Natalie Coull

Head of Division

  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20112021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2020

    A taxonomy of approaches for integrating attack awareness in applications

    Ünlü, T., Shepherd, L. A., Coull, N. & McLean, C., 13 Jul 2020, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020). IEEE , 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    175 Downloads (Pure)
  • Parents unwittingly leak their children's data: a GDPR time bomb?

    Prior, S. & Coull, N., 26 Jun 2020, HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings. Moallem, A. (ed.). Cham: Springer, p. 471-486 16 p. (Lecture Notes in Computer Science (LNCS); vol. 12210)(Information Systems and Applications, incl. Internet/Web, and HCI; vol. 12210).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    117 Downloads (Pure)
  • 2018

    Vulnerability anti-patterns: a timeless way to capture poor software practices (Vulnerabilities)

    Nafees, T., Coull, N., Ferguson, I. & Sampson, A., 29 Nov 2018, PLoP 17 conference proceedings: 24th conference on pattern languages of programs, October 23-25 October, 2017, Vancouver, Canada. Iba, T., Yoder, J., Burgoyne, A. & Nozaki, K. (eds.). The Hillside Group, 16 p. 23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    415 Downloads (Pure)
  • 2017

    A methodology for testing virtualisation security

    Donaldson, S., Coull, N. & McLuskie, D., 19 Oct 2017, Proceedings of the International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA). IEEE , 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    3 Citations (Scopus)
    388 Downloads (Pure)
  • Idea-caution before exploitation: the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities

    Nafees, T., Coull, N., Ferguson, R. I. & Sampson, A., 5 Jul 2017, Engineering secure software and systems: 9th Internatinal symposium, ESSoS 2017 Bonn, Germany, July 3-5, 2017: proceedings. Bodden, E., Paye, M. & Athanasopoulos, E. (eds.). 1 ed. Chambray: Springer, p. 133-142 10 p. (Lecture Notes in Computer Science; vol. 10379).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    3 Citations (Scopus)
    127 Downloads (Pure)
  • The gamification of cybersecurity training

    Coull, N., Donald, I., Ferguson, I., Keane, E., Mitchell, T., Smith, O. V., Stevenson, E. & Tomkins, P., Nov 2017, E-learning and games: 11th International Conference, Edutainment 2017, Bournemouth, UK, June 26 – 28, 2017 : revised selected papers. Tian, F., Gatzidis, C., El Rhalibi, A., Tang, W. & Charles, F. (eds.). Cham: Springer, p. 108-111 4 p. (Lecture Notes in Computer Science; vol. 10345).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    4 Citations (Scopus)
    345 Downloads (Pure)
  • 2012

    Undermining: social engineering using open source intelligence gathering

    Ball, L., Ewan, G. & Coull, N., 2012, Proceedings of the International Conference on Knowledge Discovery and Information Retrieval. Fred, A. & Filipe, J. (eds.). Scitepress Digital Library, Vol. 1: KDIR. p. 275-280 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    9 Citations (Scopus)
    442 Downloads (Pure)