Natalie Coull

Lecturer

  • 13 Citations
  • 2 h-Index
20112019
If you made any changes in Pure these will be visible here soon.

Research Output 2011 2019

  • 13 Citations
  • 2 h-Index
  • 5 Conference contribution
  • 5 Article
  • 2 Chapter
  • 1 Editorial
2019
10 Downloads (Pure)

BlackWatch: increasing attack awareness within web applications

Hall, C. C., Shepherd, L. & Coull, N. J., 15 Feb 2019, In : Future Internet. 11, 2, 20 p., 44.

Research output: Contribution to journalArticle

Open Access
File
2018
73 Downloads (Pure)

Vulnerability anti-patterns: a timeless way to capture poor software practices (Vulnerabilities)

Nafees, T., Coull, N., Ferguson, I. & Sampson, A., 29 Nov 2018, Proceedings of the 24th Conference on Pattern Languages of Programs. The Hillside Group, 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Software engineering
Communication
2017
1 Citation (Scopus)
115 Downloads (Pure)

A methodology for testing virtualisation security

Donaldson, S., Coull, N. J. & McLuskie, D., 19 Oct 2017, Proceedings of the International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA). IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Testing
Cloud computing
Computer operating systems
Computer hardware
Servers
22 Downloads (Pure)

Idea-caution before exploitation: the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities

Nafees, T., Coull, N., Ferguson, R. I. & Sampson, A., 5 Jul 2017, Engineering secure software and systems: 9th Internatinal symposium, ESSoS 2017 Bonn, Germany, July 3-5, 2017: proceedings. Bodden, E., Paye, M. & Athanasopoulos, E. (eds.). 1 ed. Chambray: Springer, p. 133-142 10 p. (Lecture Notes in Computer Science; vol. 10379).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Software engineering
Engineers
15 Downloads (Pure)

On the use of serious games technology to facilitate large-scale training in cybercrime response

Coull, N., Donald, I., Ferguson, I., Keane, E., Mitchell, T., Smith, O. V., Stevenson, E. & Tomkins, P., 22 Nov 2017, In : European Police Science and Research Bulletin. Special Conference Edition, 3, p. 123-130 8 p.

Research output: Contribution to journalArticle

Open Access
File
offense
seizure
police officer
computer game
everyday life
136 Downloads (Pure)

The gamification of cybersecurity training

Coull, N., Donald, I., Ferguson, I., Keane, E., Mitchell, T., Smith, O. V., Stevenson, E. & Tomkins, P., Nov 2017, E-learning and games: 11th International Conference, Edutainment 2017, Bournemouth, UK, June 26 – 28, 2017 : revised selected papers. Tian, F., Gatzidis, C., El Rhalibi, A., Tang, W. & Charles, F. (eds.). Cham: Springer, p. 108-111 4 p. (Lecture Notes in Computer Science; vol. 10345).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
police officer
incident
human being
facebook
police
2016
1 Citation (Scopus)

Authenticity by design: reflections on researching, designing and teaching socialbots

De Paoli, S., Ball, L., Coull, N., Isaacs, J., MacDonald, A. & Letham, J., 1 Dec 2016, Socialbots and their friends: digital media and the automation of sociality. Gehl, R. W. & Bakardjieva, M. (eds.). Abingdon: Routledge, p. 164-186 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

follower
authenticity
personal data
larceny
facebook

Cybersecurity

Ferguson, R. I. & Coull, N. J., 30 Nov 2016, In : Scottish Justice Matters. 4, 3, p. 3-4 2 p.

Research output: Contribution to journalEditorial

Open Access
2014
1 Citation (Scopus)

A method for resolving security vulnerabilities through the use of design patterns

Walker, N., Coull, N. J., Ferguson, R. I. & Milne, A., 14 May 2014, Cyberpatterns: unifying design patterns with wecurity and attack patterns. Blackwell, C. & Zhu, H. (eds.). London: Springer International Publishing, p. 149-155 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Software engineering
Data storage equipment
Software testing
Taxonomies
Engineers
2012
9 Downloads (Pure)

The innocent hill walker

Ball, L. D. & Coull, N. J., 2012, In : ITNOW. 54, 4, p. 30-31 2 p.

Research output: Contribution to journalArticle

Open Access
File
Industry
2 Citations (Scopus)
94 Downloads (Pure)

Undermining: social engineering using open source intelligence gathering

Ball, L. D., Ewan, G. & Coull, N. J., 2012, Proceedings of the International Conference on Knowledge Discovery and Information Retrieval. Scitepress Digital Library, p. 275-280 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Personnel
Data privacy
Crime
Computer systems
Deposits
2011
8 Citations (Scopus)
9 Downloads (Pure)

Emergent requirements for supporting introductory programming

Coull, N. J. & Duncan, I. M. M., Feb 2011, In : ITALICS. 10, 1, p. 78-85 8 p.

Research output: Contribution to journalArticle

Open Access
File
programming
Computer programming
computer science
Computer science
learning

Quantifying information dynamics through a new valuation system

Vaish, A., Prabhakar, A., Mishra, H., Dayal, N., Shishir, K. S., Goel, U. & Coull, N. J., 2011, In : Information Management & Computer Security. 19, 5, p. 313-332 20 p.

Research output: Contribution to journalArticle

assets
life-span
Intranets
Security of data
Risk management