default search action
Virginia N. L. Franqueira
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira:
"I don't think we're there yet": The practices and challenges of organisational learning from cyber security incidents. Comput. Secur. 139: 103699 (2024) - [j19]Steffen Wendzel, Aleksandra Mileva, Virginia N. L. Franqueira, Martin Gilje Jaatun:
Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective. J. Univers. Comput. Sci. 30(9): 1137-1139 (2024) - [j18]Muhammad Shahroz Nadeem, Fatih Kurugollu, Sara Saravi, Hany F. Atlam, Virginia N. L. Franqueira:
Deep labeller: automatic bounding box generation for synthetic violence detection datasets. Multim. Tools Appl. 83(4): 10717-10734 (2024) - 2023
- [j17]Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira:
Learning from cyber security incidents: A systematic review and future research agenda. Comput. Secur. 132: 103309 (2023) - [j16]Nina Sunde, Virginia N. L. Franqueira:
Adding transparency to uncertainty: An argument-based method for evaluative opinions. Forensic Sci. Int. Digit. Investig. 47: 301657 (2023) - [j15]Rahime Belen Saglam, Vincent Miller, Virginia N. L. Franqueira:
A Systematic Literature Review on Cyber Security Education for Children. IEEE Trans. Educ. 66(3): 274-286 (2023) - [c20]Yichao Wang, Budi Arief, Virginia Nunes Leal Franqueira, Anna Grace Coates, Caoilte Ó Ciardha:
Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned. EICC 2023: 59-64 - [e1]Aleksandra Mileva, Steffen Wendzel, Virginia N. L. Franqueira:
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, EICC 2023, Stavanger, Norway, June 14-15, 2023. ACM 2023, ISBN 978-1-4503-9829-9 [contents] - 2022
- [i3]Virginia N. L. Franqueira, Jessica A. Annor, Özgür Kafali:
Age Appropriate Design: Assessment of TikTok, Twitch, and YouTube Kids. CoRR abs/2208.02638 (2022) - [i2]Keenan Jones, Enes Altuncu, Virginia N. L. Franqueira, Yichao Wang, Shujun Li:
A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception. CoRR abs/2208.05757 (2022) - [i1]Enes Altuncu, Virginia N. L. Franqueira, Shujun Li:
Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review. CoRR abs/2208.10913 (2022) - 2021
- [c19]Ralf Luis de Moura, Virginia N. L. Franqueira, Gustavo Pessin:
Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection. ICTAI 2021: 1197-1205 - 2020
- [j14]Virginia N. L. Franqueira, Graeme Horsman:
Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice. Digit. Investig. 32 Supplement: 300923 (2020)
2010 – 2019
- 2019
- [j13]Muhammad Shahroz Nadeem, Virginia N. L. Franqueira, Xiaojun Zhai, Fatih Kurugollu:
A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis. IEEE Access 7: 84003-84019 (2019) - [j12]Noora Al Mutawa, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington, Janet C. Read:
Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes. Digit. Investig. 28(Supplement): 70-82 (2019) - [c18]Muhammad Shahroz Nadeem, Virginia N. L. Franqueira, Fatih Kurugollu, Xiaojun Zhai:
WVD: A New Synthetic Dataset for Video-Based Violence Detection. SGAI Conf. 2019: 158-164 - [p1]Muhammad Shahroz Nadeem, Virginia N. L. Franqueira, Xiaojun Zhai, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Privacy verification of PhotoDNA based on machine learning. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 263-280 - 2018
- [j11]Farhan Ahmad, Virginia N. L. Franqueira, Asma Adnane:
TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks. IEEE Access 6: 28643-28660 (2018) - [j10]Virginia N. L. Franqueira, Joanne Bryce, Noora Al Mutawa, Andrew Marrington:
Investigation of Indecent Images of Children cases: Challenges and suggestions collected from the trenches. Digit. Investig. 24: 95-105 (2018) - [j9]Farhan Ahmad, Asma Adnane, Virginia N. L. Franqueira, Fatih Kurugollu, Lu Liu:
Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies. Sensors 18(11): 4040 (2018) - [c17]Oliver R. Kabi, Virginia N. L. Franqueira:
Blockchain-Based Distributed Marketplace. BIS (Workshops) 2018: 197-210 - [c16]Anastasios Balaskas, Virginia N. L. Franqueira:
Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges. Cyber Security 2018: 1-8 - 2017
- [j8]Yan Xu, Ming Wang, Hong Zhong, Jie Cui, Lu Liu, Virginia N. L. Franqueira:
Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks. IEEE Access 5: 12702-12713 (2017) - [c15]John MacRae, Virginia N. L. Franqueira:
On Locky Ransomware, Al Capone and Brexit. ICDF2C 2017: 33-45 - [c14]Farhan Ahmad, Jordan Hall, Asma Adnane, Virginia N. L. Franqueira:
Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network. iThings/GreenCom/CPSCom/SmartData 2017: 44-52 - 2016
- [j7]Noora Al Mutawa, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington:
Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis. Digit. Investig. 16 Supplement: S96-S103 (2016) - [c13]Joshua Gray, Virginia N. L. Franqueira, Yijun Yu:
Forensically-Sound Analysis of Security Risks of Using Local Password Managers. RE Workshops 2016: 114-121 - 2015
- [j6]Ibtesam Al Awadhi, Janet C. Read, Andrew Marrington, Virginia N. L. Franqueira:
Factors Influencing Digital Forensic Investigations: Empirical Evaluation of 12 Years of Dubai Police Cases. J. Digit. Forensics Secur. Law 10(4): 7-16 (2015) - [j5]Yijun Yu, Virginia N. L. Franqueira, Thein Than Tun, Roel J. Wieringa, Bashar Nuseibeh:
Automated analysis of security requirements through risk-based argumentation. J. Syst. Softw. 106: 102-116 (2015) - [c12]Noora Al Mutawa, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington:
Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks. ARES 2015: 293-302 - [c11]Victoria M. Katilu, Virginia N. L. Franqueira, Olga Angelopoulou:
Challenges of Data Provenance for Cloud Forensic Investigations. ARES 2015: 312-317 - 2014
- [j4]Judith E. Y. Rossebø, Siv Hilde Houmb, Geri Georg, Virginia N. L. Franqueira, Dimitrios Serpanos:
Introduction to Special Issue on Risk and Trust in Embedded Critical Systems. ACM Trans. Embed. Comput. Syst. 13(5s): 152:1 (2014) - 2013
- [j3]Virginia N. L. Franqueira, André van Cleeff, Pascal van Eck, Roel J. Wieringa:
Engineering Security Agreements Against External Insider Threat. Inf. Resour. Manag. J. 26(4): 66-91 (2013) - 2012
- [j2]Virginia N. L. Franqueira, Roel J. Wieringa:
Role-Based Access Control in Retrospect. Computer 45(6): 81-88 (2012) - 2011
- [c10]Virginia N. L. Franqueira, Zornitza Bakalova, Thein Than Tun, Maya Daneva:
Towards agile security risk management in RE and beyond. EmpiRE 2011: 33-36 - [c9]Virginia N. L. Franqueira, Thein Than Tun, Yijun Yu, Roel J. Wieringa, Bashar Nuseibeh:
Risk and argument: A risk-based argumentation method for practical security. RE 2011: 239-248 - [c8]Yijun Yu, Thein Than Tun, Alessandra Tedeschi, Virginia N. L. Franqueira, Bashar Nuseibeh:
OpenArgue: Supporting argumentation to evolve secure software systems. RE 2011: 351-352 - 2010
- [j1]Siv Hilde Houmb, Virginia N. L. Franqueira, Erlend Agoy Engum:
Quantifying security risk level from CVSS estimates of frequency and impact. J. Syst. Softw. 83(9): 1622-1634 (2010) - [c7]Virginia N. L. Franqueira, André van Cleeff, Pascal van Eck, Roel J. Wieringa:
External Insider Threat: A Real Security Challenge in Enterprise Value Webs. ARES 2010: 446-453 - [c6]Virginia N. L. Franqueira, Siv Hilde Houmb, Maya Daneva:
Using Real Option Thinking to Improve Decision Making in Security Investment. OTM Conferences (1) 2010: 619-638
2000 – 2009
- 2009
- [c5]Virginia N. L. Franqueira, Pascal van Eck, Roel J. Wieringa, Raul H. C. Lopes:
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. ARES 2009: 546-553 - [c4]Siv Hilde Houmb, Virginia N. L. Franqueira:
Estimating ToE Risk Level Using CVSS. ARES 2009: 718-725 - [c3]Virginia N. L. Franqueira, Raul H. C. Lopes, Pascal van Eck:
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients. SAC 2009: 66-73 - 2007
- [c2]Virginia N. L. Franqueira, Raul H. C. Lopes:
Vulnerability Assessment by Learning Attack Specifications in Graphs. IAS 2007: 161-164 - [c1]Virginia N. L. Franqueira, Pascal van Eck:
Defense against Insider Threat: a Framework for Gathering Goal-based Requirements. EMMSAD 2007: 183-192
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint