Natalie Coull

Head of Division

  • 22 Citations
  • 2 h-Index
20112020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

A taxonomy of approaches for integrating attack awareness in applications

Ünlü, T., Shepherd, L. A., Coull, N. & McLean, C., 16 Apr 2020, (Accepted/In press) Cyber Security 2020: advancing a multidisciplinary approach to Cyber Security. IEEE , 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
47 Downloads (Pure)
2019

BlackWatch: increasing attack awareness within web applications

Hall, C. C., Shepherd, L. & Coull, N. J., 15 Feb 2019, In : Future Internet. 11, 2, 20 p., 44.

Research output: Contribution to journalArticle

Open Access
File
69 Downloads (Pure)

Parents unwittingly leak their children's data: a GDPR time bomb?

Prior, S. & Coull, N. J., 25 Nov 2019, (Accepted/In press) HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings. Moallem, A. (ed.). Springer, (Lecture Notes in Computer Science (LNCS); vol. 12210)(Information Systems and Applications, incl. Internet/Web, and HCI; vol. 12210).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Vulnerability anti-patterns: a timeless way to capture poor software practices (Vulnerabilities)

Nafees, T., Coull, N., Ferguson, I. & Sampson, A., 29 Nov 2018, Proceedings of the 24th Conference on Pattern Languages of Programs. The Hillside Group, 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
165 Downloads (Pure)
2017

A methodology for testing virtualisation security

Donaldson, S., Coull, N. J. & McLuskie, D., 19 Oct 2017, Proceedings of the International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA). IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
186 Downloads (Pure)

Idea-caution before exploitation: the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities

Nafees, T., Coull, N., Ferguson, R. I. & Sampson, A., 5 Jul 2017, Engineering secure software and systems: 9th Internatinal symposium, ESSoS 2017 Bonn, Germany, July 3-5, 2017: proceedings. Bodden, E., Paye, M. & Athanasopoulos, E. (eds.). 1 ed. Chambray: Springer, p. 133-142 10 p. (Lecture Notes in Computer Science; vol. 10379).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
79 Downloads (Pure)

On the use of serious games technology to facilitate large-scale training in cybercrime response

Coull, N., Donald, I., Ferguson, I., Keane, E., Mitchell, T., Smith, O. V., Stevenson, E. & Tomkins, P., 22 Nov 2017, In : European Police Science and Research Bulletin. Special Conference Edition, 3, p. 123-130 8 p.

Research output: Contribution to journalArticle

Open Access
File
40 Downloads (Pure)

The gamification of cybersecurity training

Coull, N., Donald, I., Ferguson, I., Keane, E., Mitchell, T., Smith, O. V., Stevenson, E. & Tomkins, P., Nov 2017, E-learning and games: 11th International Conference, Edutainment 2017, Bournemouth, UK, June 26 – 28, 2017 : revised selected papers. Tian, F., Gatzidis, C., El Rhalibi, A., Tang, W. & Charles, F. (eds.). Cham: Springer, p. 108-111 4 p. (Lecture Notes in Computer Science; vol. 10345).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
203 Downloads (Pure)
2016

Authenticity by design: reflections on researching, designing and teaching socialbots

De Paoli, S., Ball, L., Coull, N., Isaacs, J., MacDonald, A. & Letham, J., 1 Dec 2016, Socialbots and their friends: digital media and the automation of sociality. Gehl, R. W. & Bakardjieva, M. (eds.). Abingdon: Routledge, p. 164-186 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

1 Citation (Scopus)

Cybersecurity

Ferguson, R. I. & Coull, N. J., 30 Nov 2016, In : Scottish Justice Matters. 4, 3, p. 3-4 2 p.

Research output: Contribution to journalEditorial

Open Access
2014

A method for resolving security vulnerabilities through the use of design patterns

Walker, N., Coull, N. J., Ferguson, R. I. & Milne, A., 14 May 2014, Cyberpatterns: unifying design patterns with wecurity and attack patterns. Blackwell, C. & Zhu, H. (eds.). London: Springer International Publishing, p. 149-155 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
2012

The innocent hill walker

Ball, L. D. & Coull, N. J., 2012, In : ITNOW. 54, 4, p. 30-31 2 p.

Research output: Contribution to journalArticle

Open Access
File
29 Downloads (Pure)

Undermining: social engineering using open source intelligence gathering

Ball, L. D., Ewan, G. & Coull, N. J., 2012, Proceedings of the International Conference on Knowledge Discovery and Information Retrieval. Scitepress Digital Library, p. 275-280 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
6 Citations (Scopus)
233 Downloads (Pure)
2011

Emergent requirements for supporting introductory programming

Coull, N. J. & Duncan, I. M. M., Feb 2011, In : ITALICS. 10, 1, p. 78-85 8 p.

Research output: Contribution to journalArticle

Open Access
File
11 Citations (Scopus)
30 Downloads (Pure)

Quantifying information dynamics through a new valuation system

Vaish, A., Prabhakar, A., Mishra, H., Dayal, N., Shishir, K. S., Goel, U. & Coull, N. J., 2011, In : Information Management & Computer Security. 19, 5, p. 313-332 20 p.

Research output: Contribution to journalArticle