Natalie Coull

Head of Division

  • 22 Citations
  • 2 h-Index
20112020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

A qualitative exploratory study of the knowledge, forensic and legal challenges from the perspective of police cybercrime specialists

De Paoli, S., Johnstone, J., Coull, N., Ferguson, I., Sinclair, G., Tomkins, P., Brown, M. & Martin, R., 29 Jul 2020, In : Policing (Oxford). 17 p., paaa027.

Research output: Contribution to journalArticle

A taxonomy of approaches for integrating attack awareness in applications

Ünlü, T., Shepherd, L. A., Coull, N. & McLean, C., 13 Jul 2020, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020). IEEE , 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
72 Downloads (Pure)

Parents unwittingly leak their children's data: a GDPR time bomb?

Prior, S. & Coull, N., 26 Jun 2020, HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings. Moallem, A. (ed.). Cham: Springer, p. 471-486 16 p. (Lecture Notes in Computer Science (LNCS); vol. 12210)(Information Systems and Applications, incl. Internet/Web, and HCI; vol. 12210).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
13 Downloads (Pure)
2019

BlackWatch: increasing attack awareness within web applications

Hall, C. C., Shepherd, L. A. & Coull, N. J., 15 Feb 2019, In : Future Internet. 11, 2, 20 p., 44.

Research output: Contribution to journalArticle

Open Access
File
84 Downloads (Pure)
2018

Vulnerability anti-patterns: a timeless way to capture poor software practices (Vulnerabilities)

Nafees, T., Coull, N., Ferguson, I. & Sampson, A., 29 Nov 2018, PLoP 17 conference proceedings: 24th conference on pattern languages of programs, October 23-25 October, 2017, Vancouver, Canada. Iba, T., Yoder, J., Burgoyne, A. & Nozaki, K. (eds.). The Hillside Group, 16 p. 23

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
191 Downloads (Pure)
2017

A methodology for testing virtualisation security

Donaldson, S., Coull, N. J. & McLuskie, D., 19 Oct 2017, Proceedings of the International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA). IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
217 Downloads (Pure)

Idea-caution before exploitation: the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities

Nafees, T., Coull, N., Ferguson, R. I. & Sampson, A., 5 Jul 2017, Engineering secure software and systems: 9th Internatinal symposium, ESSoS 2017 Bonn, Germany, July 3-5, 2017: proceedings. Bodden, E., Paye, M. & Athanasopoulos, E. (eds.). 1 ed. Chambray: Springer, p. 133-142 10 p. (Lecture Notes in Computer Science; vol. 10379).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
133 Downloads (Pure)

On the use of serious games technology to facilitate large-scale training in cybercrime response

Coull, N., Donald, I., Ferguson, I., Keane, E., Mitchell, T., Smith, O. V., Stevenson, E. & Tomkins, P., 22 Nov 2017, In : European Police Science and Research Bulletin. Special Conference Edition, 3, p. 123-130 8 p.

Research output: Contribution to journalArticle

Open Access
File
45 Downloads (Pure)

The gamification of cybersecurity training

Coull, N., Donald, I., Ferguson, I., Keane, E., Mitchell, T., Smith, O. V., Stevenson, E. & Tomkins, P., Nov 2017, E-learning and games: 11th International Conference, Edutainment 2017, Bournemouth, UK, June 26 – 28, 2017 : revised selected papers. Tian, F., Gatzidis, C., El Rhalibi, A., Tang, W. & Charles, F. (eds.). Cham: Springer, p. 108-111 4 p. (Lecture Notes in Computer Science; vol. 10345).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
228 Downloads (Pure)
2016

Authenticity by design: reflections on researching, designing and teaching socialbots

De Paoli, S., Ball, L., Coull, N., Isaacs, J., MacDonald, A. & Letham, J., 1 Dec 2016, Socialbots and their friends: digital media and the automation of sociality. Gehl, R. W. & Bakardjieva, M. (eds.). Abingdon: Routledge, p. 164-186 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

1 Citation (Scopus)

Cybersecurity

Ferguson, R. I. & Coull, N. J., 30 Nov 2016, In : Scottish Justice Matters. 4, 3, p. 3-4 2 p.

Research output: Contribution to journalEditorial

Open Access
2014

A method for resolving security vulnerabilities through the use of design patterns

Walker, N., Coull, N. J., Ferguson, R. I. & Milne, A., 14 May 2014, Cyberpatterns: unifying design patterns with wecurity and attack patterns. Blackwell, C. & Zhu, H. (eds.). London: Springer International Publishing, p. 149-155 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
2012

The innocent hill walker

Ball, L. D. & Coull, N. J., 2012, In : ITNOW. 54, 4, p. 30-31 2 p.

Research output: Contribution to journalArticle

Open Access
File
37 Downloads (Pure)

Undermining: social engineering using open source intelligence gathering

Ball, L. D., Ewan, G. & Coull, N. J., 2012, Proceedings of the International Conference on Knowledge Discovery and Information Retrieval. Scitepress Digital Library, p. 275-280 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
6 Citations (Scopus)
255 Downloads (Pure)
2011

Emergent requirements for supporting introductory programming

Coull, N. J. & Duncan, I. M. M., Feb 2011, In : ITALICS. 10, 1, p. 78-85 8 p.

Research output: Contribution to journalArticle

Open Access
File
11 Citations (Scopus)
41 Downloads (Pure)

Quantifying information dynamics through a new valuation system

Vaish, A., Prabhakar, A., Mishra, H., Dayal, N., Shishir, K. S., Goel, U. & Coull, N. J., 2011, In : Information Management & Computer Security. 19, 5, p. 313-332 20 p.

Research output: Contribution to journalArticle