) (33)
- A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks (2012) (32)
- Cloud Computing: Insider Attacks on Virtual Machines during Migration (2013) (29)
- Sonification in security operations centres: what do security practitioners think? (2018) (29)
- A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches (2014) (28)
- A Conceptual Model for Privacy Policies with Consent and Revocation Requirements (2010) (28)
- A Model for Identity in the Cyber and Natural Universes (2012) (24)
- Watchdog Transformations for Property-Oriented Model-Checking (2003) (24)
- A Methodology for Model-Checking Ad-hoc Networks (2003) (23)
- The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes (2020) (20)
- Tools for understanding identity (2013) (20)
- Building Confidence in Information-Trustworthiness Metrics for Decision Support (2013) (19)
- Recent Developments in FDR (2012) (19)
- Inadequacies of Current Risk Controls for the Cloud (2010) (18)
- Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement (2019) (18)
- Bootstrapping multi-party ad-hoc security (2006) (17)
- Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources (2011) (17)
- Investigating the leakage of sensitive personal and organisational information in email headers (2015) (17)
- Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa (2019) (16)
- Cyber Harm: Concepts, Taxonomy and Measurement (2016) (15)
- Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics (2013) (15)
- CyberVis: Visualizing the potential impact of cyber attacks on the wider enterprise (2013) (15)
- Human Aspects of Information Security, Privacy, and Trust (2015) (15)
- The Oxford occam transformation system (1988) (15)
- Validating an Insider Threat Detection System: A Real Scenario Perspective (2016) (15)
- Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain (2018) (14)
- Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements (2010) (14)
- EnCoRe: Towards a holistic approach to privacy (2010) (13)
- Reaching for Informed Revocation: Shutting Off the Tap on Personal Data (2009) (13)
- Research Directions for Trust and Security in Human-Centric Computing (2005) (12)
- Formalising Policies for Insider-threat Detection: A Tripwire Grammar (2017) (11)
- The meaning and implementation of PRI ALT in occam (1988) (11)
- Using Information Trustworthiness Advice in Decision Making (2012) (11)
- Towards Designing a Multipurpose Cybercrime Intelligence Framework (2016) (11)
- Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection (2014) (11)
- Applying Social Network Analysis to Security (2015) (10)
- Applying Semantic Technologies to Fight Online Banking Fraud (2015) (10)
- Reflecting on the Use of Sonification for Network Monitoring (2016) (10)
- Refinement checking for privacy policies (2012) (10)
- Operational Semantics for Fun and Profit (2004) (9)
- A Tripwire Grammar for Insider Threat Detection (2016) (9)
- Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat (2014) (9)
- Analysing cyber-insurance claims to design harm-propagation trees (2019) (9)
- Communicating trustworthiness using radar graphs: A detailed look (2013) (9)
- A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking (2008) (8)
- Inferring social relationships from technology-level device connections (2014) (8)
- Hearing attacks in network data: An effectiveness study (2019) (8)
- Critical Systems Validation and Verification with CSP and FDR (1998) (8)
- Defining Consent and Revocation Policies (2010) (8)
- Nonsense Attacks on Google Assistant (2018) (7)
- Denotational semantics for occam 2 (1993) (7)
- A logical high-level framework for Critical Infrastructure resilience and risk assessment (2011) (7)
- Security properties and mechanisms in human−centric computing (2004) (7)
- An initial usability evaluation of the secure situation awareness system (2012) (7)
- Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis (2014) (7)
- Attack and Defence Modelling for Attacks via the Speech Interface (2019) (6)
- An Ethics Framework for Research into Heterogeneous Systems (2018) (6)
- Assumption–Commitment Support for CSP Model Checking (2006) (6)
- occam transformation at Oxford (1987) (6)
- Analysis of Dependencies in Critical Infrastructures (2011) (6)
- EnCoRe: Towards A Conceptual Model For Privacy Policies (2011) (5)
- Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations (2022) (5)
- A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing (2019) (5)
- Sonification to Support the Monitoring Tasks of Security Operations Centres (2021) (5)
- Beyond Mobility : What Next After CSP/pi? (2009) (5)
- CSP: The Best Concurrent-System Description Language in the World - Probably! (2004) (5)
- Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice (2020) (5)
- Predicting Graphical Passwords (2015) (5)
- Improving the Effectiveness of CSIRTs (2017) (5)
- A system to calculate Cyber Value-at-Risk (2021) (4)
- RicherPicture: Semi-automated cyber defence using context-aware data analytics (2017) (4)
- Developing a Strategy for Automated Privacy Testing Suites (2011) (4)
- NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data (2013) (4)
- A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them (2018) (4)
- Authentication in Pervasive Computing : Position Paper (2002) (4)
- Assessing a Decision Support Tool for SOC Analysts (2021) (4)
- Tag clouds with a twist: using tag clouds coloured by information’s trustworthiness to support situational awareness (2015) (4)
- Property−based compression strategies (2002) (4)
- A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract (2010) (3)
- Towards A Conceptual Model For Privacy Policies (2011) (3)
- A State Machine System for Insider Threat Detection (2018) (3)
- Parallelization of FDR (2002) (3)
- Analytics for characterising and measuring the naturalness of online personae (2016) (3)
- Information trustworthiness as a solution to the misinformation problems in social media (2015) (3)
- Wider Research Applications of Dynamic Consent (2018) (3)
- Black-Box Attacks via the Speech Interface Using Linguistically Crafted Input (2019) (3)
- Sonification Mappings: Estimating Effectiveness, Polarities and Scaling in an Online Experiment (2018) (3)
- The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance (2017) (2)
- A comparison of online hate on reddit and 4chan: a case study of the 2020 US election (2022) (2)
- Transformation of occam programs (1988) (2)
- #ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives (2020) (2)
- Classifying unbounded nondeterminism in CSP (1991) (2)
- An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System (2017) (2)
- A Pragmatic System-failure Assessment and Response Model (2016) (2)
- An Independent Assessment of the Procedural Components of the Estonian Internet Voting System (2016) (2)
- An Algebraic Transformation System for Occam Programs (1987) (2)
- Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation (2011) (2)
- The Meaning and Implementation of SKIP in CSP (2013) (2)
- Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment (2012) (2)
- Formal methods in the development of the H1 transputer (1991) (2)
- Practitioners’ Views on Cybersecurity Control Adoption and Effectiveness (2021) (1)
- Validation of Fault Tolerance and Timing Properties Validation of Fault Tolerance and Timing Properties (1)
- Identity attribution across CyberSpace and the Natural Space (2012) (1)
- Dataset Construction and Analysis of Screenshot Malware (2020) (1)
- Refinement-Friendly Bigraphs and Spygraphs (2010) (1)
- Control Effectiveness: a Capture-the-Flag Study (2021) (1)
- POSTER : Detection of Online Radical Content Using Multimodal Approach (2017) (1)
- The Speech Interface as an Attack Surface: An Overview (2019) (1)
- Implementing Data−Independence: Symbolic Operational Semantics for CSP_M (2002) (1)
- Investigating Malware Campaigns With Semantic Technologies (2019) (0)
- Quarterly Progress Report Number 5 for Contract N00014-93-C-0213 (Formal Systems Design and Development, Inc.). (1995) (0)
- Online banking malware ontology (2014) (0)
- Towards an Integrated Approach to the Management‚ Specification and Enforcement of Privacy Policies (2009) (0)
- Metadata of the chapter that will be visualized in SpringerLink (0)
- Run-Time Monitoring of Data-Handling Violations (2018) (0)
- CDT Technical Paper 01/16 Security Vulnerabilities in Speech Recognition Systems (2016) (0)
- The Solution is in the Details: Building Cybersecurity Capacity in Europe (2022) (0)
- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms (2019) (0)
- Managing the influence of social media using information trust (2014) (0)
- Cybersecurity in Working from Home: An Exploratory Study (2021) (0)
- Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI (2023) (0)
- Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda (2022) (0)
- Fail-safe Glyph Encoding based on Quasi-Hamming Distances: With a Case Study on Visualizing File System Events (2014) (0)
- Beyond Mobility : What Next after CSP/π ? (Invited Talk) (2009) (0)
- Fourth Quarterly Report on Contract N00014-93-C-0213. (1994) (0)
- Ransomware as a Predator: Modelling the Systemic Risk to Prey (2023) (0)
- Anomaly Detection Using Pattern-of-Life Visual Metaphors (2019) (0)
- EnCoRe: Ensuring Consent and Revocation (2009) (0)
- Logic, programming and formal specification (1985) (0)
- A Novel Behavioural Screenlogger Detection System (2021) (0)
- Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content (2015) (0)
- Inside FDR (abstract of invited talk) (2012) (0)
- Taking quotients in CSP (2006) (0)
- Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings (2019) (0)
- I / I 3 N 00014-93-C-0213 Fourth Quarterly Progress Report (0)
- 2052-8604 Applying social network analysis to security (2015) (0)
- Challenges to Process-Algebraic Property-Checking (1999) (0)
- A survey on screenlogger attacks as well as countermeasures (2020) (0)
- Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-design (2008) (0)
- Why We Trust Dynamic Consent to Deliver on Privacy (2019) (0)
- Secure Communication in Disasters (2012) (0)
- An Exploratory Study of Cybersecurity in Working from Home: Problem or Enabler? (2022) (0)
- Ensuring Consent and Revocation: Towards a Taxonomy of Consent (2009) (0)
- From Qualitative to Quantitative Information Erasure (2012) (0)
- Applying formal methods to describe the privacy−control requirements in real case−study scenario: emerging ambiguities and proposed solutions (2010) (0)
- On properties of cyberattacks and their nuances (2017) (0)
- At the Crossroads: Cybersecurity and Psychology (2013) (0)
This paper list is powered by the following services:
Other Resources About Michael Goldsmith
What Schools Are Affiliated With Michael Goldsmith ?
Michael Goldsmith is affiliated with the following schools: