Publications

1.
Henriksen-Bulmer J, Rosenorn-Lanng E, Corbin-Clarke S, Ware S, Melacca D, Fenge LA. Using game-based learning to teach young people about privacy and online safety. Interactive Learning Environments. 2023 Nov 30;1–21.
1.
Lockett A, Chalkias I, Yucel C, Henriksen-Bulmer J, Katos V. Investigating IPTV Malware in the Wild. Future Internet. 2023 Sep 28;15(10):325.
1.
Adams C, Eslamnejad M, Khadka A, M’manga A, Shaw H, Zhao Y. Auditing AI Systems: A Metadata Approach. In: Bramer M, Stahl F, editors. Artificial Intelligence XL. Cham: Springer Nature Switzerland; 2023. p. 241–6.
1.
Brady C, M’manga A. Gamification of Cyber Security Training - EnsureSecure. In: 2022 IEEE International Conference on e-Business Engineering (ICEBE). Bournemouth, United Kingdom: IEEE; 2022. p. 7–12.
1.
Henriksen-Bulmer J, Yucel C, Faily S, Chalkias I. Privacy Goals for the Data Lifecycle. Future Internet. 2022 Oct;14(11):315.
1.
Sallal M, de Fréin R, Malik A, Aziz B. An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks. Array. 2022 Sep;15:100221.
1.
Sallal M, Owenson G, Salman D, Adda M. Security and performance evaluation of master node protocol based reputation blockchain in the bitcoin network. Blockchain: Research and Applications. 2022;3(1):100048.
1.
Katos V, Ki-Aries D, Faily S, Genchev A, Bozhilova M, Stoianov N. Cybersecurity User Requirements Analysis: The ECHO Approach. In: Shkarlet S, Morozov A, Palagin A, Vinnikov D, Stoianov N, Zhelezniak M, et al., editors. Mathematical Modeling and Simulation of Systems. Cham: Springer International Publishing; 2022. p. 405–21.
1.
Zheng G, Chai WK, Katos V. A dynamic spatial–temporal deep learning framework for traffic speed prediction on large-scale road networks. Expert Systems with Applications. 2022;195:116585.
1.
McAlaney J. Are you anonymous? Social-psychological processes of hacking groups. Cybersecurity and Cognitive Science. In: Cybersecurity and Cognitive Science. Academic Press; 2022.
1.
Deutrom J, Katos V, Al-Mourad M, Ali R. The relationships between gender, life satisfaction, loneliness and problematic internet use during CoViD-19: does the lockdown matter? International journal of environmental research and public health. 2022;19(3):1325.
1.
Simou S, Kalloniatis C, Gritzalis S, Katos V. Revised forensic framework validation and cloud forensic readiness. International Journal of Electronic Governance. 2022;14(1–2):236–63.
1.
Turner R, M’manga A. Requirements for a Platform that Improves the Number of Young Women Entering Cybersecurity. In: 35th International BCS Human-Computer Interaction Conference. 2022.
1.
Jarvis PD, Damianou A, Ciobanu C, Katos V. Vulnerability Exposure Driven Intelligence in Smart, Circular Cities. Digital Threats: Research and Practice. 2021 Sep;3487059.
1.
Tsimperidis I, Yucel C, Katos V. Age and Gender as Cyber Attribution Features in Keystroke Dynamic-Based User Classification Processes. Electronics. 2021;10(7).
1.
Tsimperidis I, Rostami S, Wilson K, Katos V. User Attribution Through Keystroke Dynamics-Based Author Age Estimation. In: Ghita B, Shiaeles S, editors. Selected Papers from the 12th International Networking Conference. Springer; 2021. p. 47–61.
1.
Apostolopoulos T, Katos V, Choo KKR, Patsakis C. Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks. Future Generation Computer Systems. 2021;116:393–405.
1.
Katos V, Efraimidis P. Privacy in Data-Driven Circular Economy. In: Jajodia S, Samarati P, Yung M, editors. Encyclopedia of Cryptography, Security and Privacy. Springer; 2021. p. 1–3.
1.
Katos V, Ciobanu C. Economics of Software Vulnerability Markets. In: Jajodia S, Samarati P, Yung M, editors. Encyclopedia of Cryptography, Security and Privacy. Springer; 2021. p. 1–5.
1.
Pilton C, Faily S, Henriksen-Bulmer J. Evaluating Privacy - Determining User Privacy Expectations on the Web. Computers & Security. 2021;105:102241.
1.
Faily S, Iacob C, Ali R, Ki-Aries D. Visualising Personas as Goal Models to Find Security Tensions. Information and Computer Security. 2021;
1.
Hatzivasilis G, Soultatos O, Chatziadam P, Fysarakis K, Askoxylakis I, Ioannidis S, et al. WARDOG: Awareness detection watchbog for Botnet infection on the host device. IEEE Transactions on Sustainable Computing. 2021;6(1):4–18.
1.
Danilatou V, Antonakaki D, Tzagkarakis C, Kanterakis A, Katos V, Kostoulas T. Automated Mortality Prediction in Critically-ill Patients with Thrombosis using Machine Learning. In: 2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE). IEEE; 2020. p. 247–54.
1.
Taylor-Jackson J, Matthews S. The Influence of Traits Associated with Autism Spectrum Disorder (ASD) on the Detection of Fake News. In: Stephanidis C, Salvendy G, Wei J, Yamamoto S, Mori H, Meiselwitz G, et al., editors. HCI International 2020 – Late Breaking Papers: Interaction, Knowledge and Social Media. Cham: Springer; 2020. p. 464–72.
1.
Taylor-Jackson J, McAlaney J, Foster JL, Bello A, Maurushat A, Dale J. Incorporating Psychology into Cyber Security Education: A Pedagogical Approach. In: Bernhard M, Bracciali A, Camp LJ, Matsuo S, Maurushat A, Rønne PB, et al., editors. Financial Cryptography and Data Security. Springer; 2020. p. 207–17.
1.
McAlaney J, Hills PJ. Understanding Phishing Email Processing and Perceived Trustworthiness Through Eye Tracking. Frontiers in Psychology. 2020;11:1756.
1.
Faily S, Scandariato R, Shostack A, Sion L, Ki-Aries D. Contextualisation of Data Flow Diagrams for Security Analysis. In: Eades III H, Gadyatskaya O, editors. Graphical Models for Security. Springer International Publishing; 2020. p. 186–97.
1.
Sample C, Jensen M, Scott K, McAlaney J, Brockinton A, Fitchpatrick S, et al. Interdisciplinary lessons learned while researching fake news. Frontiers in Psychology. 2020;
1.
Faily S, Iacob C, Ali R, Ki-Aries D. Identifying Implicit Vulnerabilities through Personas as Goal Models. In: Proceedings of the 4th International Workshop on SECurity and Privacy Requirements Engineering (SECPRE 2020). Springer; 2020.
1.
Benson V, McAlaney J. Cyber Influence and Cognitive Threats. Academic Press; 2020.
1.
Ben Naseir M, Dogan H, Apeh E, Ali R. National Cybersecurity Capacity Building Framework for Countries in a Transitional Phase. In: Proceedings of the 22nd International Conference on Enterprise Information Systems - Volume 2: ICEIS,. SciTePress; 2020. p. 841–9.
1.
McAlaney J, Benson V. Chapter 1 - Cybersecurity as a social phenomenon. In: Benson V, Mcalaney J, editors. Cyber Influence and Cognitive Threats. Academic Press; 2020. p. 1–8.
1.
Szedlak D, M’manga A. Eliciting Requirements for a Student-focussed Capture The Flag. In: Proceedings of the 7th International Conference on Behavioural and Social Computing. IEEE; 2020.
1.
Patsakis C, Casino F, Lykousas N, Katos V. Unravelling Ariadne’s Thread: Exploring the Threats of Decentralised DNS. IEEE Access. 2020;8:118559–71.
1.
Henriksen-Bulmer J, Faily S, Jeary S. DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems. Future Internet. 2020;12(5):93.
1.
Simou S, Kalloniatis C, Gritzalis S, Katos V. A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services. In: Katsikas S, Zorkadis V, editors. E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age. Springer International Publishing; 2020. p. 161–77.
1.
Heydari M, Mylonas A, Tafreshi VHF, Benkhelifa E, Singh S. Known unknowns: Indeterminacy in authentication in IoT. Future Generation Computer Systems. 2020;
1.
Rantos K, Spyros A, Papanikolaou A, Kritsas A, Ilioudis C, Katos V. Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem. Computers. 2020;9(1).
1.
Qurashi MA, Angelopoulos CM, Katos V. An architecture for resilient intrusion detection in ad-hoc networks. Journal of Information Security and Applications. 2020;53:102530.
1.
Patsakis C, Casino F, Katos V. Encrypted and covert DNS queries for botnets: Challenges and countermeasures. Computers & Security. 2020;88:101614.
1.
Altaf A, Faily S, Dogan H, Mylonas A, Thron E. Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS. In: Katsikas S, Cuppens F, Cuppens N, Lambrinoudakis C, Kalloniatis C, Mylopoulos J, et al., editors. Computer Security. Springer; 2020. p. 98–107.
1.
Taylor J, McDougall S, Ollis G, Alford P. Assessing User Perceptions of Trust and Security in Manipulated Versions of Low Trust and High Trust Tourism Websites. e-Review of Tourism Research. 2019 Jan;16(2/3).
1.
Flanagan K, Fallon E, Jacob P, Awad A, Connolly P. 2D2N: A Dynamic Degenerative Neural Network for Classification of Images of Live Network Data. In: 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC). 2019. p. 1–7.
1.
Benson V, McAlaney J. Emerging Cyber Threats and Cognitive Vulnerabilities. Academic Press; 2019.
1.
Heydari M, Mylonas A, Katos V, Balaguer-Ballester E, Tafreshi VHF, Benkhelifa E. A Location-Aware Authentication Model to Handle Uncertainty in IoT. In: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). 2019. p. 43–50.
1.
Zheng G, Chai WK, Katos V. An Ensemble Model for Short-Term Traffic Prediction in Smart City Transportation System. In: Proceedings of the 2019 IEEE Global Communications Conference. IEEE; 2019.
1.
Iliou C, Kostoulas T, Tsikrika T, Katos V, Vrochidis S, Kompatsiaris Y. Towards a framework for detecting advanced Web bots. In: Proceedings of the 14th International Conference on Availability, Reliability and Security. IEEE; 2019.
1.
Qurashi MA, Angelopoulos CM, Katos V. Efficient Intrusion Detection in P2P IoT Networks. In: Proceedings of the 6th International Symposium for ICS & SCADA Cyber Security. British Computer Society; 2019.
1.
Damianou A, Angelopoulos CM, Katos V. Architecture for Blockchain over Edge-enabled IoT for Smart Circular Cities. In: Proceedings of the 1st International Workshop on Smart Circular Economy. IEEE; 2019.
1.
Angelopoulos CM, Katos V, Kostoulas T, Miaoudakis A, Petroulakis N, Alexandris G, et al. IDEAL CITIES - A Trustworthy and Sustainable Framework for Circular Smart Cities. In: Proceedings of the 1st International Workshop on Smart Circular Economy. IEEE; 2019.