Skip to main content

Research Repository

Advanced Search

Professor Julian Williams' Outputs (3)

The seconomics (security-economics) vulnerabilities of Decentralized Autonomous Organizations (2017)
Presentation / Conference Contribution
Massacci, F., Ngo, C., Nie, J., Venturi, D., & Williams, J. (2017, March). The seconomics (security-economics) vulnerabilities of Decentralized Autonomous Organizations. Presented at 25th Cambridge International Workshop on Security Protocols, Cambridge, England

Traditionally, security and economics functionalities in IT financial services and protocols (FinTech) have been perceived as separate objectives. We argue that keeping them separate is a bad idea for FinTech “Decentralized Autonomous Organizations”... Read More about The seconomics (security-economics) vulnerabilities of Decentralized Autonomous Organizations.

Contagion in cyber security attacks (2017)
Journal Article
Baldwin, A., Gheyas, I., Ioannidis, C., Pym, D., & Williams, J. (2017). Contagion in cyber security attacks. Journal of the Operational Research Society, 68(7), 780-791. https://doi.org/10.1057/jors.2016.37

Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part o... Read More about Contagion in cyber security attacks.

The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures (2017)
Preprint / Working Paper
Allodi, L., Massacci, F., & Williams, J. The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures

A common presumption is that the typical cyber attacker is assumed to exploit all possible vulnerabilities with almost equal likelihood. That is, the probability of an attack on a given vulnerability is at maximum entropy, one cannot importance sampl... Read More about The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures.