Publications

2022

  • J. McAlaney, “Are you anonymous? Social-psychological processes of hacking groups. Cybersecurity and Cognitive Science,” in Cybersecurity and Cognitive Science, Academic Press, 2022.
    [Bibtex]
    @incollection{mcalaney_are_2022,
    title = {Are you anonymous? {Social}-psychological processes of hacking groups. {Cybersecurity} and {Cognitive} {Science}},
    booktitle = {Cybersecurity and {Cognitive} {Science}},
    publisher = {Academic Press},
    author = {McAlaney, John},
    year = {2022},
    }

2021

  • I. Tsimperidis, C. Yucel, and V. Katos, “Age and Gender as Cyber Attribution Features in Keystroke Dynamic-Based User Classification Processes,” Electronics, vol. 10, iss. 7, 2021.
    [Bibtex]
    @article{tsimperidis_age_2021,
    title = {Age and {Gender} as {Cyber} {Attribution} {Features} in {Keystroke} {Dynamic}-{Based} {User} {Classification} {Processes}},
    volume = {10},
    number = {7},
    journal = {Electronics},
    author = {Tsimperidis, Ioannis and Yucel, Cagatay and Katos, Vasilios},
    year = {2021},
    }
  • T. Apostolopoulos, V. Katos, K. R. Choo, and C. Patsakis, “Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks,” Future generation computer systems, vol. 116, p. 393–405, 2021.
    [Bibtex]
    @article{apostolopoulos_resurrecting_2021,
    title = {Resurrecting anti-virtualization and anti-debugging: {Unhooking} your hooks},
    volume = {116},
    journal = {Future Generation Computer Systems},
    author = {Apostolopoulos, Theodoros and Katos, Vasilios and Choo, Kim-Kwang Raymond and Patsakis, Constantinos},
    year = {2021},
    pages = {393--405},
    }
  • V. Katos and C. Ciobanu, “Economics of Software Vulnerability Markets,” in Encyclopedia of Cryptography, Security and Privacy, S. Jajodia, P. Samarati, and M. Yung, Eds., Springer, 2021, p. 1–5.
    [Bibtex]
    @incollection{katos_economics_2021,
    title = {Economics of {Software} {Vulnerability} {Markets}},
    booktitle = {Encyclopedia of {Cryptography}, {Security} and {Privacy}},
    publisher = {Springer},
    author = {Katos, Vasilios and Ciobanu, Cosmin},
    editor = {Jajodia, Sushil and Samarati, Pierangela and Yung, Moti},
    year = {2021},
    pages = {1--5},
    }
  • V. Katos and P. Efraimidis, “Privacy in Data-Driven Circular Economy,” in Encyclopedia of Cryptography, Security and Privacy, S. Jajodia, P. Samarati, and M. Yung, Eds., Springer, 2021, p. 1–3.
    [Bibtex]
    @incollection{katos_privacy_2021,
    title = {Privacy in {Data}-{Driven} {Circular} {Economy}},
    booktitle = {Encyclopedia of {Cryptography}, {Security} and {Privacy}},
    publisher = {Springer},
    author = {Katos, Vasilios and Efraimidis, Pavlos},
    editor = {Jajodia, Sushil and Samarati, Pierangela and Yung, Moti},
    year = {2021},
    pages = {1--3},
    }
  • S. Faily, C. Iacob, R. Ali, and D. Ki-Aries, “Visualising Personas as Goal Models to Find Security Tensions,” Information and computer security, 2021.
    [Bibtex]
    @article{faily_visualising_2021,
    title = {Visualising {Personas} as {Goal} {Models} to {Find} {Security} {Tensions}},
    journal = {Information and Computer Security},
    author = {Faily, Shamal and Iacob, Claudia and Ali, Raian and Ki-Aries, Duncan},
    year = {2021},
    }
  • C. Pilton, S. Faily, and J. Henriksen-Bulmer, “Evaluating Privacy – Determining User Privacy Expectations on the Web,” Computers & security, vol. 105, p. 102241, 2021.
    [Bibtex]
    @article{pilton_evaluating_2021,
    title = {Evaluating {Privacy} - {Determining} {User} {Privacy} {Expectations} on the {Web}},
    volume = {105},
    journal = {Computers \& Security},
    author = {Pilton, Callum and Faily, Shamal and Henriksen-Bulmer, Jane},
    year = {2021},
    pages = {102241},
    }
  • I. Tsimperidis, S. Rostami, K. Wilson, and V. Katos, “User Attribution Through Keystroke Dynamics-Based Author Age Estimation,” in Selected Papers from the 12th International Networking Conference, 2021, p. 47–61.
    [Bibtex]
    @inproceedings{tsimperidis_user_2021,
    title = {User {Attribution} {Through} {Keystroke} {Dynamics}-{Based} {Author} {Age} {Estimation}},
    booktitle = {Selected {Papers} from the 12th {International} {Networking} {Conference}},
    publisher = {Springer},
    author = {Tsimperidis, Ioannis and Rostami, Shahin and Wilson, Kevin and Katos, Vasilios},
    editor = {Ghita, Bogdan and Shiaeles, Stavros},
    year = {2021},
    pages = {47--61},
    }
  • G. Hatzivasilis, O. Soultatos, P. Chatziadam, K. Fysarakis, I. Askoxylakis, S. Ioannidis, G. Alaxandris, V. Katos, and G. Spanoudakis, “WARDOG: Awareness detection watchbog for Botnet infection on the host device,” Ieee transactions on sustainable computing, vol. 6, iss. 1, p. 4–18, 2021.
    [Bibtex]
    @article{hatzivasilis_wardog_2021,
    title = {{WARDOG}: {Awareness} detection watchbog for {Botnet} infection on the host device},
    volume = {6},
    number = {1},
    journal = {IEEE Transactions on Sustainable Computing},
    author = {Hatzivasilis, G. and Soultatos, O. and Chatziadam, P. and Fysarakis, K. and Askoxylakis, I. and Ioannidis, S. and Alaxandris, G. and Katos, V. and Spanoudakis, G.},
    year = {2021},
    pages = {4--18},
    }

2020

  • V. Danilatou, D. Antonakaki, C. Tzagkarakis, A. Kanterakis, V. Katos, and T. Kostoulas, “Automated Mortality Prediction in Critically-ill Patients with Thrombosis using Machine Learning,” in 2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE), 2020, p. 247–254.
    [Bibtex]
    @inproceedings{danilatou_automated_2020,
    title = {Automated {Mortality} {Prediction} in {Critically}-ill {Patients} with {Thrombosis} using {Machine} {Learning}},
    booktitle = {2020 {IEEE} 20th {International} {Conference} on {Bioinformatics} and {Bioengineering} ({BIBE})},
    publisher = {IEEE},
    author = {Danilatou, V. and Antonakaki, D. and Tzagkarakis, C. and Kanterakis, A. and Katos, V. and Kostoulas, T.},
    month = oct,
    year = {2020},
    pages = {247--254},
    }
  • J. Taylor-Jackson and S. Matthews, “The Influence of Traits Associated with Autism Spectrum Disorder (ASD) on the Detection of Fake News,” in HCI International 2020 – Late Breaking Papers: Interaction, Knowledge and Social Media, Cham, 2020, p. 464–472.
    [Bibtex]
    @inproceedings{taylor-jackson_influence_2020,
    address = {Cham},
    title = {The {Influence} of {Traits} {Associated} with {Autism} {Spectrum} {Disorder} ({ASD}) on the {Detection} of {Fake} {News}},
    booktitle = {{HCI} {International} 2020 – {Late} {Breaking} {Papers}: {Interaction}, {Knowledge} and {Social} {Media}},
    publisher = {Springer},
    author = {Taylor-Jackson, Jacqui and Matthews, Sophie},
    editor = {Stephanidis, Constantine and Salvendy, Gavriel and Wei, June and Yamamoto, Sakae and Mori, Hirohiko and Meiselwitz, Gabriele and Nah, Fiona Fui-Hoon and Siau, Keng},
    year = {2020},
    pages = {464--472},
    }
  • J. Taylor-Jackson, J. McAlaney, J. L. Foster, A. Bello, A. Maurushat, and J. Dale, “Incorporating Psychology into Cyber Security Education: A Pedagogical Approach,” in Financial Cryptography and Data Security, 2020, p. 207–217.
    [Bibtex]
    @inproceedings{taylor-jackson_incorporating_2020,
    title = {Incorporating {Psychology} into {Cyber} {Security} {Education}: {A} {Pedagogical} {Approach}},
    booktitle = {Financial {Cryptography} and {Data} {Security}},
    publisher = {Springer},
    author = {Taylor-Jackson, Jacqui and McAlaney, John and Foster, Jeffrey L. and Bello, Abubakar and Maurushat, Alana and Dale, John},
    editor = {Bernhard, Matthew and Bracciali, Andrea and Camp, L. Jean and Matsuo, Shin'ichiro and Maurushat, Alana and Rønne, Peter B. and Sala, Massimiliano},
    year = {2020},
    pages = {207--217},
    }
  • J. McAlaney and P. J. Hills, “Understanding Phishing Email Processing and Perceived Trustworthiness Through Eye Tracking,” Frontiers in psychology, vol. 11, p. 1756, 2020.
    [Bibtex]
    @article{mcalaney_understanding_2020,
    title = {Understanding {Phishing} {Email} {Processing} and {Perceived} {Trustworthiness} {Through} {Eye} {Tracking}},
    volume = {11},
    journal = {Frontiers in Psychology},
    author = {McAlaney, John and Hills, Peter J.},
    year = {2020},
    pages = {1756},
    }
  • C. Sample, M. Jensen, K. Scott, J. McAlaney, A. Brockinton, S. Fitchpatrick, D. Ormrodd, and A. Ormrodd, “Interdisciplinary lessons learned while researching fake news,” Frontiers in psychology, 2020.
    [Bibtex]
    @article{sample_interdisciplinary_2020,
    title = {Interdisciplinary lessons learned while researching fake news},
    journal = {Frontiers in Psychology},
    author = {Sample, Char and Jensen, Michael and Scott, Keith and McAlaney, John and Brockinton, Amanda and Fitchpatrick, Steven and Ormrodd, David and Ormrodd, Amy},
    year = {2020},
    }
  • D. Szedlak and A. M’manga, “Eliciting Requirements for a Student-focussed Capture The Flag,” in Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020.
    [Bibtex]
    @inproceedings{szedlak_eliciting_2020,
    title = {Eliciting {Requirements} for a {Student}-focussed {Capture} {The} {Flag}},
    booktitle = {Proceedings of the 7th {International} {Conference} on {Behavioural} and {Social} {Computing}},
    publisher = {IEEE},
    author = {Szedlak, David and M'manga, Andrew},
    year = {2020},
    }
  • S. Faily, C. Iacob, R. Ali, and D. Ki-Aries, “Identifying Implicit Vulnerabilities through Personas as Goal Models,” in Proceedings of the 4th International Workshop on SECurity and Privacy Requirements Engineering (SECPRE 2020), 2020.
    [Bibtex]
    @inproceedings{faily_identifying_2020,
    title = {Identifying {Implicit} {Vulnerabilities} through {Personas} as {Goal} {Models}},
    booktitle = {Proceedings of the 4th {International} {Workshop} on {SECurity} and {Privacy} {Requirements} {Engineering} ({SECPRE} 2020)},
    publisher = {Springer},
    author = {Faily, Shamal and Iacob, Claudia and Ali, Raian and Ki-Aries, Duncan},
    year = {2020},
    }
  • V. Benson and J. McAlaney, Cyber Influence and Cognitive Threats, Academic Press, 2020.
    [Bibtex]
    @book{benson_cyber_2020,
    title = {Cyber {Influence} and {Cognitive} {Threats}},
    publisher = {Academic Press},
    author = {Benson, Vladlena and McAlaney, John},
    year = {2020},
    }
  • M. Ben Naseir, H. Dogan, E. Apeh, and R. Ali, “National Cybersecurity Capacity Building Framework for Countries in a Transitional Phase,” in Proceedings of the 22nd International Conference on Enterprise Information Systems – Volume 2: ICEIS,, 2020, p. 841–849.
    [Bibtex]
    @inproceedings{ben_naseir_national_2020,
    title = {National {Cybersecurity} {Capacity} {Building} {Framework} for {Countries} in a {Transitional} {Phase}},
    booktitle = {Proceedings of the 22nd {International} {Conference} on {Enterprise} {Information} {Systems} - {Volume} 2: {ICEIS},},
    publisher = {SciTePress},
    author = {Ben Naseir, M. and Dogan, Huseyin and Apeh, Edward and Ali, Raian},
    year = {2020},
    pages = {841--849},
    }
  • C. Patsakis, F. Casino, N. Lykousas, and V. Katos, “Unravelling Ariadne’s Thread: Exploring the Threats of Decentralised DNS,” Ieee access, vol. 8, p. 118559–118571, 2020.
    [Bibtex]
    @article{patsakis_unravelling_2020,
    title = {Unravelling {Ariadne}’s {Thread}: {Exploring} the {Threats} of {Decentralised} {DNS}},
    volume = {8},
    journal = {IEEE Access},
    author = {Patsakis, C. and Casino, F. and Lykousas, N. and Katos, V.},
    year = {2020},
    pages = {118559--118571},
    }
  • S. Faily, R. Scandariato, A. Shostack, L. Sion, and D. Ki-Aries, “Contextualisation of Data Flow Diagrams for Security Analysis,” in Graphical Models for Security, 2020, p. 186–197.
    [Bibtex]
    @inproceedings{faily_contextualisation_2020,
    title = {Contextualisation of {Data} {Flow} {Diagrams} for {Security} {Analysis}},
    booktitle = {Graphical {Models} for {Security}},
    publisher = {Springer International Publishing},
    author = {Faily, Shamal and Scandariato, Riccardo and Shostack, Adam and Sion, Laurens and Ki-Aries, Duncan},
    editor = {Eades III, Harley and Gadyatskaya, Olga},
    year = {2020},
    pages = {186--197},
    }
  • J. Henriksen-Bulmer, S. Faily, and S. Jeary, “DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems,” Future internet, vol. 12, iss. 5, p. 93, 2020.
    [Bibtex]
    @article{henriksen-bulmer_dpia_2020,
    title = {{DPIA} in {Context}: {Applying} {DPIA} to {Assess} {Privacy} {Risks} of {Cyber} {Physical} {Systems}},
    volume = {12},
    number = {5},
    journal = {Future Internet},
    author = {Henriksen-Bulmer, Jane and Faily, Shamal and Jeary, Sheridan},
    year = {2020},
    pages = {93},
    }
  • M. A. Qurashi, C. M. Angelopoulos, and V. Katos, “An architecture for resilient intrusion detection in ad-hoc networks,” Journal of information security and applications, vol. 53, p. 102530, 2020.
    [Bibtex]
    @article{qurashi_architecture_2020,
    title = {An architecture for resilient intrusion detection in ad-hoc networks},
    volume = {53},
    journal = {Journal of Information Security and Applications},
    author = {Qurashi, Mohammed Al and Angelopoulos, Constantinos Marios and Katos, Vasilios},
    year = {2020},
    pages = {102530},
    }
  • M. Heydari, A. Mylonas, V. H. F. Tafreshi, E. Benkhelifa, and S. Singh, “Known unknowns: Indeterminacy in authentication in IoT,” Future generation computer systems, 2020.
    [Bibtex]
    @article{heydari_known_2020,
    title = {Known unknowns: {Indeterminacy} in authentication in {IoT}},
    journal = {Future Generation Computer Systems},
    author = {Heydari, Mohammad and Mylonas, Alexios and Tafreshi, Vahid Heydari Fami and Benkhelifa, Elhadj and Singh, Surjit},
    year = {2020},
    }
  • K. Rantos, A. Spyros, A. Papanikolaou, A. Kritsas, C. Ilioudis, and V. Katos, “Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem,” Computers, vol. 9, iss. 1, 2020.
    [Bibtex]
    @article{rantos_interoperability_2020,
    title = {Interoperability {Challenges} in the {Cybersecurity} {Information} {Sharing} {Ecosystem}},
    volume = {9},
    number = {1},
    journal = {Computers},
    author = {Rantos, Konstantinos and Spyros, Arnolnt and Papanikolaou, Alexandros and Kritsas, Antonios and Ilioudis, Christos and Katos, Vasilios},
    year = {2020},
    }
  • S. Simou, C. Kalloniatis, S. Gritzalis, and V. Katos, “A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services,” in E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age, 2020, p. 161–177.
    [Bibtex]
    @inproceedings{simou_revised_2020,
    title = {A {Revised} {Forensic} {Process} for {Aligning} the {Investigation} {Process} with the {Design} of {Forensic}-{Enabled} {Cloud} {Services}},
    booktitle = {E-{Democracy} – {Safeguarding} {Democracy} and {Human} {Rights} in the {Digital} {Age}},
    publisher = {Springer International Publishing},
    author = {Simou, Stavros and Kalloniatis, Christos and Gritzalis, Stefanos and Katos, Vasilis},
    editor = {Katsikas, Sokratis and Zorkadis, Vasilios},
    year = {2020},
    pages = {161--177},
    }
  • C. Patsakis, F. Casino, and V. Katos, “Encrypted and covert DNS queries for botnets: Challenges and countermeasures,” Computers & security, vol. 88, p. 101614, 2020.
    [Bibtex]
    @article{patsakis_encrypted_2020,
    title = {Encrypted and covert {DNS} queries for botnets: {Challenges} and countermeasures},
    volume = {88},
    journal = {Computers \& Security},
    author = {Patsakis, Constantinos and Casino, Fran and Katos, Vasilios},
    year = {2020},
    pages = {101614},
    }
  • J. McAlaney and V. Benson, “Chapter 1 – Cybersecurity as a social phenomenon,” in Cyber Influence and Cognitive Threats, V. Benson and J. Mcalaney, Eds., Academic Press, 2020, p. 1 – 8.
    [Bibtex]
    @incollection{benson_chapter_2020,
    title = {Chapter 1 - {Cybersecurity} as a social phenomenon},
    booktitle = {Cyber {Influence} and {Cognitive} {Threats}},
    publisher = {Academic Press},
    author = {McAlaney, John and Benson, Vladlena},
    editor = {Benson, Vladlena and Mcalaney, John},
    year = {2020},
    pages = {1 -- 8},
    }
  • A. Altaf, S. Faily, H. Dogan, A. Mylonas, and E. Thron, “Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS,” in Computer Security, 2020, p. 98–107.
    [Bibtex]
    @inproceedings{altaf_identifying_2020,
    title = {Identifying {Safety} and {Human} {Factors} {Issues} in {Rail} {Using} {IRIS} and {CAIRIS}},
    booktitle = {Computer {Security}},
    publisher = {Springer},
    author = {Altaf, Amna and Faily, Shamal and Dogan, Huseyin and Mylonas, Alexios and Thron, Eylem},
    editor = {Katsikas, Sokratis and Cuppens, Frédéric and Cuppens, Nora and Lambrinoudakis, Costas and Kalloniatis, Christos and Mylopoulos, John and Antón, Annie and Gritzalis, Stefanos and Pallas, Frank and Pohle, Jörg and Sasse, Angela and Meng, Weizhi and Furnell, Steven and Garcia-Alfaro, Joaquin},
    year = {2020},
    pages = {98--107},
    }

2019

  • J. Taylor, S. McDougall, G. Ollis, and P. Alford, “Assessing User Perceptions of Trust and Security in Manipulated Versions of Low Trust and High Trust Tourism Websites,” E-review of tourism research, vol. 16, iss. 2/3, 2019.
    [Bibtex]
    @article{taylor_assessing_2019,
    title = {Assessing {User} {Perceptions} of {Trust} and {Security} in {Manipulated} {Versions} of {Low} {Trust} and {High} {Trust} {Tourism} {Websites}},
    volume = {16},
    url = {https://journals.tdl.org/ertr/index.php/ertr/article/view/329},
    number = {2/3},
    journal = {e-Review of Tourism Research},
    author = {Taylor, Jacqui and McDougall, Sine and Ollis, Gail and Alford, Philip},
    month = jan,
    year = {2019},
    }
  • M. Heydari, A. Mylonas, V. Katos, E. Balaguer-Ballester, V. H. F. Tafreshi, and E. Benkhelifa, “A Location-Aware Authentication Model to Handle Uncertainty in IoT,” in 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2019, p. 43–50.
    [Bibtex]
    @inproceedings{heydari_location-aware_2019,
    title = {A {Location}-{Aware} {Authentication} {Model} to {Handle} {Uncertainty} in {IoT}},
    booktitle = {2019 {Sixth} {International} {Conference} on {Internet} of {Things}: {Systems}, {Management} and {Security} ({IOTSMS})},
    author = {Heydari, M. and Mylonas, A. and Katos, V. and Balaguer-Ballester, E. and Tafreshi, V. H. F. and Benkhelifa, E.},
    year = {2019},
    pages = {43--50},
    }
  • G. Zheng, W. K. Chai, and V. Katos, “An Ensemble Model for Short-Term Traffic Prediction in Smart City Transportation System,” in Proceedings of the 2019 IEEE Global Communications Conference, 2019.
    [Bibtex]
    @inproceedings{zheng_ensemble_2019,
    title = {An {Ensemble} {Model} for {Short}-{Term} {Traffic} {Prediction} in {Smart} {City} {Transportation} {System}},
    booktitle = {Proceedings of the 2019 {IEEE} {Global} {Communications} {Conference}},
    publisher = {IEEE},
    author = {Zheng, G. and Chai, W. K. and Katos, V.},
    year = {2019},
    }
  • C. Iliou, T. Kostoulas, T. Tsikrika, V. Katos, S. Vrochidis, and Y. Kompatsiaris, “Towards a framework for detecting advanced Web bots,” in Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019.
    [Bibtex]
    @inproceedings{iliou_towards_2019,
    title = {Towards a framework for detecting advanced {Web} bots},
    booktitle = {Proceedings of the 14th {International} {Conference} on {Availability}, {Reliability} and {Security}},
    publisher = {IEEE},
    author = {Iliou, Christos and Kostoulas, Theodoros and Tsikrika, Theodora and Katos, Vasilis and Vrochidis, Stefanos and Kompatsiaris, Yiannis},
    year = {2019},
    }
  • M. A. Qurashi, C. M. Angelopoulos, and V. Katos, “Efficient Intrusion Detection in P2P IoT Networks,” in Proceedings of the 6th International Symposium for ICS & SCADA Cyber Security, 2019.
    [Bibtex]
    @inproceedings{qurashi_efficient_2019,
    title = {Efficient {Intrusion} {Detection} in {P2P} {IoT} {Networks}},
    booktitle = {Proceedings of the 6th {International} {Symposium} for {ICS} \& {SCADA} {Cyber} {Security}},
    publisher = {British Computer Society},
    author = {Qurashi, Mohammed Al and Angelopoulos, Constantinos Marios and Katos, Vasilos},
    year = {2019},
    }
  • A. Damianou, C. M. Angelopoulos, and V. Katos, “Architecture for Blockchain over Edge-enabled IoT for Smart Circular Cities,” in Proceedings of the 1st International Workshop on Smart Circular Economy, 2019.
    [Bibtex]
    @inproceedings{damianou_architecture_2019,
    title = {Architecture for {Blockchain} over {Edge}-enabled {IoT} for {Smart} {Circular} {Cities}},
    booktitle = {Proceedings of the 1st {International} {Workshop} on {Smart} {Circular} {Economy}},
    publisher = {IEEE},
    author = {Damianou, Amalia and Angelopoulos, Constantinos Marios and Katos, Vasilis},
    year = {2019},
    }
  • C. M. Angelopoulos, V. Katos, T. Kostoulas, A. Miaoudakis, N. Petroulakis, G. Alexandris, G. Demetriou, G. Morandi, K. Waledzik, U. Rak, M. Panayiotou, and C. I. Tsatsoulis, “IDEAL CITIES – A Trustworthy and Sustainable Framework for Circular Smart Cities,” in Proceedings of the 1st International Workshop on Smart Circular Economy, 2019.
    [Bibtex]
    @inproceedings{angelopoulos_ideal_2019,
    title = {{IDEAL} {CITIES} - {A} {Trustworthy} and {Sustainable} {Framework} for {Circular} {Smart} {Cities}},
    booktitle = {Proceedings of the 1st {International} {Workshop} on {Smart} {Circular} {Economy}},
    publisher = {IEEE},
    author = {Angelopoulos, Constantinos Marios and Katos, Vasilis and Kostoulas, Theodoros and Miaoudakis, Andreas and Petroulakis, Nikolaos and Alexandris, George and Demetriou, Giorgos and Morandi, Giuditta and Waledzik, Karolina and Rak, Urszula and Panayiotou, Marios and Tsatsoulis, Christos Iraklis},
    year = {2019},
    }
  • M. Walshe, G. Epiphaniou, H. Al-Khateeb, M. Hammoudeh, V. Katos, and A. Dehghantanha, “Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments,” Ad hoc networks, vol. 95, p. 101988, 2019.
    [Bibtex]
    @article{walshe_non-interactive_2019,
    title = {Non-interactive zero knowledge proofs for the authentication of {IoT} devices in reduced connectivity environments},
    volume = {95},
    journal = {Ad Hoc Networks},
    author = {Walshe, Marcus and Epiphaniou, Gregory and Al-Khateeb, Haider and Hammoudeh, Mohammad and Katos, Vasilios and Dehghantanha, Ali},
    year = {2019},
    pages = {101988},
    }
  • G. Katzivasilis, O. Soultatos, S. Ioannidis, G. Spanoudakis, V. Katos, and G. Demetriou, “MobileTrust: Secure Knowledge Integration in VANETs,” Acm transactions on cyber-physical systems, vol. 4, iss. 2, 2019.
    [Bibtex]
    @article{katzivasilis_mobiletrust_2019,
    title = {{MobileTrust}: {Secure} {Knowledge} {Integration} in {VANETs}},
    volume = {4},
    number = {2},
    journal = {ACM Transactions on Cyber-Physical Systems},
    author = {Katzivasilis, George and Soultatos, Othonas and Ioannidis, Sotiris and Spanoudakis, George and Katos, Vasilios and Demetriou, Giorgos},
    year = {2019},
    }
  • V. K. E. B. Mohammad Heydari Alexios Mylonas, V. H. F. Tafreshi, and A. Altaf, “Uncertainty-Aware Authentication Model for IoT,” in Proceedings of the 3rd International Workshop in Security and Privacy Requirements Engineering (SECPRE 2019), 2019.
    [Bibtex]
    @inproceedings{mohammad_heydari_uncertainty-aware_2019,
    title = {Uncertainty-{Aware} {Authentication} {Model} for {IoT}},
    booktitle = {Proceedings of the 3rd {International} {Workshop} in {Security} and {Privacy} {Requirements} {Engineering} ({SECPRE} 2019)},
    publisher = {Springer},
    author = {Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester and Tafreshi, V. H. F. and Altaf, Amna},
    year = {2019},
    }
  • J. McAlaney, E. Kimpton, and H. Thackray, “Fifty shades of grey hat: A socio-psychological analysis of conversations on hacking forums,” in Proceedings of CyPsy24: Annual CyberPsychology, CyberTherapy & Social Networking Conference, 2019.
    [Bibtex]
    @inproceedings{mcalaney_fifty_2019,
    title = {Fifty shades of grey hat: {A} socio-psychological analysis of conversations on hacking forums},
    booktitle = {Proceedings of {CyPsy24}: {Annual} {CyberPsychology}, {CyberTherapy} \& {Social} {Networking} {Conference}},
    author = {McAlaney, John and Kimpton, Emily and Thackray, Helen},
    year = {2019},
    }
  • M. Heydari, A. Mylonas, V. Katos, and D. Gritzalis, “Towards Indeterminacy-Tolerant Access Control in IoT,” in Handbook of Big Data and IoT Security, A. Dehghantanha and K. R. Choo, Eds., Cham: Springer International Publishing, 2019, p. 53–71.
    [Bibtex]
    @incollection{heydari_towards_2019,
    address = {Cham},
    title = {Towards {Indeterminacy}-{Tolerant} {Access} {Control} in {IoT}},
    booktitle = {Handbook of {Big} {Data} and {IoT} {Security}},
    publisher = {Springer International Publishing},
    author = {Heydari, Mohammad and Mylonas, Alexios and Katos, Vasileios and Gritzalis, Dimitris},
    editor = {Dehghantanha, Ali and Choo, Kim-Kwang Raymond},
    year = {2019},
    pages = {53--71},
    }
  • M. Heydari, A. Mylonas, V. Katos, E. Balaguer-Ballester, H. F. V. Tafreshi, and E. Benkhelifa, “Uncertainty-Aware Authentication Model for Fog Computing,” in Proceedings of the 4th IEEE International Conference on Fog and Mobile Edge Computing, 2019.
    [Bibtex]
    @inproceedings{heydari_uncertainty-aware_2019,
    title = {Uncertainty-{Aware} {Authentication} {Model} for {Fog} {Computing}},
    booktitle = {Proceedings of the 4th {IEEE} {International} {Conference} on {Fog} and {Mobile} {Edge} {Computing}},
    author = {Heydari, M. and Mylonas, A. and Katos, V. and Balaguer-Ballester, E. and Tafreshi, V. Heydari Fami and Benkhelifa, E.},
    year = {2019},
    }
  • K. Flanagan, E. Fallon, P. Jacob, A. Awad, and P. Connolly, “2D2N: A Dynamic Degenerative Neural Network for Classification of Images of Live Network Data,” in 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC), 2019, p. 1–7.
    [Bibtex]
    @inproceedings{flanagan_2d2n_2019,
    title = {{2D2N}: {A} {Dynamic} {Degenerative} {Neural} {Network} for {Classification} of {Images} of {Live} {Network} {Data}},
    booktitle = {2019 16th {IEEE} {Annual} {Consumer} {Communications} {Networking} {Conference} ({CCNC})},
    author = {Flanagan, K. and Fallon, E. and Jacob, P. and Awad, A. and Connolly, P.},
    month = jan,
    year = {2019},
    pages = {1--7},
    }
  • M. Corner, H. Dogan, A. Mylonas, and F. Djabri, “A Usability Evaluation of Privacy Add-ons for Web Browsers,” in Proceedings of the 7th International Conference on Design, User Experience and Usability, 2019.
    [Bibtex]
    @inproceedings{corner_usability_2019,
    title = {A {Usability} {Evaluation} of {Privacy} {Add}-ons for {Web} {Browsers}},
    booktitle = {Proceedings of the 7th {International} {Conference} on {Design}, {User} {Experience} and {Usability}},
    publisher = {Springer},
    author = {Corner, M. and Dogan, H. and Mylonas, A. and Djabri, F.},
    year = {2019},
    }
  • A. Valkanis, A. Iossifides, P. Chatzimisios, C. M. Angelopoulos, and V. Katos, “IEEE 802.11ax Spatial Reuse Improvement: An Interference-Based Channel Access Algorithm,” Ieee vehicular technology magazine, p. 1–1, 2019.
    [Bibtex]
    @article{valkanis_ieee_2019,
    title = {{IEEE} 802.11ax {Spatial} {Reuse} {Improvement}: {An} {Interference}-{Based} {Channel} {Access} {Algorithm}},
    journal = {IEEE Vehicular Technology Magazine},
    author = {Valkanis, A. and Iossifides, A. and Chatzimisios, P. and Angelopoulos, C. M. and Katos, V.},
    year = {2019},
    pages = {1--1},
    }
  • M. A. Ben Naseir, H. Dogan, E. Apeh, C. Richardson, and R. Ali, “Contextualising the National Cyber Security Capacity in an Unstable Environment: A Spring Land Case Study,” in New Knowledge in Information Systems and Technologies, Cham, 2019, p. 373–382.
    [Bibtex]
    @inproceedings{ben_naseir_contextualising_2019,
    address = {Cham},
    title = {Contextualising the {National} {Cyber} {Security} {Capacity} in an {Unstable} {Environment}: {A} {Spring} {Land} {Case} {Study}},
    booktitle = {New {Knowledge} in {Information} {Systems} and {Technologies}},
    publisher = {Springer International Publishing},
    author = {Ben Naseir, Mohamed Altaher and Dogan, Huseyin and Apeh, Edward and Richardson, Christopher and Ali, Raian},
    editor = {Rocha, Álvaro and Adeli, Hojjat and Reis, Luís Paulo and Costanzo, Sandra},
    year = {2019},
    pages = {373--382},
    }
  • A. M’manga, S. Faily, J. McAlaney, C. Williams, Y. Kadobayashi, and D. Miyamoto, “A normative decision-making model for cyber security,” Information & computer security, vol. 27, iss. 5, 2019.
    [Bibtex]
    @article{mmanga_normative_2019,
    title = {A normative decision-making model for cyber security},
    volume = {27},
    number = {5},
    journal = {Information \& Computer Security},
    author = {M'manga, Andrew and Faily, Shamal and McAlaney, John and Williams, Chris and Kadobayashi, Youki and Miyamoto, Daisuke},
    year = {2019},
    }
  • J. Henriksen-Bulmer, S. Faily, and S. Jeary, “Privacy Risk Assessment in Context: A Meta-Model based on Contextual Integrity,” Computers & security, vol. 82, p. 270–283, 2019.
    [Bibtex]
    @article{henriksen-bulmer_privacy_2019,
    title = {Privacy {Risk} {Assessment} in {Context}: {A} {Meta}-{Model} based on {Contextual} {Integrity}},
    volume = {82},
    journal = {Computers \& Security},
    author = {Henriksen-Bulmer, J. and Faily, S. and Jeary, S.},
    year = {2019},
    pages = {270--283},
    }
  • V. Benson and J. McAlaney, Emerging Cyber Threats and Cognitive Vulnerabilities, Academic Press, 2019.
    [Bibtex]
    @book{benson_emerging_2019,
    title = {Emerging {Cyber} {Threats} and {Cognitive} {Vulnerabilities}},
    publisher = {Academic Press},
    author = {Benson, V and McAlaney, John},
    year = {2019},
    }

2018

  • N. Saxena, L. Xiong, V. Chukwuka, and S. Grijalva, “Impact Evaluation of Malicious Control Commands in Cyber-Physical Smart Grids,” Ieee transactions on sustainable computing, p. 1–1, 2018.
    [Bibtex]
    @article{saxena_impact_2018,
    title = {Impact {Evaluation} of {Malicious} {Control} {Commands} in {Cyber}-{Physical} {Smart} {Grids}},
    journal = {IEEE Transactions on Sustainable Computing},
    author = {Saxena, N. and Xiong, L. and Chukwuka, V. and Grijalva, S.},
    year = {2018},
    pages = {1--1},
    }
  • N. Serketzis, V. Katos, C. Ilioudis, D. Baltatzis, and G. Pangalos, “Actionable Threat Intelligence for Digital Forensics Readiness,” Information and computer security, 2018.
    [Bibtex]
    @article{serketzis_actionable_2018,
    title = {Actionable {Threat} {Intelligence} for {Digital} {Forensics} {Readiness}},
    journal = {Information and Computer Security},
    author = {Serketzis, N. and Katos, V. and Ilioudis, C. and Baltatzis, D. and Pangalos, G.},
    year = {2018},
    }
  • J. Henriksen-Bulmer, S. Faily, and V. Katos, “Translating Contextual Integrity into Practice using CLIFOD,” in Proceedings of the 2018 Networked Privacy Workshop at CSCW, 2018.
    [Bibtex]
    @inproceedings{henriksen-bulmer_translating_2018,
    title = {Translating {Contextual} {Integrity} into {Practice} using {CLIFOD}},
    booktitle = {Proceedings of the 2018 {Networked} {Privacy} {Workshop} at {CSCW}},
    author = {Henriksen-Bulmer, J. and Faily, S. and Katos, V.},
    year = {2018},
    }
  • S. Alexaki, G. Alexandris, V. Katos, and N. Petroulakis, “Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions,” in Proceedings of the IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks, 2018.
    [Bibtex]
    @inproceedings{alexaki_blockchain-based_2018,
    title = {Blockchain-based {Electronic} {Patient} {Records} for {Regulated} {Circular} {Healthcare} {Jurisdictions}},
    booktitle = {Proceedings of the {IEEE} {International} {Workshop} on {Computer}-{Aided} {Modeling} {Analysis} and {Design} of {Communication} {Links} and {Networks}},
    publisher = {IEEE},
    author = {Alexaki, S. and Alexandris, G. and Katos, V. and Petroulakis, N.},
    year = {2018},
    }
  • G. Alexandris, V. Katos, S. Alexaki, and G. Hatzivasilis, “Blockchains as Enablers for Auditing Cooperative Circular Economy Networks,” in Proceedings of the IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks, 2018.
    [Bibtex]
    @inproceedings{alexandris_blockchains_2018,
    title = {Blockchains as {Enablers} for {Auditing} {Cooperative} {Circular} {Economy} {Networks}},
    booktitle = {Proceedings of the {IEEE} {International} {Workshop} on {Computer}-{Aided} {Modeling} {Analysis} and {Design} of {Communication} {Links} and {Networks}},
    publisher = {IEEE},
    author = {Alexandris, G. and Katos, V. and Alexaki, S. and Hatzivasilis, G.},
    year = {2018},
    }
  • S. Belloro and A. Mylonas, “I know what you did last summer: New persistent tracking mechanisms in the wild,” Ieee access, p. 1–1, 2018.
    [Bibtex]
    @article{belloro_i_2018,
    title = {I know what you did last summer: {New} persistent tracking mechanisms in the wild},
    journal = {IEEE Access},
    author = {Belloro, S. and Mylonas, A.},
    year = {2018},
    pages = {1--1},
    }
  • I. Tsimperidis, P. D. Yoo, K. Taha, A. Mylonas, and V. Katos, “R\$²\$BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification,” Ieee transactions on cybernetics, p. 1–11, 2018.
    [Bibtex]
    @article{tsimperidis_rbn_2018,
    title = {R\$²\${BN}: {An} {Adaptive} {Model} for {Keystroke}-{Dynamics}-{Based} {Educational} {Level} {Classification}},
    journal = {IEEE Transactions on Cybernetics},
    author = {Tsimperidis, I. and Yoo, P. D. and Taha, K. and Mylonas, A. and Katos, V.},
    year = {2018},
    pages = {1--11},
    }
  • C. Sample, J. McAlaney, J. Bakdash, and H. Thackray, “A Cultural Exploration of the Social Media Manipulators,” in Proceedings of the 17th European Conference on Cyber Warfare and Security, 2018, p. 432–440.
    [Bibtex]
    @inproceedings{sample_cultural_2018,
    title = {A {Cultural} {Exploration} of the {Social} {Media} {Manipulators}},
    booktitle = {Proceedings of the 17th {European} {Conference} on {Cyber} {Warfare} and {Security}},
    publisher = {ACPIL},
    author = {Sample, Char and McAlaney, John and Bakdash, Jonathan and Thackray, Helen},
    year = {2018},
    pages = {432--440},
    }
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “Rationalising Decision Making about Risk: A Normative Approach,” in Proceedings of the 12th International Symposium on Human Aspects of Information Security & Assurance, 2018.
    [Bibtex]
    @inproceedings{mmanga_rationalising_2018,
    title = {Rationalising {Decision} {Making} about {Risk}: {A} {Normative} {Approach}},
    booktitle = {Proceedings of the 12th {International} {Symposium} on {Human} {Aspects} of {Information} {Security} \& {Assurance}},
    publisher = {University of Plymouth},
    author = {M'manga, Andrew and Faily, Shamal and McAlaney, John and Williams, Chris},
    year = {2018},
    }
  • A. Nisioti, A. Mylonas, P. D. Yoo, and V. Katos, “From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods,” Ieee communications surveys tutorials, p. 1–1, 2018.
    [Bibtex]
    @article{nisioti_intrusion_2018,
    title = {From {Intrusion} {Detection} to {Attacker} {Attribution}: {A} {Comprehensive} {Survey} of {Unsupervised} {Methods}},
    journal = {IEEE Communications Surveys Tutorials},
    author = {Nisioti, A. and Mylonas, A. and Yoo, P. D. and Katos, V.},
    year = {2018},
    pages = {1--1},
    }
  • N. Saxena, J. A. Stone, and H. Dogan, “Systematic Analysis: Resistance to Traffic Analysis Attacks in Tor System for Critical Infrastructures,” in Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics, 2018.
    [Bibtex]
    @inproceedings{saxena_systematic_2018,
    title = {Systematic {Analysis}: {Resistance} to {Traffic} {Analysis} {Attacks} in {Tor} {System} for {Critical} {Infrastructures}},
    booktitle = {Proceedings of the 2018 {IEEE} {International} {Conference} on {Systems}, {Man}, and {Cybernetics}},
    publisher = {IEEE},
    author = {Saxena, N. and Stone, J. A. and Dogan, H.},
    year = {2018},
    }
  • D. Ki-Aries, S. Faily, H. Dogan, and C. Williams, “Assessing System of Systems Security Risk and Requirements with OASoSIS,” in Proceedings of the 5th International Workshop on Evolving Security & Privacy Requirements Engineering, 2018.
    [Bibtex]
    @inproceedings{ki-aries_assessing_2018,
    title = {Assessing {System} of {Systems} {Security} {Risk} and {Requirements} with {OASoSIS}},
    booktitle = {Proceedings of the 5th {International} {Workshop} on {Evolving} {Security} \& {Privacy} {Requirements} {Engineering}},
    publisher = {IEEE},
    author = {Ki-Aries, Duncan and Faily, Shamal and Dogan, Huseyin and Williams, Chris},
    year = {2018},
    }
  • J. Coles, S. Faily, and D. Ki-Aries, “Tool-supporting Data Protection Impact Assessments with CAIRIS,” in Proceedings of the 5th International Workshop on Evolving Security & Privacy Requirements Engineering, 2018.
    [Bibtex]
    @inproceedings{coles_tool-supporting_2018,
    title = {Tool-supporting {Data} {Protection} {Impact} {Assessments} with {CAIRIS}},
    booktitle = {Proceedings of the 5th {International} {Workshop} on {Evolving} {Security} \& {Privacy} {Requirements} {Engineering}},
    publisher = {IEEE},
    author = {Coles, Joshua and Faily, Shamal and Ki-Aries, Duncan},
    year = {2018},
    }
  • A. M’manga, S. Faily, J. McAlaney, C. Williams, Y. Kadobayashi, and D. Miyamoto, “Qualitative Adaptation: Informing Design for Risk-based Decision Making,” in Proceedings of the 2nd Workshop on the Challenges and Opportunities for Qualitative Data Research Methods in HCI, 2018.
    [Bibtex]
    @inproceedings{mmanga_qualitative_2018,
    title = {Qualitative {Adaptation}: {Informing} {Design} for {Risk}-based {Decision} {Making}},
    booktitle = {Proceedings of the 2nd {Workshop} on the {Challenges} and {Opportunities} for {Qualitative} {Data} {Research} {Methods} in {HCI}},
    publisher = {BCS},
    author = {M'manga, Andrew and Faily, Shamal and McAlaney, John and Williams, Chris and Kadobayashi, Youki and Miyamoto, Daisuke},
    year = {2018},
    }
  • J. Henriksen-Bulmer, S. Faily, and S. Jeary, “DPIAs for Charities: a Charity Sector Specific DPIA Framework,” in Proceedings of the 13th International IFIP Summer School on Privacy and Identity Management, 2018.
    [Bibtex]
    @inproceedings{henriksen-bulmer_dpias_2018,
    title = {{DPIAs} for {Charities}: a {Charity} {Sector} {Specific} {DPIA} {Framework}},
    booktitle = {Proceedings of the 13th {International} {IFIP} {Summer} {School} on {Privacy} and {Identity} {Management}},
    publisher = {Springer},
    author = {Henriksen-Bulmer, Jane and Faily, Shamal and Jeary, Sheridan},
    year = {2018},
    }
  • N. Jiang and H. Dogan, “TAPCHA: An Invisible CAPTCHA Scheme,” in Proceedings of the 32nd International BCS Human Computer Interaction Conference, 2018.
    [Bibtex]
    @inproceedings{jiang_tapcha_2018,
    title = {{TAPCHA}: {An} {Invisible} {CAPTCHA} {Scheme}},
    booktitle = {Proceedings of the 32nd {International} {BCS} {Human} {Computer} {Interaction} {Conference}},
    publisher = {BCS},
    author = {Jiang, Nan and Dogan, Huseyin},
    year = {2018},
    }
  • S. Ambore, C. J. Richardson, H. Dogan, and E. Apeh, “Have Usability and Security Trade-offs in Mobile Financial Services (MFS) become Untrustworthy?,” in Proceedings of the 32nd International BCS Human Computer Interaction Conference, 2018.
    [Bibtex]
    @inproceedings{ambore_have_2018,
    title = {Have {Usability} and {Security} {Trade}-offs in {Mobile} {Financial} {Services} ({MFS}) become {Untrustworthy}?},
    booktitle = {Proceedings of the 32nd {International} {BCS} {Human} {Computer} {Interaction} {Conference}},
    publisher = {BCS},
    author = {Ambore, Stephen and Richardson, Christopher J. and Dogan, Huseyin and Apeh, Edward},
    year = {2018},
    }
  • A. M’manga, S. Faily, J. McAlaney, C. Williams, Y. Kadobayashi, and D. Miyamoto, “Eliciting Persona Characteristics for Risk Based Decision Making,” in Proceedings of the 32nd International BCS Human Computer Interaction Conference, 2018.
    [Bibtex]
    @inproceedings{mmanga_eliciting_2018,
    title = {Eliciting {Persona} {Characteristics} for {Risk} {Based} {Decision} {Making}},
    booktitle = {Proceedings of the 32nd {International} {BCS} {Human} {Computer} {Interaction} {Conference}},
    publisher = {BCS},
    author = {M'manga, Andrew and Faily, Shamal and McAlaney, John and Williams, Chris and Kadobayashi, Youki and Miyamoto, Daisuke},
    year = {2018},
    }
  • R. Chaudhary, G. S. Aujla, N. Kumar, A. K. Das, N. Saxena, and J. J. P. C. Rodrigues, “LaCSys: Lattice-based Cryptosystem for Secure Communication in Smart Grid Environment,” in 2018 IEEE International Conference on Communications (ICC), 2018.
    [Bibtex]
    @inproceedings{chaudhary_lacsys_2018,
    title = {{LaCSys}: {Lattice}-based {Cryptosystem} for {Secure} {Communication} in {Smart} {Grid} {Environment}},
    booktitle = {2018 {IEEE} {International} {Conference} on {Communications} ({ICC})},
    publisher = {IEEE},
    author = {Chaudhary, Rajat and Aujla, Gagangeet Singh and Kumar, Neeraj and Das, Ashok Kumar and Saxena, Neetesh and Rodrigues, Joel J. P. C.},
    year = {2018},
    }
  • R. Chaudhary, A. Jindal, G. S. Aujla, N. Kumar, A. K. Das, and N. Saxena, “LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment,” Ieee communications magazine, vol. 56, iss. 4, p. 24–32, 2018.
    [Bibtex]
    @article{chaudhary_lscsh_2018,
    title = {{LSCSH}: {Lattice}-{Based} {Secure} {Cryptosystem} for {Smart} {Healthcare} in {Smart} {Cities} {Environment}},
    volume = {56},
    number = {4},
    journal = {IEEE Communications Magazine},
    author = {Chaudhary, R. and Jindal, A. and Aujla, G. S. and Kumar, N. and Das, A. K. and Saxena, N.},
    month = apr,
    year = {2018},
    pages = {24--32},
    }
  • S. Belloro and A. Mylonas, “Security considerations around the usage of client-side storage APIs. Technical Report BUCSR-2018-01,” Bournemouth University 2018.
    [Bibtex]
    @techreport{belloro_security_2018,
    title = {Security considerations around the usage of client-side storage {APIs}. {Technical} {Report} {BUCSR}-2018-01},
    institution = {Bournemouth University},
    author = {Belloro, Stefano and Mylonas, Alexios},
    year = {2018},
    }
  • T. Skinner, J. Taylor, J. Dale, and J. McAlaney, “The Development of Intervention E-Learning Materials and Implementation Techniques for Cyber-Security Behaviour Change,” in Convention of the Study of Artificial Intelligence and Simulation of Behaviour (AISB), 2018, p. 29–34.
    [Bibtex]
    @inproceedings{skinner_development_2018,
    title = {The {Development} of {Intervention} {E}-{Learning} {Materials} and {Implementation} {Techniques} for {Cyber}-{Security} {Behaviour} {Change}},
    booktitle = {Convention of the {Study} of {Artificial} {Intelligence} and {Simulation} of {Behaviour} ({AISB})},
    publisher = {AISB},
    author = {Skinner, Tiffany and Taylor, Jacqui and Dale, John and McAlaney, John},
    year = {2018},
    pages = {29--34},
    }
  • H. Thackray and J. McAlaney, “Groups Online: Hacktivism and Social Protest,” in Psychological and Behavioural Examinations in Cybersecurity, J. McAlaney, L. A. Frumkin, and V. Benson, Eds., IGI-Global, 2018, p. 98–108.
    [Bibtex]
    @incollection{thackray_groups_2018,
    title = {Groups {Online}: {Hacktivism} and {Social} {Protest}},
    booktitle = {Psychological and {Behavioural} {Examinations} in {Cybersecurity}},
    publisher = {IGI-Global},
    author = {Thackray, Helen and McAlaney, John},
    editor = {McAlaney, John and Frumkin, Lara A. and Benson, Vladlena},
    year = {2018},
    pages = {98--108},
    }
  • J. Taylor, H. Thackray, S. E. Hodge, and J. McAlaney, “Introducing Psychological Concepts and Methods to Cybersecurity Students,” in Psychological and Behavioural Examinations in Cybersecurity, J. McAlaney, L. A. Frumkin, and V. Benson, Eds., IGI-Global, 2018, p. 98–108.
    [Bibtex]
    @incollection{taylor_introducing_2018,
    title = {Introducing {Psychological} {Concepts} and {Methods} to {Cybersecurity} {Students}},
    booktitle = {Psychological and {Behavioural} {Examinations} in {Cybersecurity}},
    publisher = {IGI-Global},
    author = {Taylor, Jacqui and Thackray, Helen and Hodge, Sarah E. and McAlaney, John},
    editor = {McAlaney, John and Frumkin, Lara A. and Benson, Vladlena},
    year = {2018},
    pages = {98--108},
    }
  • D. Ki-Aries, S. Faily, H. Dogan, and C. Williams, “System of Systems Characterisation assisting Security Risk Assessment,” in Proceedings of the IEEE 13th System of Systems Engineering Conference, 2018.
    [Bibtex]
    @inproceedings{ki-aries_system_2018,
    title = {System of {Systems} {Characterisation} assisting {Security} {Risk} {Assessment}},
    booktitle = {Proceedings of the {IEEE} 13th {System} of {Systems} {Engineering} {Conference}},
    publisher = {IEEE},
    author = {Ki-Aries, Duncan and Faily, Shamal and Dogan, Huseyin and Williams, Christopher},
    year = {2018},
    }
  • S. Simou, C. Kalloniatis, S. Gritzalis, and V. Katos, “A framework for designing cloud forensic-enabled services (CFeS),” Requirements engineering, 2018.
    [Bibtex]
    @article{simou_framework_2018,
    title = {A framework for designing cloud forensic-enabled services ({CFeS})},
    journal = {Requirements Engineering},
    author = {Simou, Stavros and Kalloniatis, Christos and Gritzalis, Stefanos and Katos, Vasilios},
    month = mar,
    year = {2018},
    }
  • N. Saxena, H. Shen, N. Komninos, K. K. R. Choo, and N. S. Chaudhari, “BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users,” Ieee transactions on dependable and secure computing, vol. PP, iss. 99, p. 1–1, 2018.
    [Bibtex]
    @article{saxena_bvpsms_2018,
    title = {{BVPSMS}: {A} {Batch} {Verification} {Protocol} for {End}-to-{End} {Secure} {SMS} for {Mobile} {Users}},
    volume = {PP},
    number = {99},
    journal = {IEEE Transactions on Dependable and Secure Computing},
    author = {Saxena, N. and Shen, H. and Komninos, N. and Choo, K. K. R. and Chaudhari, N. S.},
    year = {2018},
    pages = {1--1},
    }
  • S. Faily, Designing Usable and Secure Software with IRIS and CAIRIS, Springer, 2018.
    [Bibtex]
    @book{faily_designing_2018,
    title = {Designing {Usable} and {Secure} {Software} with {IRIS} and {CAIRIS}},
    publisher = {Springer},
    author = {Faily, Shamal},
    year = {2018},
    }
  • N. Saxena, G. Santiago, and B. J. Choi, “Securing Restricted Publisher-Subscriber Communications in Smart Grid Substations,” in Proceedings of the 10th International Conference on COMunicating Systems & NETworks, IEEE, 2018.
    [Bibtex]
    @incollection{saxena_securing_2018,
    title = {Securing {Restricted} {Publisher}-{Subscriber} {Communications} in {Smart} {Grid} {Substations}},
    booktitle = {Proceedings of the 10th {International} {Conference} on {COMunicating} {Systems} \& {NETworks}},
    publisher = {IEEE},
    author = {Saxena, N. and Santiago, G. and Choi, B. J.},
    year = {2018},
    }
  • D. Gritzalis, G. Iseppi, A. Mylonas, and V. Stavrou, “Exiting the Risk Assessment Maze: A Meta-Survey,” Acm computing surveys, vol. 51, iss. 1, p. 11:1–11:30, 2018.
    [Bibtex]
    @article{gritzalis_exiting_2018,
    title = {Exiting the {Risk} {Assessment} {Maze}: {A} {Meta}-{Survey}},
    volume = {51},
    number = {1},
    journal = {ACM Computing Surveys},
    author = {Gritzalis, Dimitris and Iseppi, Giulia and Mylonas, Alexios and Stavrou, Vasilis},
    month = jan,
    year = {2018},
    pages = {11:1--11:30},
    }
  • A. Atzeni, S. Faily, and R. Galloni, “Usable Security: HCI-Sec Issues and Motivations,” in Encyclopedia of Information Science and Technology, 4th ed., IGI Global, 2018, p. 5004–5013.
    [Bibtex]
    @incollection{atzeni_usable_2018,
    edition = {4th},
    title = {Usable {Security}: {HCI}-{Sec} {Issues} and {Motivations}},
    booktitle = {Encyclopedia of {Information} {Science} and {Technology}},
    publisher = {IGI Global},
    author = {Atzeni, A. and Faily, S. and Galloni, R.},
    year = {2018},
    pages = {5004--5013},
    }

2017

  • N. Serketzis, V. Katos, C. Ilioudis, D. Baltatzis, and G. J. Pangalos, “A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness,” International journal of systems and society, vol. 4, iss. 2, p. 57–68, 2017.
    [Bibtex]
    @article{serketzis_socio-technical_2017,
    title = {A {Socio}-{Technical} {Perspective} on {Threat} {Intelligence} {Informed} {Digital} {Forensic} {Readiness}},
    volume = {4},
    number = {2},
    journal = {International Journal of Systems and Society},
    author = {Serketzis, Nikolaos and Katos, Vasilios and Ilioudis, Christos and Baltatzis, Dimitrios and Pangalos, George J.},
    year = {2017},
    pages = {57--68},
    }
  • J. McAlanaey, H. Thackray, J. Taylor, C. Richardson, and H. Dogan, “Motivations, Group Processes and Decision Making of Hackers and Hacktivists,” in Symposium on Cyber Security, Foreign and Commonwealth Office, 2017.
    [Bibtex]
    @incollection{mcalanaey_motivations_2017,
    title = {Motivations, {Group} {Processes} and {Decision} {Making} of {Hackers} and {Hacktivists}},
    booktitle = {Symposium on {Cyber} {Security}},
    publisher = {Foreign and Commonwealth Office},
    author = {McAlanaey, J. and Thackray, H. and Taylor, J. and Richardson, C. and Dogan, H.},
    year = {2017},
    }
  • J. McAlanaey, J. Taylor, S. Hodge, H. Thackray, S. James, and J. Dale, “Incorporating Psychology into Cyber Security Education,” in Proceedings of the International Workshop on Realigning Cyber Security Education, Australian Defence Force Academy, 2017.
    [Bibtex]
    @incollection{mcalanaey_incorporating_2017,
    title = {Incorporating {Psychology} into {Cyber} {Security} {Education}},
    booktitle = {Proceedings of the {International} {Workshop} on {Realigning} {Cyber} {Security} {Education}},
    publisher = {Australian Defence Force Academy},
    author = {McAlanaey, J. and Taylor, J. and Hodge, S. and Thackray, H. and James, S. and Dale, J.},
    year = {2017},
    }
  • N. Saxena, V. Katos, and N. Kumar, “Cyber-Physical Smart Grid Security Tool for Education and Training Purposes,” in Proceedings of the International Workshop on Realigning Cyber Security Education, Australian Defence Force Academy, 2017.
    [Bibtex]
    @incollection{saxena_cyber-physical_2017,
    title = {Cyber-{Physical} {Smart} {Grid} {Security} {Tool} for {Education} and {Training} {Purposes}},
    booktitle = {Proceedings of the {International} {Workshop} on {Realigning} {Cyber} {Security} {Education}},
    publisher = {Australian Defence Force Academy},
    author = {Saxena, Neetesh and Katos, Vasilis and Kumar, Neeraj},
    year = {2017},
    }
  • K. Fysarakis, I. Askoxylakis, V. Katos, S. Ioannidis, and L. Marinos, “Security Concerns in Cooperative Intelligent Transportation Systems,” in Intrusion Detection and Prevention for Mobile Ecosystems, CRC Press, 2017, p. 487–522.
    [Bibtex]
    @incollection{fysarakis_security_2017,
    title = {Security {Concerns} in {Cooperative} {Intelligent} {Transportation} {Systems}},
    booktitle = {Intrusion {Detection} and {Prevention} for {Mobile} {Ecosystems}},
    publisher = {CRC Press},
    author = {Fysarakis, K. and Askoxylakis, I. and Katos, V. and Ioannidis, S. and Marinos, L.},
    year = {2017},
    pages = {487--522},
    }
  • E. Throm, S. Faily, H. Dogan, and A. Bishop, “Cyber Security Threats to the Future Railway,” in Poster at: Sixth International Human Factors Rail Conference, 2017.
    [Bibtex]
    @inproceedings{throm_cyber_2017,
    title = {Cyber {Security} {Threats} to the {Future} {Railway}},
    booktitle = {Poster at: {Sixth} {International} {Human} {Factors} {Rail} {Conference}},
    author = {Throm, Eylem and Faily, Shamal and Dogan, Huseyin and Bishop, Alex},
    year = {2017},
    }
  • N. Saxena, V. Chukwuka, L. Xiong, and S. Grijalva, “CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid,” in Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), 2017, p. 69–79.
    [Bibtex]
    @inproceedings{saxena_cpsa_2017,
    title = {{CPSA}: {A} {Cyber}-{Physical} {Security} {Assessment} {Tool} for {Situational} {Awareness} in {Smart} {Grid}},
    booktitle = {Proceedings of the 3rd {ACM} {Workshop} on {Cyber}-{Physical} {Systems} {Security} \& {Privacy} ({CPS}-{SPC})},
    publisher = {ACM},
    author = {Saxena, Neetesh and Chukwuka, Victor and Xiong, Leilei and Grijalva, Santiago},
    year = {2017},
    pages = {69--79},
    }
  • N. Saxena and N. S. Chaudhari, “Secure Algorithms for SAKA Protocol in the GSM Network,” in Proceedings of the 10th Wireless and Mobile Networking Conference (WMNC 2017), 2017, p. 1–8.
    [Bibtex]
    @inproceedings{saxena_secure_2017,
    title = {Secure {Algorithms} for {SAKA} {Protocol} in the {GSM} {Network}},
    booktitle = {Proceedings of the 10th {Wireless} and {Mobile} {Networking} {Conference} ({WMNC} 2017)},
    publisher = {IEEE},
    author = {Saxena, Neetesh and Chaudhari, Narendra S.},
    year = {2017},
    pages = {1--8},
    }
  • E. Apeh, “Realtime Assessment and Feedback through Cyber Security Hackathons,” in Proceedings of CELebrate 2017 Regional Teaching and Learning Conference, 2017.
    [Bibtex]
    @inproceedings{apeh_realtime_2017,
    title = {Realtime {Assessment} and {Feedback} through {Cyber} {Security} {Hackathons}},
    booktitle = {Proceedings of {CELebrate} 2017 {Regional} {Teaching} and {Learning} {Conference}},
    publisher = {Bournemouth University},
    author = {Apeh, Edward},
    year = {2017},
    }
  • E. Apeh, “Analysis of the Security Implications of Wearable Technology using Socio-technical Perspective,” in Proceedings of 25th European Conference on Information Systems, 2017.
    [Bibtex]
    @inproceedings{apeh_analysis_2017,
    title = {Analysis of the {Security} {Implications} of {Wearable} {Technology} using {Socio}-technical {Perspective}},
    booktitle = {Proceedings of 25th {European} {Conference} on {Information} {Systems}},
    publisher = {Association for Information Systems},
    author = {Apeh, Edward},
    year = {2017},
    }
  • E. Apeh and S. Jeffries, “Standard Operating Procedures for Cybercrime Investigations: A Systematic Literature Review,” in Psychological and Behavioural Examinations in Cybersecurity, IGI Global, 2017.
    [Bibtex]
    @incollection{apeh_standard_2017,
    title = {Standard {Operating} {Procedures} for {Cybercrime} {Investigations}: {A} {Systematic} {Literature} {Review}},
    booktitle = {Psychological and {Behavioural} {Examinations} in {Cybersecurity}},
    publisher = {IGI Global},
    author = {Apeh, E. and Jeffries, S.},
    year = {2017},
    }
  • S. Ambore, C. Richardson, H. Dogan, E. Apeh, and D. Osselton, “A Resilient Cybersecurity Framework for Mobile Financial Services (MFS),” Journal of cyber security technology, p. 1–23, 2017.
    [Bibtex]
    @article{ambore_resilient_2017,
    title = {A {Resilient} {Cybersecurity} {Framework} for {Mobile} {Financial} {Services} ({MFS})},
    volume = {0},
    number = {0},
    journal = {Journal of Cyber Security Technology},
    author = {Ambore, Stephen and Richardson, Christopher and Dogan, Huseyin and Apeh, Edward and Osselton, David},
    year = {2017},
    pages = {1--23},
    }
  • D. Ki-Aries and S. Faily, “Persona-Centred Information Security Awareness,” Computers & security, vol. 70, p. 6–74, 2017.
    [Bibtex]
    @article{ki-aries_persona-centred_2017,
    title = {Persona-{Centred} {Information} {Security} {Awareness}},
    volume = {70},
    journal = {Computers \& Security},
    author = {Ki-Aries, Duncan and Faily, Shamal},
    year = {2017},
    pages = {6--74},
    }
  • J. Holdsworth and E. Apeh, “An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector,” in Proceedings of 4th International Workshop on Evolving Security & Privacy Requirements Engineering, 2017.
    [Bibtex]
    @inproceedings{holdsworth_effective_2017,
    title = {An {Effective} {Immersive} {Cyber} {Security} {Awareness} {Learning} {Platform} for {Businesses} in the {Hospitality} {Sector}},
    booktitle = {Proceedings of 4th {International} {Workshop} on {Evolving} {Security} \& {Privacy} {Requirements} {Engineering}},
    publisher = {IEEE},
    author = {Holdsworth, Jack and Apeh, Edward},
    year = {2017},
    }
  • S. Faily and C. Iacob, “Design as Code: Facilitating Collaboration between Usability and Security Engineers using CAIRIS,” in Proceedings of 4th International Workshop on Evolving Security & Privacy Requirements Engineering, 2017.
    [Bibtex]
    @inproceedings{faily_design_2017,
    title = {Design as {Code}: {Facilitating} {Collaboration} between {Usability} and {Security} {Engineers} using {CAIRIS}},
    booktitle = {Proceedings of 4th {International} {Workshop} on {Evolving} {Security} \& {Privacy} {Requirements} {Engineering}},
    publisher = {IEEE},
    author = {Faily, Shamal and Iacob, Claudia},
    year = {2017},
    }
  • D. Ki-Aries, H. Dogan, S. Faily, P. Whittington, and C. Williams, “From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems,” in Proceedings of 4th International Workshop on Evolving Security & Privacy Requirements Engineering, 2017.
    [Bibtex]
    @inproceedings{ki-aries_requirements_2017,
    title = {From {Requirements} to {Operation}: {Components} for {Risk} {Assessment} in a {Pervasive} {System} of {Systems}},
    booktitle = {Proceedings of 4th {International} {Workshop} on {Evolving} {Security} \& {Privacy} {Requirements} {Engineering}},
    publisher = {IEEE},
    author = {Ki-Aries, Duncan and Dogan, Huseyin and Faily, Shamal and Whittington, Paul and Williams, Christopher},
    year = {2017},
    }
  • N. Saxena and B. J. Choi, “Integrated Distributed Authentication Protocol for Smart Grid Communications,” Ieee systems journal, vol. PP, iss. 99, p. 1–12, 2017.
    [Bibtex]
    @article{saxena_integrated_2017,
    title = {Integrated {Distributed} {Authentication} {Protocol} for {Smart} {Grid} {Communications}},
    volume = {PP},
    number = {99},
    journal = {IEEE Systems Journal},
    author = {Saxena, N. and Choi, B. J.},
    year = {2017},
    pages = {1--12},
    }
  • N. Saxena, S. Grijalva, V. Chukwuka, and A. V. Vasilakos, “Network Security and Privacy Challenges in Smart Vehicle-to-Grid,” Ieee wireless communications, vol. PP, iss. 99, p. 2–12, 2017.
    [Bibtex]
    @article{saxena_network_2017,
    title = {Network {Security} and {Privacy} {Challenges} in {Smart} {Vehicle}-to-{Grid}},
    volume = {PP},
    number = {99},
    journal = {IEEE Wireless Communications},
    author = {Saxena, N. and Grijalva, S. and Chukwuka, V. and Vasilakos, A. V.},
    year = {2017},
    pages = {2--12},
    }
  • N. Saxena and S. Grijalva, “Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication,” Ieee transactions on industrial informatics, vol. 13, iss. 3, p. 1482–1491, 2017.
    [Bibtex]
    @article{saxena_dynamic_2017,
    title = {Dynamic {Secrets} and {Secret} {Keys} {Based} {Scheme} for {Securing} {Last} {Mile} {Smart} {Grid} {Wireless} {Communication}},
    volume = {13},
    number = {3},
    journal = {IEEE Transactions on Industrial Informatics},
    author = {Saxena, N. and Grijalva, S.},
    month = jun,
    year = {2017},
    pages = {1482--1491},
    }
  • S. A. Menesidou, V. Katos, and G. Kambourakis, “Cryptographic Key Management in Delay Tolerant Networks: A Survey,” Future internet, vol. 9, iss. 3, p. 26, 2017.
    [Bibtex]
    @article{menesidou_cryptographic_2017,
    title = {Cryptographic {Key} {Management} in {Delay} {Tolerant} {Networks}: {A} {Survey}},
    volume = {9},
    number = {3},
    journal = {Future Internet},
    author = {Menesidou, Sofia Anna and Katos, Vasilios and Kambourakis, Georgios},
    year = {2017},
    pages = {26},
    }
  • H. Thackray, C. Richardson, H. Dogan, J. Taylor, and J. McAlaney, “Surveying the Hackers: The Challenges of Data Collection from a Secluded Community,” in Proceedings of 16th European Conference on Cyber Warfare and Security, 2017, p. 745–748.
    [Bibtex]
    @inproceedings{thackray_surveying_2017,
    title = {Surveying the {Hackers}: {The} {Challenges} of {Data} {Collection} from a {Secluded} {Community}},
    booktitle = {Proceedings of 16th {European} {Conference} on {Cyber} {Warfare} and {Security}},
    author = {Thackray, Helen and Richardson, Chris and Dogan, Huseyin and Taylor, Jacqui and McAlaney, John},
    year = {2017},
    pages = {745--748},
    }
  • A. M’manga, “Designing Systems for Risk Based Decision Making,” in British HCI 2017 Doctoral Consortium, 2017.
    [Bibtex]
    @inproceedings{mmanga_designing_2017,
    title = {Designing {Systems} for {Risk} {Based} {Decision} {Making}},
    booktitle = {British {HCI} 2017 {Doctoral} {Consortium}},
    author = {M'manga, Andrew},
    year = {2017},
    }
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “Folk Risk Analysis: Factors Influencing Security Analysts’ Interpretation of Risk,” in Proceedings of the 3rd Workshop on Security Information Workers, 2017.
    [Bibtex]
    @inproceedings{mmanga_folk_2017,
    title = {Folk {Risk} {Analysis}: {Factors} {Influencing} {Security} {Analysts}' {Interpretation} of {Risk}},
    booktitle = {Proceedings of the 3rd {Workshop} on {Security} {Information} {Workers}},
    publisher = {USENIX Association},
    author = {M'manga, Andrew and Faily, Shamal and McAlaney, John and Williams, Christopher},
    year = {2017},
    }
  • J. Taylor, G. Ollis, J. McAlaney, and H. Thackray, “Observations and Reflections on Teaching Psychological Principle and Methods to Cybersecurity Students,” in Proceedings of the National Conference for Learning and Teaching in Cyber Security, 2017.
    [Bibtex]
    @inproceedings{taylor_observations_2017,
    title = {Observations and {Reflections} on {Teaching} {Psychological} {Principle} and {Methods} to {Cybersecurity} {Students}},
    booktitle = {Proceedings of the {National} {Conference} for {Learning} and {Teaching} in {Cyber} {Security}},
    author = {Taylor, Jacqui and Ollis, Gail and McAlaney, John and Thackray, Helen},
    year = {2017},
    }
  • J. Henriksen-Bulmer and S. Faily, “Applying Contextual Integrity to Open Data Publishing,” in Proceedings of the 31st British HCI Group Annual Conference on People and Computers: Digital Make Believe, 2017.
    [Bibtex]
    @inproceedings{henriksen-bulmer_applying_2017,
    title = {Applying {Contextual} {Integrity} to {Open} {Data} {Publishing}},
    booktitle = {Proceedings of the 31st {British} {HCI} {Group} {Annual} {Conference} on {People} and {Computers}: {Digital} {Make} {Believe}},
    publisher = {British Computer Society},
    author = {Henriksen-Bulmer, Jane and Faily, Shamal},
    year = {2017},
    }
  • N. Jiang, H. Dogan, and F. Tian, “Designing Mobile Friendly CAPTCHAs: An Exploratory Study,” in Proceedings of the 31st British HCI Group Annual Conference on People and Computers: Digital Make Believe, 2017.
    [Bibtex]
    @inproceedings{jiang_designing_2017,
    title = {Designing {Mobile} {Friendly} {CAPTCHAs}: {An} {Exploratory} {Study}},
    booktitle = {Proceedings of the 31st {British} {HCI} {Group} {Annual} {Conference} on {People} and {Computers}: {Digital} {Make} {Believe}},
    publisher = {British Computer Society},
    author = {Jiang, Nan and Dogan, Huseyin and Tian, Feng},
    year = {2017},
    }
  • N. Serketzis, V. Katos, C. Ilioudis, D. Baltatzis, and G. Pangalos, “Towards A Threat Intelligence Informed Digital Forensics Readiness Framework,” in Proceedings of the 25th European Conference on Information Systems, 2017.
    [Bibtex]
    @inproceedings{serketzis_towards_2017,
    title = {Towards {A} {Threat} {Intelligence} {Informed} {Digital} {Forensics} {Readiness} {Framework}},
    booktitle = {Proceedings of the 25th {European} {Conference} on {Information} {Systems}},
    publisher = {Association for Information Systems},
    author = {Serketzis, Nikolaos and Katos, Vasileios and Ilioudis, Christos and Baltatzis, Dimitrios and Pangalos, Georgios},
    year = {2017},
    }
  • S. Ambore, E. Apeh, H. Dogan, C. Richardson, and D. Osselton, “Development of Human Factors and Cybersecurity Objectives for Mobile Financial Service (MFS),” in Contemporary Ergonomics & Human Factors 2017, 2017.
    [Bibtex]
    @inproceedings{ambore_development_2017,
    title = {Development of {Human} {Factors} and {Cybersecurity} {Objectives} for {Mobile} {Financial} {Service} ({MFS})},
    booktitle = {Contemporary {Ergonomics} \& {Human} {Factors} 2017},
    publisher = {Chartered Institute of Ergonomics \& Human Factors},
    author = {Ambore, Steven and Apeh, Edward and Dogan, Huseyin and Richardson, Christopher and Osselton, David},
    editor = {Charles, Rebecca and Wilkinson, John},
    year = {2017},
    }
  • J. Taylor, J. McAlaney, S. Hodge, H. Thackray, C. Richardson, S. James, and J. Dale, “Teaching Psychological Principles to Cybersecurity Students,” in Proceedings of the IEEE Global Engineering Education Conference, 2017, p. 1782–1789.
    [Bibtex]
    @inproceedings{taylor_teaching_2017,
    title = {Teaching {Psychological} {Principles} to {Cybersecurity} {Students}},
    booktitle = {Proceedings of the {IEEE} {Global} {Engineering} {Education} {Conference}},
    publisher = {IEEE},
    author = {Taylor, Jacqui and McAlaney, John and Hodge, Sarah and Thackray, Helen and Richardson, Chris and James, Susie and Dale, John},
    year = {2017},
    pages = {1782--1789},
    }
  • T. Tsikrika, B. Akhgar, V. Katos, S. Vrochidis, P. Burnap, and M. L. Williams, “1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web,” in Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017, p. 823–824.
    [Bibtex]
    @inproceedings{tsikrika_1st_2017,
    series = {{WSDM} '17},
    title = {1st {International} {Workshop} on {Search} and {Mining} {Terrorist} {Online} {Content} \& {Advances} in {Data} {Science} for {Cyber} {Security} and {Risk} on the {Web}},
    booktitle = {Proceedings of the {Tenth} {ACM} {International} {Conference} on {Web} {Search} and {Data} {Mining}},
    publisher = {ACM},
    author = {Tsikrika, Theodora and Akhgar, Babak and Katos, Vasilis and Vrochidis, Stefanos and Burnap, Pete and Williams, Matthew L.},
    year = {2017},
    pages = {823--824},
    }
  • A. Nisioti, M. Heydari, A. Mylonas, V. Katos, and V. H. F. Tafreshi, “TRAWL: Protection against rogue sites for the masses,” in Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science, 2017, p. 120–127.
    [Bibtex]
    @inproceedings{nisioti_trawl_2017,
    title = {{TRAWL}: {Protection} against rogue sites for the masses},
    booktitle = {Proceedings of the 11th {IEEE} {International} {Conference} on {Research} {Challenges} in {Information} {Science}},
    publisher = {IEEE},
    author = {Nisioti, Antonia and Heydari, Mohammad and Mylonas, Alexios and Katos, Vasilios and Tafreshi, Vahid Heydari Fami},
    year = {2017},
    pages = {120--127},
    }
  • A. Nisioti, A. Mylonas, V. Katos, P. Yoo, and A. Chryssanthou, “You Can Run but You Cannot Hide from Memory: Extracting IM Evidence of Android Apps,” in Proceedings of the 22nd IEEE Symposium on Computers and Communications, 2017.
    [Bibtex]
    @inproceedings{nisioti_you_2017,
    title = {You {Can} {Run} but {You} {Cannot} {Hide} from {Memory}: {Extracting} {IM} {Evidence} of {Android} {Apps}},
    booktitle = {Proceedings of the 22nd {IEEE} {Symposium} on {Computers} and {Communications}},
    publisher = {IEEE},
    author = {Nisioti, Antonia and Mylonas, Alexios and Katos, Vasilis and Yoo, Paul and Chryssanthou, Anargyros},
    year = {2017},
    }
  • N. Tsalis, A. Mylonas, A. Nisioti, D. Gritzalis, and V. Katos, “Exploring the protection of private browsing in desktop browsers,” Computers & security, vol. 67, p. 181–197, 2017.
    [Bibtex]
    @article{tsalis_exploring_2017,
    title = {Exploring the protection of private browsing in desktop browsers},
    volume = {67},
    journal = {Computers \& Security},
    author = {Tsalis, N. and Mylonas, A. and Nisioti, A. and Gritzalis, D. and Katos, V.},
    year = {2017},
    pages = {181--197},
    }
  • D. Ki-Aries, S. Faily, H. Dogan, and C. Williams, “Re-framing “The AMN”: A Case Study Eliciting and Modelling a System of Systems using the Afghan Mission Network,” in Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science, 2017, p. 103–108.
    [Bibtex]
    @inproceedings{ki-aries_re-framing_2017,
    title = {Re-framing “{The} {AMN}”: {A} {Case} {Study} {Eliciting} and {Modelling} a {System} of {Systems} using the {Afghan} {Mission} {Network}},
    booktitle = {Proceedings of the 11th {IEEE} {International} {Conference} on {Research} {Challenges} in {Information} {Science}},
    publisher = {IEEE},
    author = {Ki-Aries, Duncan and Faily, Shamal and Dogan, Huseyin and Williams, Chris},
    year = {2017},
    pages = {103--108},
    }
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “System Design Considerations for Risk Perception,” in Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science, 2017, p. 322–327.
    [Bibtex]
    @inproceedings{mmanga_system_2017,
    title = {System {Design} {Considerations} for {Risk} {Perception}},
    booktitle = {Proceedings of the 11th {IEEE} {International} {Conference} on {Research} {Challenges} in {Information} {Science}},
    publisher = {IEEE},
    author = {M'manga, Andrew and Faily, Shamal and McAlaney, John and Williams, Chris},
    year = {2017},
    pages = {322--327},
    }
  • J. Ward, H. Dogan, E. Apeh, A. Mylonas, and V. Katos, “Using Human Factor Approaches to an Organisation’s Bring Your Own Device scheme,” in Proceedings of the 5th International Conference on Human Aspects of Information Security, Privacy and Trust, 2017.
    [Bibtex]
    @inproceedings{ward_using_2017,
    title = {Using {Human} {Factor} {Approaches} to an {Organisation}'s {Bring} {Your} {Own} {Device} scheme},
    booktitle = {Proceedings of the 5th {International} {Conference} on {Human} {Aspects} of {Information} {Security}, {Privacy} and {Trust}},
    publisher = {Springer},
    author = {Ward, Jodie and Dogan, Huseyin and Apeh, Edward and Mylonas, Alexios and Katos, Vasilios},
    year = {2017},
    }
  • N. Saxena, B. J. Choi, and G. S, “Secure and Privacy-Preserving Concentration of Metering Data in AMI Networks,” in IEEE International Conference on Communications, 2017.
    [Bibtex]
    @inproceedings{saxena_secure_2017-1,
    title = {Secure and {Privacy}-{Preserving} {Concentration} of {Metering} {Data} in {AMI} {Networks}},
    booktitle = {{IEEE} {International} {Conference} on {Communications}},
    author = {Saxena, N. and Choi, B. J. and S, Grijava},
    year = {2017},
    }
  • N. Saxena and S. Grijavla, “Efficient Signature Scheme for Delivering Authentic Control Commands in the Smart Grid,” Ieee transactions on smart grid, 2017.
    [Bibtex]
    @article{saxena_efficient_2017,
    title = {Efficient {Signature} {Scheme} for {Delivering} {Authentic} {Control} {Commands} in the {Smart} {Grid}},
    journal = {IEEE Transactions on Smart Grid},
    author = {Saxena, N. and Grijavla, S.},
    year = {2017},
    }

2016

  • N. Naik, P. Jenkins, N. Savage, and V. Katos, “Big data security analysis approach using Computational Intelligence techniques in R for desktop users,” in 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 2016, p. 1–8.
    [Bibtex]
    @inproceedings{naik_big_2016,
    title = {Big data security analysis approach using {Computational} {Intelligence} techniques in {R} for desktop users},
    booktitle = {2016 {IEEE} {Symposium} {Series} on {Computational} {Intelligence} ({SSCI})},
    author = {Naik, N. and Jenkins, P. and Savage, N. and Katos, V.},
    year = {2016},
    pages = {1--8},
    }
  • S. Mohammed and E. Apeh, “A Model for Social Engineering Awareness Program for Schools,” in Proceedings of the 10th International Conference on Software, Knowledge, Information Management and Applications, 2016, p. 392–397.
    [Bibtex]
    @inproceedings{mohammed_model_2016,
    title = {A {Model} for {Social} {Engineering} {Awareness} {Program} for {Schools}},
    booktitle = {Proceedings of the 10th {International} {Conference} on {Software}, {Knowledge}, {Information} {Management} and {Applications}},
    publisher = {IEEE},
    author = {Mohammed, Saba and Apeh, Edward},
    year = {2016},
    pages = {392--397},
    }
  • R. Rogers, E. Apeh, and C. Richardson, “Resilience of the Internet of Things (IoT) from an Information Assurance (IA) Perspective,” in Proceedings of the 10th International Conference on Software, Knowledge, Information Management and Applications, 2016.
    [Bibtex]
    @inproceedings{rogers_resilience_2016,
    title = {Resilience of the {Internet} of {Things} ({IoT}) from an {Information} {Assurance} ({IA}) {Perspective}},
    volume = {110–115},
    booktitle = {Proceedings of the 10th {International} {Conference} on {Software}, {Knowledge}, {Information} {Management} and {Applications}},
    publisher = {IEEE},
    author = {Rogers, Rebecca and Apeh, Edward and Richardson, Chris},
    year = {2016},
    }
  • A. M’manga, A. Cullen, and A. P. Namanya, “Understanding OAuth as a Predecessor of OpenID Connect and User Awareness of Web Single Sign On (SSO),” in Proceedings of the 32nd UK Performance Engineering Workshop & Cyber Security Workshop 2016, 2016, p. 117–125.
    [Bibtex]
    @inproceedings{mmanga_understanding_2016,
    title = {Understanding {OAuth} as a {Predecessor} of {OpenID} {Connect} and {User} {Awareness} of {Web} {Single} {Sign} {On} ({SSO})},
    booktitle = {Proceedings of the 32nd {UK} {Performance} {Engineering} {Workshop} \& {Cyber} {Security} {Workshop} 2016},
    publisher = {University of Bradford},
    author = {M'manga, Andrew and Cullen, Andrea and Namanya, Anitta Patience},
    year = {2016},
    pages = {117--125},
    }
  • M. Favale, N. McDonald, S. Faily, and C. Gatzidis, “Human Aspects in Digital Rights Management: The Perspectives of Content Developers,” Scripted, vol. 13, iss. 3, p. 289–304, 2016.
    [Bibtex]
    @article{favale_human_2016,
    title = {Human {Aspects} in {Digital} {Rights} {Management}: {The} {Perspectives} of {Content} {Developers}},
    volume = {13},
    number = {3},
    journal = {SCRIPTed},
    author = {Favale, Marcelle and McDonald, Neil and Faily, Shamal and Gatzidis, Christos},
    year = {2016},
    pages = {289--304},
    }
  • N. Saxena, S. Grijalva, and N. S. Chaudhari, “Authentication Protocol for an IoT-Enabled LTE Network,” Acm transactions on internet technology, vol. 16, iss. 4, p. 25:1 – 25:20, 2016.
    [Bibtex]
    @article{saxena_authentication_2016,
    title = {Authentication {Protocol} for an {IoT}-{Enabled} {LTE} {Network}},
    volume = {16},
    number = {4},
    journal = {ACM Transactions on Internet Technology},
    author = {Saxena, N. and Grijalva, S. and Chaudhari, N. S.},
    year = {2016},
    pages = {25:1 -- 25:20},
    }
  • J. McAlaney, H. Thackray, and J. Taylor, “The social psychology of cybersecurity,” The psychologist, vol. 29, p. 686–689, 2016.
    [Bibtex]
    @article{mcalaney_social_2016,
    title = {The social psychology of cybersecurity},
    volume = {29},
    journal = {The Psychologist},
    author = {McAlaney, John and Thackray, Helen and Taylor, Jacqui},
    year = {2016},
    pages = {686--689},
    }
  • K. Fysarakis, I. Askoxylakis, C. Manifavas, O. Soultatos, I. Papaefstathiou, and V. Katos, “Which IoT Protocol? Comparing standardized approaches over acCommon M2M application,” in Proceedings of IEEE Global Communications Conference, 2016.
    [Bibtex]
    @inproceedings{fysarakis_which_2016,
    title = {Which {IoT} {Protocol}? {Comparing} standardized approaches over {acCommon} {M2M} application},
    booktitle = {Proceedings of {IEEE} {Global} {Communications} {Conference}},
    author = {Fysarakis, K. and Askoxylakis, I. and Manifavas, C. and Soultatos, O. and Papaefstathiou, I. and Katos, V.},
    year = {2016},
    }
  • I. Tsimperidis, S. Rostami, and V. Katos, “Age Detection Through Keystroke Dynamics from User Authentication Failures,” International journal of digital crime and forensics, vol. 9, iss. 1, p. 1–16, 2016.
    [Bibtex]
    @article{tsimperidis_age_2016,
    title = {Age {Detection} {Through} {Keystroke} {Dynamics} from {User} {Authentication} {Failures}},
    volume = {9},
    number = {1},
    journal = {International Journal of Digital Crime and Forensics},
    author = {Tsimperidis, I. and Rostami, S. and Katos, V.},
    year = {2016},
    pages = {1--16},
    }
  • K. Fysarakis, O. Soultatos, C. Manifavas, I. Papaefstathiou, and I. Askoxylakis, “XSACd—Cross-domain resource sharing & access control for smart environments,” Future generation computer systems, 2016.
    [Bibtex]
    @article{fysarakis_xsacdcross-domain_2016,
    title = {{XSACd}—{Cross}-domain resource sharing \& access control for smart environments},
    journal = {Future Generation Computer Systems},
    author = {Fysarakis, Konstantinos and Soultatos, Othonas and Manifavas, Charalampos and Papaefstathiou, Ioannis and Askoxylakis, Ioannis},
    year = {2016},
    }
  • T. Mahmoodi, V. Kulkarni, W. Kellerer, P. Mangan, F. Zeiger, S. Spirou, I. Askoxylakis, X. Vilajosana, H. J. H.J. Einsiedler, and J. Quittek, “VirtuWind: virtual and programmable industrial network prototype deployed in operational wind park,” Transactions on emerging telecommunications technologies, vol. 27, iss. 9, p. 1281–1288, 2016.
    [Bibtex]
    @article{mahmoodi_virtuwind_2016,
    title = {{VirtuWind}: virtual and programmable industrial network prototype deployed in operational wind park},
    volume = {27},
    number = {9},
    journal = {Transactions on Emerging Telecommunications Technologies},
    author = {Mahmoodi, T. and Kulkarni, V. and Kellerer, W. and Mangan, P. and Zeiger, F. and Spirou, S. and Askoxylakis, I. and Vilajosana, X. and H.J. Einsiedler, H.J. and Quittek, J.},
    year = {2016},
    pages = {1281--1288},
    }
  • J. Henriksen-Bulmer and S. Jeary, “Re-identification Attacks: A Systematic Literature Review,” International journal of information management, vol. 36, iss. 6, Part B, p. 1184–1192, 2016.
    [Bibtex]
    @article{henriksen-bulmer_re-identification_2016,
    title = {Re-identification {Attacks}: {A} {Systematic} {Literature} {Review}},
    volume = {36},
    number = {6, Part B},
    journal = {International Journal of Information Management},
    author = {Henriksen-Bulmer, Jane and Jeary, Sheridan},
    year = {2016},
    pages = {1184--1192},
    }
  • S. Ambore, C. Richardson, H. Dogan, E. Apeh, and D. Osselton, “A “Soft” Approach to Analysing Mobile Financial Services Sociotechnical Systems,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016.
    [Bibtex]
    @inproceedings{ambore_soft_2016,
    title = {A “{Soft}” {Approach} to {Analysing} {Mobile} {Financial} {Services} {Sociotechnical} {Systems}},
    booktitle = {Proceedings of the 30th {British} {HCI} {Group} {Annual} {Conference} on {People} and {Computers}: {Fusion}},
    publisher = {British Computer Society},
    author = {Ambore, Stephen and Richardson, Christopher and Dogan, Huseyin and Apeh, Edward and Osselton, David},
    year = {2016},
    }
  • A. Partridge and S. Faily, “The Application of useless Japanese Inventions for Requirements Elicitation in Information Security,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016.
    [Bibtex]
    @inproceedings{partridge_application_2016,
    title = {The {Application} of useless {Japanese} {Inventions} for {Requirements} {Elicitation} in {Information} {Security}},
    booktitle = {Proceedings of the 30th {British} {HCI} {Group} {Annual} {Conference} on {People} and {Computers}: {Fusion}},
    publisher = {British Computer Society},
    author = {Partridge, Anton and Faily, Shamal},
    year = {2016},
    }
  • D. Ki-Aries, S. Faily, and K. Beckers, “Persona-Driven Information Security Awareness,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016.
    [Bibtex]
    @inproceedings{ki-aries_persona-driven_2016,
    title = {Persona-{Driven} {Information} {Security} {Awareness}},
    booktitle = {Proceedings of the 30th {British} {HCI} {Group} {Annual} {Conference} on {People} and {Computers}: {Fusion}},
    publisher = {British Computer Society},
    author = {Ki-Aries, Duncan and Faily, Shamal and Beckers, Kristian},
    year = {2016},
    }
  • S. Faily, G. Lykou, A. Partridge, D. Gritzalis, A. Mylonas, and V. Katos, “Human-Centered Specification Exemplars for Critical Infrastructure Environments,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers, 2016.
    [Bibtex]
    @inproceedings{faily_human-centered_2016,
    title = {Human-{Centered} {Specification} {Exemplars} for {Critical} {Infrastructure} {Environments}},
    booktitle = {Proceedings of the 30th {British} {HCI} {Group} {Annual} {Conference} on {People} and {Computers}},
    author = {Faily, Shamal and Lykou, Georgia and Partridge, Anton and Gritzalis, Dimitris and Mylonas, Alexios and Katos, Vasilios},
    year = {2016},
    }
  • S. Faily, C. Iacob, and S. Field, “Ethical Hazards and Safeguards in Penetration Testing,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016.
    [Bibtex]
    @inproceedings{faily_ethical_2016,
    title = {Ethical {Hazards} and {Safeguards} in {Penetration} {Testing}},
    booktitle = {Proceedings of the 30th {British} {HCI} {Group} {Annual} {Conference} on {People} and {Computers}: {Fusion}},
    publisher = {British Computer Society},
    author = {Faily, Shamal and Iacob, Claudia and Field, Sarah},
    year = {2016},
    }
  • S. Faily, G. Stergiopoulos, V. Katos, and D. Gritzalis, ““Water, Water, Every Where”: Nuances for a Water Industry Critical Infrastructure Specification Exemplar,” in Critical Information Infrastructures Security: 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers, E. Rome, M. Theocharidou, and S. Wolthusen, Eds., Springer International Publishing, 2016, p. 243–246.
    [Bibtex]
    @incollection{faily_water_2016,
    title = {“{Water}, {Water}, {Every} {Where}”: {Nuances} for a {Water} {Industry} {Critical} {Infrastructure} {Specification} {Exemplar}},
    booktitle = {Critical {Information} {Infrastructures} {Security}: 10th {International} {Conference}, {CRITIS} 2015, {Berlin}, {Germany}, {October} 5-7, 2015, {Revised} {Selected} {Papers}},
    publisher = {Springer International Publishing},
    author = {Faily, Shamal and Stergiopoulos, George and Katos, Vasilios and Gritzalis, Dimitris},
    editor = {Rome, Erich and Theocharidou, Marianthi and Wolthusen, Stephen},
    year = {2016},
    pages = {243--246},
    }
  • N. Tsalis, A. Mylonas, and D. Gritzalis, “An Intensive Analysis of Security and Privacy Browser Add-Ons,” in Risks and Security of Internet and Systems: 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers, C. Lambrinoudakis and A. Gabillon, Eds., Springer, 2016, p. 258–273.
    [Bibtex]
    @incollection{tsalis_intensive_2016,
    title = {An {Intensive} {Analysis} of {Security} and {Privacy} {Browser} {Add}-{Ons}},
    booktitle = {Risks and {Security} of {Internet} and {Systems}: 10th {International} {Conference}, {CRiSIS} 2015, {Mytilene}, {Lesbos} {Island}, {Greece}, {July} 20-22, 2015, {Revised} {Selected} {Papers}},
    publisher = {Springer},
    author = {Tsalis, Nikolaos and Mylonas, Alexios and Gritzalis, Dimitris},
    editor = {Lambrinoudakis, Costas and Gabillon, Alban},
    year = {2016},
    pages = {258--273},
    }
  • S. Faily, D. Power, and I. Fléchais, “Gulfs of Expectation: Eliciting and Verifying Differences in Trust Expectations using Personas,” Journal of trust management, vol. 3, iss. 1, p. 1–22, 2016.
    [Bibtex]
    @article{faily_gulfs_2016,
    title = {Gulfs of {Expectation}: {Eliciting} and {Verifying} {Differences} in {Trust} {Expectations} using {Personas}},
    volume = {3},
    number = {1},
    journal = {Journal of Trust Management},
    author = {Faily, Shamal and Power, David and Fléchais, Ivan},
    year = {2016},
    pages = {1--22},
    }
  • A. Dimitriadis, P. S. Efraimidis, and V. Katos, “Malevolent App Pairs: An Android Permission Overpassing Scheme,” in Proceedings of the 1st International Workshop for Malicious Software and Hardware in Internet of Things (MAL-IoT 2016), 2016.
    [Bibtex]
    @inproceedings{dimitriadis_malevolent_2016,
    title = {Malevolent {App} {Pairs}: {An} {Android} {Permission} {Overpassing} {Scheme}},
    booktitle = {Proceedings of the 1st {International} {Workshop} for {Malicious} {Software} and {Hardware} in {Internet} of {Things} ({MAL}-{IoT} 2016)},
    author = {Dimitriadis, Antonios and Efraimidis, Pavlos S. and Katos, Vasilios},
    year = {2016},
    }
  • P. Palmieri, “Anonymity networks and access to information during conflicts,” in Proceedings of the 8th International Conference on Cyber Conflict (CyCon 2016), 2016.
    [Bibtex]
    @inproceedings{palmieri_anonymity_2016,
    title = {Anonymity networks and access to information during conflicts},
    booktitle = {Proceedings of the 8th {International} {Conference} on {Cyber} {Conflict} ({CyCon} 2016)},
    author = {Palmieri, Paolo},
    year = {2016},
    }
  • C. A. Pozo, S. P. Portillo, G. Suarez-Tangil, and P. Palmieri, “Security Analysis and Exploitation of Arduino devices in the Internet of Things,” in Proceedings of the 1st International Workshop for Malicious Software and Hardware in Internet of Things (MAL-IoT 2016), 2016.
    [Bibtex]
    @inproceedings{pozo_security_2016,
    title = {Security {Analysis} and {Exploitation} of {Arduino} devices in the {Internet} of {Things}},
    booktitle = {Proceedings of the 1st {International} {Workshop} for {Malicious} {Software} and {Hardware} in {Internet} of {Things} ({MAL}-{IoT} 2016)},
    author = {Pozo, Carlos Alberca and Portillo, Sergio Pastrana and Suarez-Tangil, Guillermo and Palmieri, Paolo},
    year = {2016},
    }
  • S. Faily and I. Fléchais, “Finding and Resolving Security Misusability with Misusability Cases,” Requirements engineering, vol. 21, iss. 2, p. 209–223, 2016.
    [Bibtex]
    @article{faily_finding_2016,
    title = {Finding and {Resolving} {Security} {Misusability} with {Misusability} {Cases}},
    volume = {21},
    number = {2},
    journal = {Requirements Engineering},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2016},
    pages = {209--223},
    }
  • J. Henriksen-Bulmer, “A Framework for Public Bodies for Managing the Secure and Appropriate Release of Open Source Data,” in British HCI 2016 Doctoral Consortium, 2016.
    [Bibtex]
    @inproceedings{henriksen-bulmer_framework_2016,
    title = {A {Framework} for {Public} {Bodies} for {Managing} the {Secure} and {Appropriate} {Release} of {Open} {Source} {Data}},
    booktitle = {British {HCI} 2016 {Doctoral} {Consortium}},
    author = {Henriksen-Bulmer, Jane},
    year = {2016},
    }
  • H. Thackray, J. McAlaney, H. Dogan, J. Taylor, and C. Richardson, “Social Psychology: An under-used tool in Cybersecurity,” in Proceedings of the 30th British HCI Group Annual Conference on People and Security: Fusion, 2016.
    [Bibtex]
    @inproceedings{thackray_social_2016,
    title = {Social {Psychology}: {An} under-used tool in {Cybersecurity}},
    booktitle = {Proceedings of the 30th {British} {HCI} {Group} {Annual} {Conference} on {People} and {Security}: {Fusion}},
    publisher = {BCS},
    author = {Thackray, Helen and McAlaney, John and Dogan, Huseyin and Taylor, Jacqui and Richardson, Christopher},
    year = {2016},
    }
  • P. Andriotis, G. Oikonomou, A. Mylonas, and T. Tryfonas, “A Study on Usability and Security Features of the Android Pattern Lock Screen,” Information and computer security, vol. 24, iss. 1, p. 53–72, 2016.
    [Bibtex]
    @article{andriotis_study_2016,
    title = {A {Study} on {Usability} and {Security} {Features} of the {Android} {Pattern} {Lock} {Screen}},
    volume = {24},
    number = {1},
    journal = {Information and Computer Security},
    author = {Andriotis, P. and Oikonomou, G. and Mylonas, A. and Tryfonas, T.},
    year = {2016},
    pages = {53--72},
    }
  • N. E. Petroulakis, G. Spanoudakis, I. G. Askoxylakis, A. Miaoudakis, and A. Tragantis, “A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems,” in Proceedings of the 2015 IEEE Global Communications Conference, 2016, p. 1–6.
    [Bibtex]
    @inproceedings{petroulakis_pattern-based_2016,
    title = {A {Pattern}-{Based} {Approach} for {Designing} {Reliable} {Cyber}-{Physical} {Systems}},
    booktitle = {Proceedings of the 2015 {IEEE} {Global} {Communications} {Conference}},
    author = {Petroulakis, N. E. and Spanoudakis, G. and Askoxylakis, I. G. and Miaoudakis, A. and Tragantis, A.},
    year = {2016},
    pages = {1--6},
    }
  • S. A. Medesidou, D. Vardalis, and V. Katos, “Automated Key Exchange Protocol Evaluation in Delay Tolerant Networks,” Computers & security, vol. 59, p. 1–8, 2016.
    [Bibtex]
    @article{medesidou_automated_2016,
    title = {Automated {Key} {Exchange} {Protocol} {Evaluation} in {Delay} {Tolerant} {Networks}},
    volume = {59},
    journal = {Computers \& Security},
    author = {Medesidou, S. A. and Vardalis, D. and Katos, V.},
    year = {2016},
    pages = {1--8},
    }
  • S. Medesidou and V. Katos, “Opportunistic Key Management in Delay Tolerant Networks,” International journal of information and computer security, 2016.
    [Bibtex]
    @article{medesidou_opportunistic_2016,
    title = {Opportunistic {Key} {Management} in {Delay} {Tolerant} {Networks}},
    journal = {International Journal of Information and Computer Security},
    author = {Medesidou, S. and Katos, V.},
    year = {2016},
    }

2015

  • E. Apeh, C. Richardson, and T. Curran, “Monitoring Social Media for Cyber-stalking,” Cyber security review, vol. Spring, p. 67–74, 2015.
    [Bibtex]
    @article{apeh_monitoring_2015,
    title = {Monitoring {Social} {Media} for {Cyber}-stalking},
    volume = {Spring},
    journal = {Cyber Security Review},
    author = {Apeh, E. and Richardson, C. and Curran, T.},
    year = {2015},
    pages = {67--74},
    }
  • P. Palmieri, “Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks,” in Information and Communications Security – 17th International Conference (ICICS 2015), 2015, p. 436–444.
    [Bibtex]
    @inproceedings{palmieri_preserving_2015,
    title = {Preserving {Context} {Privacy} in {Distributed} {Hash} {Table} {Wireless} {Sensor} {Networks}},
    booktitle = {Information and {Communications} {Security} - 17th {International} {Conference} ({ICICS} 2015)},
    publisher = {Springer},
    author = {Palmieri, Paolo},
    year = {2015},
    pages = {436--444},
    }
  • N. Jiang and H. Dogan, “A Gesture-based CAPTCHA Design Supporting Mobile Devices,” in Proceedings of the 2015 British HCI Conference, 2015, p. 202–207.
    [Bibtex]
    @inproceedings{jiang_gesture-based_2015,
    series = {British {HCI} '15},
    title = {A {Gesture}-based {CAPTCHA} {Design} {Supporting} {Mobile} {Devices}},
    booktitle = {Proceedings of the 2015 {British} {HCI} {Conference}},
    publisher = {ACM},
    author = {Jiang, Nan and Dogan, Huseyin},
    year = {2015},
    pages = {202--207},
    }
  • I. Tsimperidis, V. Katos, and N. Clarke, “Language-independent gender identification through keystroke analysis,” Information and computer security, vol. 23, iss. 3, p. 286–301, 2015.
    [Bibtex]
    @article{tsimperidis_language-independent_2015,
    title = {Language-independent gender identification through keystroke analysis},
    volume = {23},
    number = {3},
    journal = {Information and Computer Security},
    author = {Tsimperidis, Ioannis and Katos, Vasilios and Clarke, Nathan},
    year = {2015},
    pages = {286--301},
    }
  • I. Psaroudakis, V. Katos, and P. S. Efraimidis, “A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network,” Security and communication networks, vol. 8, iss. 3, p. 486–500, 2015.
    [Bibtex]
    @article{psaroudakis_novel_2015,
    title = {A novel mechanism for anonymizing {Global} {System} for {Mobile} {Communications} calls using a resource-based {Session} {Initiation} {Protocol} community network},
    volume = {8},
    number = {3},
    journal = {Security and Communication Networks},
    author = {Psaroudakis, Ioannis and Katos, Vasilios and Efraimidis, Pavlos S.},
    year = {2015},
    pages = {486--500},
    }
  • M. Tsavli, P. S. Efraimidis, V. Katos, and L. Mitrou, “Reengineering the user: privacy concerns about personal data on smartphones,” Information and computer security, vol. 23, iss. 4, p. 394–405, 2015.
    [Bibtex]
    @article{tsavli_reengineering_2015,
    title = {Reengineering the user: privacy concerns about personal data on smartphones},
    volume = {23},
    number = {4},
    journal = {Information and Computer Security},
    author = {Tsavli, Matina and Efraimidis, Pavlos S. and Katos, Vasilios and Mitrou, Lilian},
    year = {2015},
    pages = {394--405},
    }
  • A. Tasidou, Y. Soupionis, P. Efraimidis, L. Mitrou, and V. Katos, “Privacy-preserving, User-centric VOIP CAPTCHA Challenges: an Integrated Solution in the SIP Environment,” Information and computer security, 2015.
    [Bibtex]
    @article{tasidou_privacy-preserving_2015,
    title = {Privacy-preserving, {User}-centric {VOIP} {CAPTCHA} {Challenges}: an {Integrated} {Solution} in the {SIP} {Environment}},
    journal = {Information and Computer Security},
    author = {Tasidou, A. and Soupionis, Y. and Efraimidis, P. and Mitrou, L. and Katos, V.},
    year = {2015},
    }
  • P. Palmieri and J. A. Pouwelse, “Paying the Guard: An Entry-Guard-Based Payment System for Tor,” in Financial Cryptography and Data Security – 19th International Conference, FC 2015, 2015, p. 437–444.
    [Bibtex]
    @inproceedings{palmieri_paying_2015,
    title = {Paying the {Guard}: {An} {Entry}-{Guard}-{Based} {Payment} {System} for {Tor}},
    url = {http://dx.doi.org/10.1007/978-3-662-47854-7_26},
    booktitle = {Financial {Cryptography} and {Data} {Security} - 19th {International} {Conference}, {FC} 2015},
    author = {Palmieri, Paolo and Pouwelse, Johan A.},
    year = {2015},
    pages = {437--444},
    }
  • L. Calderoni, P. Palmieri, and D. Maio, “Location privacy without mutual trust: The spatial Bloom filter,” Computer communications, vol. 68, p. 4–16, 2015.
    [Bibtex]
    @article{calderoni_location_2015,
    title = {Location privacy without mutual trust: {The} spatial {Bloom} filter},
    volume = {68},
    url = {http://dx.doi.org/10.1016/j.comcom.2015.06.011},
    journal = {Computer Communications},
    author = {Calderoni, Luca and Palmieri, Paolo and Maio, Dario},
    year = {2015},
    pages = {4--16},
    }
  • R. Ali, J. McAlaney, S. Faily, K. Phalp, and V. Katos, “Mitigating Circumstances in Cybercrime: A Position Paper,” in Proceedings of the 3rd International Workshop on Cybercrime and Emerging Web Environments, 2015.
    [Bibtex]
    @inproceedings{ali_mitigating_2015,
    title = {Mitigating {Circumstances} in {Cybercrime}: {A} {Position} {Paper}},
    booktitle = {Proceedings of the 3rd {International} {Workshop} on {Cybercrime} and {Emerging} {Web} {Environments}},
    publisher = {IEEE},
    author = {Ali, Raian and McAlaney, John and Faily, Shamal and Phalp, Keith and Katos, Vasilos},
    year = {2015},
    }
  • A. Vallindras and S. Faily, “The Mystery of Security Design,” in Proceedings of the 2015 British Human Computer Interaction Conference, 2015, p. 316–317.
    [Bibtex]
    @inproceedings{vallindras_mystery_2015,
    title = {The {Mystery} of {Security} {Design}},
    booktitle = {Proceedings of the 2015 {British} {Human} {Computer} {Interaction} {Conference}},
    publisher = {ACM},
    author = {Vallindras, Antonios and Faily, Shamal},
    year = {2015},
    pages = {316--317},
    }
  • S. Faily and M. Jones, “Embedding Professional Practice into the Cybersecurity Curriculum using Ethics,” in Proceedings of the 1st UK Workshop on Cybersecurity Training & Education, 2015.
    [Bibtex]
    @inproceedings{faily_embedding_2015,
    title = {Embedding {Professional} {Practice} into the {Cybersecurity} {Curriculum} using {Ethics}},
    booktitle = {Proceedings of the 1st {UK} {Workshop} on {Cybersecurity} {Training} \& {Education}},
    author = {Faily, Shamal and Jones, Michael},
    year = {2015},
    }
  • S. Faily, J. McAlaney, and C. Iacob, “Ethical Dilemmas and Dimensions in Penetration Testing,” in Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015), 2015, p. 233–242.
    [Bibtex]
    @inproceedings{faily_ethical_2015,
    title = {Ethical {Dilemmas} and {Dimensions} in {Penetration} {Testing}},
    booktitle = {Proceedings of the 9th {International} {Symposium} on {Human} {Aspects} of {Information} {Security} \& {Assurance} ({HAISA} 2015)},
    publisher = {University of Plymouth},
    author = {Faily, Shamal and McAlaney, John and Iacob, Claudia},
    year = {2015},
    pages = {233--242},
    }
  • N. McDonald, S. Faily, M. Favale, and C. Gatzidis, “Digital Rights Management: The Four Perspectives of Developers, Distributors, Users, and Lawyers,” in Proceedings of the 9th International Symposium on Human Aspects on Information Security & Assurance (HAISA 2015), 2015, p. 276–285.
    [Bibtex]
    @inproceedings{mcdonald_digital_2015,
    title = {Digital {Rights} {Management}: {The} {Four} {Perspectives} of {Developers}, {Distributors}, {Users}, and {Lawyers}},
    booktitle = {Proceedings of the 9th {International} {Symposium} on {Human} {Aspects} on {Information} {Security} \& {Assurance} ({HAISA} 2015)},
    publisher = {University of Plymouth},
    author = {McDonald, Neil and Faily, Shamal and Favale, Marcella and Gatzidis, Christos},
    year = {2015},
    pages = {276--285},
    }
  • S. Faily, “Engaging Stakeholders during Late Stage Security Design with Assumption Personas,” Information and computer security, vol. 23, iss. 4, p. 435–446, 2015.
    [Bibtex]
    @article{faily_engaging_2015,
    title = {Engaging {Stakeholders} during {Late} {Stage} {Security} {Design} with {Assumption} {Personas}},
    volume = {23},
    number = {4},
    journal = {Information and Computer Security},
    author = {Faily, Shamal},
    year = {2015},
    pages = {435--446},
    }
  • J. McAlaney, J. Taylor, and S. Faily, “The Social Psychology of Cybersecurity,” in Proceedings of the 1st International Conference on Cyber Security for Sustainable Society, 2015.
    [Bibtex]
    @inproceedings{mcalaney_social_2015,
    title = {The {Social} {Psychology} of {Cybersecurity}},
    booktitle = {Proceedings of the 1st {International} {Conference} on {Cyber} {Security} for {Sustainable} {Society}},
    publisher = {Working Papers of the SSN+},
    author = {McAlaney, John and Taylor, Jacqui and Faily, Shamal},
    year = {2015},
    }
  • S. Faily, J. Lyle, I. Fléchais, and A. Simpson, “Usability and Security by Design: A Case Study in Research and Development,” in Proceedings of the NDSS Workshop on Usable Security, 2015.
    [Bibtex]
    @inproceedings{faily_usability_2015,
    title = {Usability and {Security} by {Design}: {A} {Case} {Study} in {Research} and {Development}},
    booktitle = {Proceedings of the {NDSS} {Workshop} on {Usable} {Security}},
    publisher = {Internet Society},
    author = {Faily, Shamal and Lyle, John and Fléchais, Ivan and Simpson, Andrew},
    year = {2015},
    }

2014

  • I. Psaroudakis, V. Katos, P. Saragiotis, and L. Mitrou, “A Method for Forensic Artefact Collection, Analysis and Incident Response in Environments Running Session Initiation Protocol and Session Description Protocol,” International journal of electronic security and digital forensics, vol. 6, iss. 4, p. 241–267, 2014.
    [Bibtex]
    @article{psaroudakis_method_2014,
    title = {A {Method} for {Forensic} {Artefact} {Collection}, {Analysis} and {Incident} {Response} in {Environments} {Running} {Session} {Initiation} {Protocol} and {Session} {Description} {Protocol}},
    volume = {6},
    number = {4},
    journal = {International Journal of Electronic Security and Digital Forensics},
    author = {Psaroudakis, Ioannis and Katos, Vasilios and Saragiotis, Panagiotis and Mitrou, Lilian},
    month = nov,
    year = {2014},
    pages = {241--267},
    }
  • C. Tsochatridou, A. Arampatzis, and V. Katos, “Improving Digital Forensics Through Data Mining,” in Proceedings of the 4th International Conference on Advances in Information Mining and Management, 2014, p. 20–25.
    [Bibtex]
    @inproceedings{tsochatridou_improving_2014,
    title = {Improving {Digital} {Forensics} {Through} {Data} {Mining}},
    booktitle = {Proceedings of the 4th {International} {Conference} on {Advances} in {Information} {Mining} and {Management}},
    author = {Tsochatridou, C. and Arampatzis, A. and Katos, V.},
    year = {2014},
    pages = {20--25},
    }
  • M. Tavli, P. Efraimidis, and V. Katos, “Reengineering the user: Privacy concerns about personal data on smartphones,” in Proceedings of the 8th International Symposium on Human Aspects of Information Security & Assurance, 2014, p. 80–89.
    [Bibtex]
    @inproceedings{tavli_reengineering_2014,
    title = {Reengineering the user: {Privacy} concerns about personal data on smartphones},
    booktitle = {Proceedings of the 8th {International} {Symposium} on {Human} {Aspects} of {Information} {Security} \& {Assurance}},
    publisher = {Plymouth University},
    author = {Tavli, M. and Efraimidis, P. and Katos, V.},
    year = {2014},
    pages = {80--89},
    }
  • M. Sadok, V. Katos, and P. Bednar, “Developing contextual understanding of information security risks,” in Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014), 2014, p. 1–10.
    [Bibtex]
    @inproceedings{sadok_developing_2014,
    title = {Developing contextual understanding of information security risks},
    booktitle = {Proceedings of the {Eighth} {International} {Symposium} on {Human} {Aspects} of {Information} {Security} \& {Assurance} ({HAISA} 2014)},
    publisher = {Plymouth University},
    author = {Sadok, Moufida and Katos, Vasilios and Bednar, Peter},
    editor = {Clarke, Nathan and Furnell, Steven},
    year = {2014},
    pages = {1--10},
    }
  • [DOI] P. Palmieri and J. A. Pouwelse, “Key Management for Onion Routing in a True Peer to Peer Setting,” in Advances in Information and Computer Security – 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings, 2014, p. 62–71.
    [Bibtex]
    @inproceedings{palmieri_key_2014,
    title = {Key {Management} for {Onion} {Routing} in a {True} {Peer} to {Peer} {Setting}},
    doi = {10.1007/978-3-319-09843-2_5},
    booktitle = {Advances in {Information} and {Computer} {Security} - 9th {International} {Workshop} on {Security}, {IWSEC} 2014, {Hirosaki}, {Japan}, {August} 27-29, 2014. {Proceedings}},
    author = {Palmieri, Paolo and Pouwelse, Johan A.},
    year = {2014},
    pages = {62--71},
    }
  • [DOI] P. Palmieri, L. Calderoni, and D. Maio, “Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications,” in Information Security and Cryptology – 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers, 2014, p. 16–36.
    [Bibtex]
    @inproceedings{palmieri_spatial_2014,
    title = {Spatial {Bloom} {Filters}: {Enabling} {Privacy} in {Location}-{Aware} {Applications}},
    doi = {10.1007/978-3-319-16745-9_2},
    booktitle = {Information {Security} and {Cryptology} - 10th {International} {Conference}, {Inscrypt} 2014, {Beijing}, {China}, {December} 13-15, 2014, {Revised} {Selected} {Papers}},
    author = {Palmieri, Paolo and Calderoni, Luca and Maio, Dario},
    year = {2014},
    pages = {16--36},
    }
  • G. Avoine, L. Calderoni, J. Delvaux, D. Maio, and P. Palmieri, “Passengers information in public transport and privacy: Can anonymous tickets prevent tracking?,” Int j. information management, vol. 34, iss. 5, p. 682–688, 2014.
    [Bibtex]
    @article{avoine_passengers_2014,
    title = {Passengers information in public transport and privacy: {Can} anonymous tickets prevent tracking?},
    volume = {34},
    url = {http://dx.doi.org/10.1016/j.ijinfomgt.2014.05.004},
    number = {5},
    journal = {Int J. Information Management},
    author = {Avoine, Gildas and Calderoni, Luca and Delvaux, Jonathan and Maio, Dario and Palmieri, Paolo},
    year = {2014},
    pages = {682--688},
    }
  • S. Gaitan, L. Calderoni, P. Palmieri, M. -C. Ten Veldhuis, D. Maio, and M. B. van Riemsdijk, “From Sensing to Action: Quick and Reliable Access to Information in Cities Vulnerable to Heavy Rain,” Sensors journal, ieee, vol. 14, iss. 12, p. 4175–4184, 2014.
    [Bibtex]
    @article{gaitan_sensing_2014,
    title = {From {Sensing} to {Action}: {Quick} and {Reliable} {Access} to {Information} in {Cities} {Vulnerable} to {Heavy} {Rain}},
    volume = {14},
    url = {http://dx.doi.org/10.1109/JSEN.2014.2354980},
    number = {12},
    journal = {Sensors Journal, IEEE},
    author = {Gaitan, S. and Calderoni, L. and Palmieri, P. and Ten Veldhuis, M.-C. and Maio, D. and van Riemsdijk, M.B.},
    month = dec,
    year = {2014},
    pages = {4175--4184},
    }
  • S. Faily and I. Fléchais, “Eliciting and Visualising Trust Expectations using Persona Trust Characteristics and Goal Models,” in Proceedings of the 6th International Workshop on Social Software Engineering, 2014, p. 17–24.
    [Bibtex]
    @inproceedings{faily_eliciting_2014,
    title = {Eliciting and {Visualising} {Trust} {Expectations} using {Persona} {Trust} {Characteristics} and {Goal} {Models}},
    booktitle = {Proceedings of the 6th {International} {Workshop} on {Social} {Software} {Engineering}},
    publisher = {ACM},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2014},
    pages = {17--24},
    }
  • S. Faily, “Ethical Hacking Assessment as a Vehicle for Undergraduate Cybersecurity Education,” in Processing of the BCS 19th Annual INSPIRE Conference, 2014.
    [Bibtex]
    @inproceedings{faily_ethical_2014,
    title = {Ethical {Hacking} {Assessment} as a {Vehicle} for {Undergraduate} {Cybersecurity} {Education}},
    booktitle = {Processing of the {BCS} 19th {Annual} {INSPIRE} {Conference}},
    author = {Faily, Shamal},
    year = {2014},
    }
  • S. Faily, “Engaging Stakeholders in Security Design: An Assumption-Driven Approach,” in Proceedings of the 8th International Symposium on Human Aspects of Information Security & Assurance, 2014, p. 21–29.
    [Bibtex]
    @inproceedings{faily_engaging_2014,
    title = {Engaging {Stakeholders} in {Security} {Design}: {An} {Assumption}-{Driven} {Approach}},
    booktitle = {Proceedings of the 8th {International} {Symposium} on {Human} {Aspects} of {Information} {Security} \& {Assurance}},
    publisher = {University of Plymouth},
    author = {Faily, Shamal},
    year = {2014},
    pages = {21--29},
    }
  • S. Faily, J. Lyle, I. Fléchais, A. Atzeni, C. Cameroni, H. Myrhaug, A. Göker, and R. Kleinfeld, “Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework,” in Proceedings of the 28th British HCI Group Annual Conference on People and Computers: Sand, sea and Sky, 2014.
    [Bibtex]
    @inproceedings{faily_authorisation_2014,
    title = {Authorisation in {Context}: {Incorporating} {Context}-{Sensitivity} into an {Access} {Control} {Framework}},
    booktitle = {Proceedings of the 28th {British} {HCI} {Group} {Annual} {Conference} on {People} and {Computers}: {Sand}, sea and {Sky}},
    publisher = {British Computer Society},
    author = {Faily, Shamal and Lyle, John and Fléchais, Ivan and Atzeni, Andrea and Cameroni, Cesare and Myrhaug, Hans and Göker, Ayse and Kleinfeld, Robert},
    year = {2014},
    }
  • S. Faily, S. Parkin, and J. Lyle, “Evaluating the Implications of Attack and Security Patterns with Premortems,” in Cyberpatterns – Unifying Design Patterns with Security, Attack and Forensic Patterns, Springer, 2014, p. 199–209.
    [Bibtex]
    @incollection{faily_evaluating_2014,
    title = {Evaluating the {Implications} of {Attack} and {Security} {Patterns} with {Premortems}},
    booktitle = {Cyberpatterns - {Unifying} {Design} {Patterns} with {Security}, {Attack} and {Forensic} {Patterns}},
    publisher = {Springer},
    author = {Faily, Shamal and Parkin, Simon and Lyle, John},
    year = {2014},
    pages = {199--209},
    }
  • K. Beckers, S. Faily, S. Lee, and N. Mead, Proceedings of the 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE ’14), IEEE, 2014.
    [Bibtex]
    @book{beckers_proceedings_2014,
    title = {Proceedings of the 1st {International} {Workshop} on {Evolving} {Security} and {Privacy} {Requirements} {Engineering} ({ESPRE} '14)},
    publisher = {IEEE},
    author = {Beckers, Kristan and Faily, Shamal and Lee, Seok-Won and Mead, Nancy},
    year = {2014},
    }

2013

  • N. Jiang and F. Tian, “A Novel Gesture-based CAPTCHA Design for Smart Devices,” in Proceedings of the 27th International BCS Human Computer Interaction Conference, 2013, p. 49:1–49:5.
    [Bibtex]
    @inproceedings{jiang_novel_2013,
    series = {{BCS}-{HCI} '13},
    title = {A {Novel} {Gesture}-based {CAPTCHA} {Design} for {Smart} {Devices}},
    booktitle = {Proceedings of the 27th {International} {BCS} {Human} {Computer} {Interaction} {Conference}},
    publisher = {British Computer Society},
    author = {Jiang, Nan and Tian, Feng},
    year = {2013},
    pages = {49:1--49:5},
    }
  • V. Katos, F. Stowell, and P. Bednar, “Macroeconomics of privacy and security for identity management and surveillance,” Kybernetes, vol. 42, iss. 1, p. 140–163, 2013.
    [Bibtex]
    @article{katos_macroeconomics_2013,
    title = {Macroeconomics of privacy and security for identity management and surveillance},
    volume = {42},
    number = {1},
    journal = {Kybernetes},
    author = {Katos, Vasilios and Stowell, Frank and Bednar, Peter},
    year = {2013},
    pages = {140--163},
    }
  • S. Shiaeles, A. Chryssanthou, and V. Katos, “On-scene triage open source forensic tool chests: Are they effective?,” Digital investigation, vol. 10, iss. 2, p. 99 – 115, 2013.
    [Bibtex]
    @article{shiaeles_-scene_2013,
    title = {On-scene triage open source forensic tool chests: {Are} they effective?},
    volume = {10},
    number = {2},
    journal = {Digital Investigation},
    author = {Shiaeles, Stavros and Chryssanthou, Anargyros and Katos, Vasilios},
    year = {2013},
    pages = {99 -- 115},
    }
  • A. Provataki and V. Katos, “Differential malware forensics,” Digital investigation, vol. 10, iss. 4, p. 311 – 322, 2013.
    [Bibtex]
    @article{provataki_differential_2013,
    title = {Differential malware forensics},
    volume = {10},
    number = {4},
    journal = {Digital Investigation},
    author = {Provataki, Athina and Katos, Vasilios},
    year = {2013},
    pages = {311 -- 322},
    }
  • K. Barmpatsalou, D. Damopoulos, G. Kambourakis, and V. Katos, “A critical review of 7 years of Mobile Device Forensics,” Digital investigation, vol. 10, iss. 4, p. 323 – 349, 2013.
    [Bibtex]
    @article{barmpatsalou_critical_2013,
    title = {A critical review of 7 years of {Mobile} {Device} {Forensics}},
    volume = {10},
    number = {4},
    journal = {Digital Investigation},
    author = {Barmpatsalou, Konstantia and Damopoulos, Dimitrios and Kambourakis, Georgios and Katos, Vasilios},
    year = {2013},
    pages = {323 -- 349},
    }
  • S. Furnell, N. Clarke, and V. Katos, Proceedings of the European Information Security Multi-Conference, Plymouth University, 2013.
    [Bibtex]
    @book{furnell_proceedings_2013,
    title = {Proceedings of the {European} {Information} {Security} {Multi}-{Conference}},
    publisher = {Plymouth University},
    author = {Furnell, S. and Clarke, N. and Katos, V.},
    year = {2013},
    }
  • P. Bednar, M. Sadok, and V. Katos, “Contextual dependencies in information security systems,” in AIS SIGSEC and IFIP TC 11.1 Workshop on Information Security & Privacy, 2013.
    [Bibtex]
    @inproceedings{bednar_contextual_2013,
    title = {Contextual dependencies in information security systems},
    booktitle = {{AIS} {SIGSEC} and {IFIP} {TC} 11.1 {Workshop} on {Information} {Security} \& {Privacy}},
    author = {Bednar, P. and Sadok, M. and Katos, V.},
    year = {2013},
    }
  • I. Tsimperidis and V. Katos, “Keystroke Forensics: Are You Typing on a Desktop or a Laptop?,” in Proceedings of the 6th Balkan Conference in Informatics, 2013, p. 89–94.
    [Bibtex]
    @inproceedings{tsimperidis_keystroke_2013,
    series = {{BCI} '13},
    title = {Keystroke {Forensics}: {Are} {You} {Typing} on a {Desktop} or a {Laptop}?},
    booktitle = {Proceedings of the 6th {Balkan} {Conference} in {Informatics}},
    publisher = {ACM},
    author = {Tsimperidis, Ioannis and Katos, Vasilios},
    year = {2013},
    pages = {89--94},
    }
  • D. Gritzalis, Y. Soupionis, V. Katos, I. Psaroudakis, P. Katsaros, and A. Mentis, “The Sphinx enigma in critical VoIP infrastructures: Human or botnet?,” in Information, Intelligence, Systems and Applications (IISA), 2013 Fourth International Conference on, 2013, p. 1–6.
    [Bibtex]
    @inproceedings{gritzalis_sphinx_2013,
    title = {The {Sphinx} enigma in critical {VoIP} infrastructures: {Human} or botnet?},
    booktitle = {Information, {Intelligence}, {Systems} and {Applications} ({IISA}), 2013 {Fourth} {International} {Conference} on},
    author = {Gritzalis, D. and Soupionis, Y. and Katos, V. and Psaroudakis, I. and Katsaros, P. and Mentis, A.},
    year = {2013},
    pages = {1--6},
    }
  • N. Zeilemaker, Z. Erkin, P. Palmieri, and J. A. Pouwelse, “Building a privacy-preserving semantic overlay for Peer-to-Peer networks,” in WIFS, 2013, p. 79–84.
    [Bibtex]
    @inproceedings{zeilemaker_building_2013,
    title = {Building a privacy-preserving semantic overlay for {Peer}-to-{Peer} networks},
    booktitle = {{WIFS}},
    author = {Zeilemaker, Niels and Erkin, Zekeriya and Palmieri, Paolo and Pouwelse, Johan A.},
    year = {2013},
    pages = {79--84},
    }
  • P. Palmieri and O. Pereira, “Unconditionally Secure Oblivious Transfer from Real Network Behavior,” in IWSEC, 2013, p. 168–182.
    [Bibtex]
    @inproceedings{palmieri_unconditionally_2013,
    title = {Unconditionally {Secure} {Oblivious} {Transfer} from {Real} {Network} {Behavior}},
    booktitle = {{IWSEC}},
    author = {Palmieri, Paolo and Pereira, Olivier},
    year = {2013},
    pages = {168--182},
    }
  • S. Faily, D. Power, P. Armstrong, and I. Fléchais, “Formal Evaluation of Persona Trustworthiness with EUSTACE (Extended Abstract),” in Proceedings of the 6th International Conference on Trust & Trustworthy Computing, 2013, p. 267–268.
    [Bibtex]
    @inproceedings{faily_formal_2013,
    title = {Formal {Evaluation} of {Persona} {Trustworthiness} with {EUSTACE} ({Extended} {Abstract})},
    booktitle = {Proceedings of the 6th {International} {Conference} on {Trust} \& {Trustworthy} {Computing}},
    publisher = {Springer},
    author = {Faily, Shamal and Power, David and Armstrong, Philip and Fléchais, Ivan},
    year = {2013},
    pages = {267--268},
    }
  • S. Faily and J. Lyle, “Security Lessons Learned Building Concept Apps for webinos,” in Human Aspects in Mobile Apps Engineering: Workshop at British HCI 2013, 2013.
    [Bibtex]
    @inproceedings{faily_security_2013,
    title = {Security {Lessons} {Learned} {Building} {Concept} {Apps} for webinos},
    booktitle = {Human {Aspects} in {Mobile} {Apps} {Engineering}: {Workshop} at {British} {HCI} 2013},
    author = {Faily, Shamal and Lyle, John},
    year = {2013},
    }
  • J. Lyle, A. Paverd, J. King-Lacroix, A. Atzeni, H. Virji, I. Fléchais, and S. Faily, “Personal PKI for the smart device era,” in Public Key Infrastructures, Services and Applications (EuroPKI 2012), 2013, p. 69–84.
    [Bibtex]
    @inproceedings{lyle_personal_2013,
    title = {Personal {PKI} for the smart device era},
    booktitle = {Public {Key} {Infrastructures}, {Services} and {Applications} ({EuroPKI} 2012)},
    publisher = {Springer},
    author = {Lyle, John and Paverd, Andrew and King-Lacroix, Justin and Atzeni, Andrea and Virji, Habib and Fléchais, Ivan and Faily, Shamal},
    year = {2013},
    pages = {69--84},
    }
  • J. Lyle, C. Nilsson, A. Isberg, and S. Faily, “Extending the web to support personal network services,” in Proceedings of the 28th ACM Symposium on Applied Computing, 2013, p. 711–716.
    [Bibtex]
    @inproceedings{lyle_extending_2013,
    title = {Extending the web to support personal network services},
    booktitle = {Proceedings of the 28th {ACM} {Symposium} on {Applied} {Computing}},
    publisher = {ACM},
    author = {Lyle, John and Nilsson, Claes and Isberg, Anders and Faily, Shamal},
    year = {2013},
    pages = {711--716},
    }
  • S. Faily, L. Coles-Kemp, P. Dunphy, M. Just, Y. Akama, and A. De Luca, “Designing Interactive Secure Systems: CHI 2013 Special Interest Group,” in CHI ’13 Extended Abstracts on Human Factors in Computing Systems, 2013, p. 2469–2472.
    [Bibtex]
    @inproceedings{faily_designing_2013,
    title = {Designing {Interactive} {Secure} {Systems}: {CHI} 2013 {Special} {Interest} {Group}},
    booktitle = {{CHI} '13 {Extended} {Abstracts} on {Human} {Factors} in {Computing} {Systems}},
    publisher = {ACM},
    author = {Faily, Shamal and Coles-Kemp, Lizzie and Dunphy, Paul and Just, Mike and Akama, Yoko and De Luca, Alexander},
    year = {2013},
    pages = {2469--2472},
    }
  • S. Faily and J. Lyle, “Guidelines for Integrating Personas into Software Engineering Tools,” in Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems, 2013, p. 69–74.
    [Bibtex]
    @inproceedings{faily_guidelines_2013,
    series = {{EICS} '13},
    title = {Guidelines for {Integrating} {Personas} into {Software} {Engineering} {Tools}},
    booktitle = {Proceedings of the 5th {ACM} {SIGCHI} symposium on {Engineering} interactive computing systems},
    publisher = {ACM},
    author = {Faily, Shamal and Lyle, John},
    year = {2013},
    pages = {69--74},
    }
  • T. Su, J. Lyle, A. Atzeni, S. Faily, H. Virji, C. Ntanos, and C. Botsikas, “Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project,” in Proceedings of the 9th International Haifa Verification Conference, 2013, p. 145–150.
    [Bibtex]
    @inproceedings{su_continuous_2013,
    title = {Continuous {Integration} for {Web}-{Based} {Software} {Infrastructures}: {Lessons} {Learned} on the webinos {Project}},
    booktitle = {Proceedings of the 9th {International} {Haifa} {Verification} {Conference}},
    publisher = {Springer},
    author = {Su, Tao and Lyle, John and Atzeni, Andrea and Faily, Shamal and Virji, Habib and Ntanos, Christos and Botsikas, Christos},
    year = {2013},
    pages = {145--150},
    }
  • C. Iacob, R. Harrison, and S. Faily, “Online Reviews as First Class Artifacts in Mobile App Development,” in Proceedings of the 5th International Conference on Mobile Computing, Applications, and Services (MobiCASE), 2013, p. 47–53.
    [Bibtex]
    @inproceedings{iacob_online_2013,
    title = {Online {Reviews} as {First} {Class} {Artifacts} in {Mobile} {App} {Development}},
    booktitle = {Proceedings of the 5th {International} {Conference} on {Mobile} {Computing}, {Applications}, and {Services} ({MobiCASE})},
    publisher = {Springer},
    author = {Iacob, Claudia and Harrison, Rachel and Faily, Shamal},
    year = {2013},
    pages = {47--53},
    }
  • A. Atzeni, J. Lyle, and S. Faily, “Developing secure, unified multi-device and multi-domain platforms: A case study from the webinos project,” in Architectures and Protocols for Secure Information Technology, IGI Global, 2013, p. 310–333.
    [Bibtex]
    @incollection{atzeni_developing_2013,
    title = {Developing secure, unified multi-device and multi-domain platforms: {A} case study from the webinos project},
    booktitle = {Architectures and {Protocols} for {Secure} {Information} {Technology}},
    publisher = {IGI Global},
    author = {Atzeni, Andrea and Lyle, John and Faily, Shamal},
    year = {2013},
    pages = {310--333},
    }
  • J. Lyle, S. Faily, and M. Winandy, Proceedings of the Workshop on Web Applications and Secure Hardware (WASH ’13), CEUR Workshop Proceedings, 2013.
    [Bibtex]
    @book{lyle_proceedings_2013,
    title = {Proceedings of the {Workshop} on {Web} {Applications} and {Secure} {Hardware} ({WASH} '13)},
    publisher = {CEUR Workshop Proceedings},
    author = {Lyle, John and Faily, Shamal and Winandy, Marcus},
    year = {2013},
    }

2012

  • V. Katos, “An integrated model for online transactions: illuminating the black box,” Information management & computer security, vol. 20, iss. 3, p. 184–206, 2012.
    [Bibtex]
    @article{katos_integrated_2012,
    title = {An integrated model for online transactions: illuminating the black box},
    volume = {20},
    number = {3},
    journal = {Information Management \& Computer Security},
    author = {Katos, Vasilios},
    year = {2012},
    pages = {184--206},
    }
  • S. Karayianni, V. Katos, and C. K. Georgiadis, “A framework for password harvesting from volatile memory,” International journal of electronic security and digital forensics, vol. 4, iss. 2/3, p. 154–163, 2012.
    [Bibtex]
    @article{karayianni_framework_2012,
    title = {A framework for password harvesting from volatile memory},
    volume = {4},
    number = {2/3},
    journal = {International Journal of Electronic Security and Digital Forensics},
    author = {Karayianni, Stavroula and Katos, Vasilios and Georgiadis, Christos K.},
    year = {2012},
    pages = {154--163},
    }
  • S. N. Shiaeles, V. Katos, A. S. Karakos, and B. K. Papadopoulos, “Real time \DDoS\ detection using fuzzy estimators,” Computers & security, vol. 31, iss. 6, p. 782 – 790, 2012.
    [Bibtex]
    @article{shiaeles_real_2012,
    title = {Real time \{{DDoS}\} detection using fuzzy estimators},
    volume = {31},
    number = {6},
    journal = {Computers \& Security},
    author = {Shiaeles, Stavros N. and Katos, Vasilios and Karakos, Alexandros S. and Papadopoulos, Basil K.},
    year = {2012},
    pages = {782 -- 790},
    }
  • A. M. Varka and V. Katos, “On the User Acceptance of Graphical Passwords,” in Proceedings of the 6th International Symposium on Human Aspects of Information Security & Assurance, 2012, p. 150–159.
    [Bibtex]
    @inproceedings{varka_user_2012,
    title = {On the {User} {Acceptance} of {Graphical} {Passwords}},
    booktitle = {Proceedings of the 6th {International} {Symposium} on {Human} {Aspects} of {Information} {Security} \& {Assurance}},
    publisher = {Plymouth University},
    author = {Varka, A. M. and Katos, V.},
    year = {2012},
    pages = {150--159},
    }
  • A. Tasidou, P. S. Efraimidis, Y. Soupionis, L. Mitrou, and V. Katos, “User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges,” in Proceedings of the 6th International Symposium on Human Aspects of Information Security & Assurance, 2012, p. 139–149.
    [Bibtex]
    @inproceedings{tasidou_user-centric_2012,
    title = {User-centric, {Privacy}-{Preserving} {Adaptation} for {VoIP} {CAPTCHA} {Challenges}},
    booktitle = {Proceedings of the 6th {International} {Symposium} on {Human} {Aspects} of {Information} {Security} \& {Assurance}},
    author = {Tasidou, A. and Efraimidis, P. S. and Soupionis, Y. and Mitrou, L. and Katos, V.},
    year = {2012},
    pages = {139--149},
    }
  • S. Menesidou and V. Katos, “Authenticated Key Exchange (AKE) in Delay Tolerant Networks,” in Information Security and Privacy Research, D. Gritzalis, S. Furnell, and M. Theoharidou, Eds., Springer Berlin Heidelberg, 2012, vol. 376, p. 49–60.
    [Bibtex]
    @incollection{menesidou_authenticated_2012,
    series = {{IFIP} {Advances} in {Information} and {Communication} {Technology}},
    title = {Authenticated {Key} {Exchange} ({AKE}) in {Delay} {Tolerant} {Networks}},
    volume = {376},
    booktitle = {Information {Security} and {Privacy} {Research}},
    publisher = {Springer Berlin Heidelberg},
    author = {Menesidou, SofiaAnna and Katos, Vasilios},
    editor = {Gritzalis, Dimitris and Furnell, Steven and Theoharidou, Marianthi},
    year = {2012},
    pages = {49--60},
    }
  • I. Psaroudakis, V. Katos, and P. Efraimidis, “A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network,” in Information Security and Privacy Research, Springer Berlin Heidelberg, 2012, vol. 376, p. 543–548.
    [Bibtex]
    @incollection{psaroudakis_framework_2012,
    series = {{IFIP} {Advances} in {Information} and {Communication} {Technology}},
    title = {A {Framework} for {Anonymizing} {GSM} {Calls} over a {Smartphone} {VoIP} {Network}},
    volume = {376},
    booktitle = {Information {Security} and {Privacy} {Research}},
    publisher = {Springer Berlin Heidelberg},
    author = {Psaroudakis, Ioannis and Katos, Vasilios and Efraimidis, PavlosS.},
    year = {2012},
    pages = {543--548},
    }
  • N. Clarke, V. Katos, S. Menesidou, B. Ghita, and S. Furnell, “A Novel Security Architecture for a Space-Data DTN,” in Wired/Wireless Internet Communication, Springer Berlin Heidelberg, 2012, vol. 7277, p. 342–349.
    [Bibtex]
    @incollection{clarke_novel_2012,
    series = {Lecture {Notes} in {Computer} {Science}},
    title = {A {Novel} {Security} {Architecture} for a {Space}-{Data} {DTN}},
    volume = {7277},
    booktitle = {Wired/{Wireless} {Internet} {Communication}},
    publisher = {Springer Berlin Heidelberg},
    author = {Clarke, NathanL. and Katos, Vasilis and Menesidou, Sofia-Anna and Ghita, Bogdan and Furnell, Steven},
    year = {2012},
    pages = {342--349},
    }
  • S. Karayianni and V. Katos, “Practical Password Harvesting from Volatile Memory,” in Global Security, Safety and Sustainability & e-Democracy, Springer Berlin Heidelberg, 2012, vol. 99, p. 17–22.
    [Bibtex]
    @incollection{karayianni_practical_2012,
    series = {Lecture {Notes} of the {Institute} for {Computer} {Sciences}, {Social} {Informatics} and {Telecommunications} {Engineering}},
    title = {Practical {Password} {Harvesting} from {Volatile} {Memory}},
    volume = {99},
    booktitle = {Global {Security}, {Safety} and {Sustainability} \& e-{Democracy}},
    publisher = {Springer Berlin Heidelberg},
    author = {Karayianni, Stavroula and Katos, Vasilios},
    year = {2012},
    pages = {17--22},
    }
  • T. Spyridopoulos and V. Katos, “Data recovery strategies for cloud environments,” in Cybercrime and Cloud Forensics: Applications for Investigation Processes, IGI Global, 2012, p. 251–265.
    [Bibtex]
    @incollection{spyridopoulos_data_2012,
    title = {Data recovery strategies for cloud environments},
    booktitle = {Cybercrime and {Cloud} {Forensics}: {Applications} for {Investigation} {Processes}},
    publisher = {IGI Global},
    author = {Spyridopoulos, T. and Katos, V.},
    year = {2012},
    pages = {251--265},
    }
  • L. Calderoni, D. Maio, and P. Palmieri, “Location-aware Mobile Services for a Smart City: Design, Implementation and Deployment,” Jtaer, vol. 7, iss. 3, 2012.
    [Bibtex]
    @article{calderoni_location-aware_2012,
    title = {Location-aware {Mobile} {Services} for a {Smart} {City}: {Design}, {Implementation} and {Deployment}},
    volume = {7},
    number = {3},
    journal = {JTAER},
    author = {Calderoni, Luca and Maio, Dario and Palmieri, Paolo},
    year = {2012},
    }
  • C. Fuhrhop, J. Lyle, and S. Faily, “The webinos project,” in Proceedings of the 21st international conference companion on World Wide Web, 2012, p. 259–262.
    [Bibtex]
    @inproceedings{fuhrhop_webinos_2012,
    series = {{WWW} '12 {Companion}},
    title = {The webinos project},
    booktitle = {Proceedings of the 21st international conference companion on {World} {Wide} {Web}},
    publisher = {ACM},
    author = {Fuhrhop, Christian and Lyle, John and Faily, Shamal},
    year = {2012},
    pages = {259--262},
    }
  • S. Faily, “Analysing Chindogu: Applying Defamiliarisation to Security Design,” in Proceedings of the CHI 2012 Workshop on Defamiliarisation in Innovation and Usability, 2012.
    [Bibtex]
    @inproceedings{faily_analysing_2012,
    title = {Analysing {Chindogu}: {Applying} {Defamiliarisation} to {Security} {Design}},
    booktitle = {Proceedings of the {CHI} 2012 {Workshop} on {Defamiliarisation} in {Innovation} and {Usability}},
    author = {Faily, Shamal},
    year = {2012},
    }
  • S. Faily and I. Fléchais, “Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS,” in Designing Interactive Secure Systems: Workshop at British HCI 2012, 2012.
    [Bibtex]
    @inproceedings{faily_software_2012,
    title = {Software for {Interactive} {Secure} {Systems} {Design}: {Lessons} {Learned} {Developing} and {Applying} {CAIRIS}},
    booktitle = {Designing {Interactive} {Secure} {Systems}: {Workshop} at {British} {HCI} 2012},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2012},
    }
  • S. Faily, J. Lyle, and S. Parkin, “Tool-supported premortems with Attack and Security Patterns,” in Proceedings of the First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns, 2012, p. 10–11.
    [Bibtex]
    @inproceedings{faily_tool-supported_2012,
    title = {Tool-supported premortems with {Attack} and {Security} {Patterns}},
    booktitle = {Proceedings of the {First} {International} {Workshop} on {Cyberpatterns}: {Unifying} {Design} {Patterns} with {Security}, {Attack} and {Forensic} {Patterns}},
    author = {Faily, Shamal and Lyle, John and Parkin, Simon},
    year = {2012},
    pages = {10--11},
    }
  • S. Faily, “Security Patterns Considered Harmful?,” in Proceedings of the Second International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns, 2012, p. 108–109.
    [Bibtex]
    @inproceedings{faily_security_2012,
    title = {Security {Patterns} {Considered} {Harmful}?},
    booktitle = {Proceedings of the {Second} {International} {Workshop} on {Cyberpatterns}: {Unifying} {Design} {Patterns} with {Security}, {Attack} and {Forensic} {Patterns}},
    author = {Faily, Shamal},
    year = {2012},
    pages = {108--109},
    }
  • S. Faily, J. Lyle, and S. Parkin, “Secure Sytem? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems,” in Designing Interactive Secure Systems: Workshop at British HCI 2012, 2012.
    [Bibtex]
    @inproceedings{faily_secure_2012,
    title = {Secure {Sytem}? {Challenge} {Accepted}: {Finding} and {Resolving} {Security} {Failures} {Using} {Security} {Premortems}},
    booktitle = {Designing {Interactive} {Secure} {Systems}: {Workshop} at {British} {HCI} 2012},
    publisher = {British Computer Society},
    author = {Faily, Shamal and Lyle, John and Parkin, Simon},
    year = {2012},
    }
  • S. Faily, J. Lyle, C. Namiluko, A. Atzeni, and C. Cameroni, “Model-driven architectural risk analysis using architectural and contextualised attack patterns,” in Proceedings of the Workshop on Model-Driven Security, 2012, p. 3:1–3:6.
    [Bibtex]
    @inproceedings{faily_model-driven_2012,
    title = {Model-driven architectural risk analysis using architectural and contextualised attack patterns},
    booktitle = {Proceedings of the {Workshop} on {Model}-{Driven} {Security}},
    publisher = {ACM},
    author = {Faily, Shamal and Lyle, John and Namiluko, Cornelius and Atzeni, Andrea and Cameroni, Cesare},
    year = {2012},
    pages = {3:1--3:6},
    }
  • J. Lyle, S. Monteleone, S. Faily, D. Patti, and F. Ricciato, “Cross-plaform access control for mobile web applications,” in Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on, 2012, p. 37–44.
    [Bibtex]
    @inproceedings{lyle_cross-plaform_2012,
    title = {Cross-plaform access control for mobile web applications},
    booktitle = {Policies for {Distributed} {Systems} and {Networks} ({POLICY}), 2012 {IEEE} {International} {Symposium} on},
    publisher = {IEEE},
    author = {Lyle, John and Monteleone, Salvatore and Faily, Shamal and Patti, Davide and Ricciato, Fabio},
    year = {2012},
    pages = {37--44},
    }
  • J. Lyle, S. Faily, I. Fléchais, A. Paul, A. Göker, H. Myrhaug, H. Desruelle, and A. Martin, “On the design and development of webinos: a distributed mobile application middleware,” in Proceedings of the 12th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, 2012, p. 140–147.
    [Bibtex]
    @inproceedings{lyle_design_2012,
    title = {On the design and development of webinos: a distributed mobile application middleware},
    booktitle = {Proceedings of the 12th {IFIP} {WG} 6.1 {International} {Conference} on {Distributed} {Applications} and {Interoperable} {Systems}},
    publisher = {Springer},
    author = {Lyle, John and Faily, Shamal and Fléchais, Ivan and Paul, Andre and Göker, Ayse and Myrhaug, Hans and Desruelle, Heiko and Martin, Andrew},
    year = {2012},
    pages = {140--147},
    }
  • S. Faily, J. Lyle, A. Paul, A. Atzeni, D. Blomme, H. Desruelle, and K. Bangalore, “Requirements Sensemaking using Concept Maps,” in Proceedings of the 4th International Conference on Human-Centered Software Engineering, 2012, p. 217–232.
    [Bibtex]
    @inproceedings{faily_requirements_2012,
    title = {Requirements {Sensemaking} using {Concept} {Maps}},
    booktitle = {Proceedings of the 4th {International} {Conference} on {Human}-{Centered} {Software} {Engineering}},
    publisher = {Springer},
    author = {Faily, Shamal and Lyle, John and Paul, Andre and Atzeni, Andrea and Blomme, Dieter and Desruelle, Heiko and Bangalore, Krishna},
    year = {2012},
    pages = {217--232},
    }
  • S. Faily, I. Fléchais, and L. Coles-Kemp, Proceedings of Designing Interactive Secure Systems: Workshop at British HCI 2012 (DISS ’12), British Computer Society, 2012.
    [Bibtex]
    @book{faily_proceedings_2012,
    title = {Proceedings of {Designing} {Interactive} {Secure} {Systems}: {Workshop} at {British} {HCI} 2012 ({DISS} '12)},
    url = {http://ewic.bcs.org/content/ConWebDoc/48809},
    publisher = {British Computer Society},
    author = {Faily, Shamal and Fléchais, Ivan and Coles-Kemp, Lizzie},
    year = {2012},
    }

2011

  • R. E. Gunstone, “Integrating privacy during requirements capture for ubiquious computing,” in Proceedings of 1st International Conference on Social Eco-Informatics, 2011.
    [Bibtex]
    @inproceedings{gunstone_integrating_2011,
    title = {Integrating privacy during requirements capture for ubiquious computing},
    booktitle = {Proceedings of 1st {International} {Conference} on {Social} {Eco}-{Informatics}},
    author = {Gunstone, R. E.},
    year = {2011},
    }
  • R. Gunstone, “Use cases and their application to ubiquitous computing technologies,” in Proceedings of BCS Quality Specialist Group Annual International Software Quality Management Conference, 2011.
    [Bibtex]
    @inproceedings{gunstone_use_2011,
    title = {Use cases and their application to ubiquitous computing technologies},
    booktitle = {Proceedings of {BCS} {Quality} {Specialist} {Group} {Annual} {International} {Software} {Quality} {Management} {Conference}},
    author = {Gunstone, Richard},
    year = {2011},
    }
  • R. E. Gunstone, K. T. Phalp, and S. Jeary, “On the Application of Use Cases for Requirement Capture in Ubiquitous Computing Technologies,” in BCS Quality Specialist Group Annual International Software Quality Management SQM/INSPIRE Conference, 2011.
    [Bibtex]
    @inproceedings{gunstone_application_2011,
    title = {On the {Application} of {Use} {Cases} for {Requirement} {Capture} in {Ubiquitous} {Computing} {Technologies}},
    booktitle = {{BCS} {Quality} {Specialist} {Group} {Annual} {International} {Software} {Quality} {Management} {SQM}/{INSPIRE} {Conference}},
    author = {Gunstone, R. E. and Phalp, K. T. and Jeary, S.},
    year = {2011},
    }
  • A. Aggelis, E. T. Sarris, and V. Katos, “A location privacy extension for DVB-RCS,” Radioengineering, vol. 20, iss. 1, p. 151–158, 2011.
    [Bibtex]
    @article{aggelis_location_2011,
    title = {A location privacy extension for {DVB}-{RCS}},
    volume = {20},
    number = {1},
    journal = {Radioengineering},
    author = {Aggelis, A. and Sarris, E. T. and Katos, V.},
    year = {2011},
    pages = {151--158},
    }
  • T. Spyridopoulos and V. Katos, “Requirements for a Forensically Ready Cloud Storage Service,” International journal of digital crime and forensics, vol. 3, iss. 3, p. 19–36, 2011.
    [Bibtex]
    @article{spyridopoulos_requirements_2011,
    title = {Requirements for a {Forensically} {Ready} {Cloud} {Storage} {Service}},
    volume = {3},
    number = {3},
    journal = {International Journal of Digital Crime and Forensics},
    author = {Spyridopoulos, Theodoros and Katos, Vasilios},
    year = {2011},
    pages = {19--36},
    }
  • T. Spyridopoulos and V. Katos, “Towards a forensically ready cloud storage service,” in Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011, p. 93–107.
    [Bibtex]
    @inproceedings{spyridopoulos_towards_2011,
    title = {Towards a forensically ready cloud storage service},
    booktitle = {Proceedings of the 6th {International} {Workshop} on {Digital} {Forensics} and {Incident} {Analysis}},
    publisher = {Plymouth University},
    author = {Spyridopoulos, Theodoros and Katos, Vasilios},
    year = {2011},
    pages = {93--107},
    }
  • P. Bednar and V. Katos, “SSD: New Challenges for Digital Forensics,” in Proceedings of the 8th Conference of the Italian Chapter of the Association for Information Systems, 2011.
    [Bibtex]
    @inproceedings{bednar_ssd_2011,
    title = {{SSD}: {New} {Challenges} for {Digital} {Forensics}},
    booktitle = {Proceedings of the 8th {Conference} of the {Italian} {Chapter} of the {Association} for {Information} {Systems}},
    author = {Bednar, P. and Katos, V.},
    year = {2011},
    }
  • V. Katos, D. Vrakas, and P. Katsaros, “A Framework for Access Control with Inference Constraints,” in Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual, 2011, p. 289–297.
    [Bibtex]
    @inproceedings{katos_framework_2011,
    title = {A {Framework} for {Access} {Control} with {Inference} {Constraints}},
    booktitle = {Computer {Software} and {Applications} {Conference} ({COMPSAC}), 2011 {IEEE} 35th {Annual}},
    author = {Katos, V. and Vrakas, D. and Katsaros, P.},
    year = {2011},
    pages = {289--297},
    }
  • V. Katos, F. Stowell, and P. Bednar, “Surveillance, Privacy and the Law of Requisite Variety,” in Data Privacy Management and Autonomous Spontaneous Security, Springer Berlin Heidelberg, 2011, p. 123–139.
    [Bibtex]
    @incollection{katos_surveillance_2011,
    title = {Surveillance, {Privacy} and the {Law} of {Requisite} {Variety}},
    booktitle = {Data {Privacy} {Management} and {Autonomous} {Spontaneous} {Security}},
    publisher = {Springer Berlin Heidelberg},
    author = {Katos, Vasilios and Stowell, Frank and Bednar, Peter},
    year = {2011},
    pages = {123--139},
    }
  • V. Katos, Symmetric Cryptography in Computer Communications, LAP Lambert Academic Publishing, 2011.
    [Bibtex]
    @book{katos_symmetric_2011,
    title = {Symmetric {Cryptography} in {Computer} {Communications}},
    publisher = {LAP Lambert Academic Publishing},
    author = {Katos, Vasilios},
    year = {2011},
    }
  • P. Palmieri and O. Pereira, “Secure Two-Party Computation over a Z-Channel,” in ProvSec, 2011, p. 3–15.
    [Bibtex]
    @inproceedings{palmieri_secure_2011,
    title = {Secure {Two}-{Party} {Computation} over a {Z}-{Channel}},
    booktitle = {{ProvSec}},
    author = {Palmieri, Paolo and Pereira, Olivier},
    year = {2011},
    pages = {3--15},
    }
  • P. Palmieri and O. Pereira, “Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering,” in ICISC, 2011, p. 332–345.
    [Bibtex]
    @inproceedings{palmieri_implementing_2011,
    title = {Implementing {Information}-{Theoretically} {Secure} {Oblivious} {Transfer} from {Packet} {Reordering}},
    booktitle = {{ICISC}},
    author = {Palmieri, Paolo and Pereira, Olivier},
    year = {2011},
    pages = {332--345},
    }
  • I. Fléchais and S. Faily, “Seeking the Philosopher’s Stone,” Interfaces: quarterly magazine of bcs interaction group, iss. 86, p. 14–15, 2011.
    [Bibtex]
    @article{flechais_seeking_2011,
    title = {Seeking the {Philosopher}'s {Stone}},
    number = {86},
    journal = {Interfaces: Quarterly Magazine of BCS Interaction Group},
    author = {Fléchais, Ivan and Faily, Shamal},
    year = {2011},
    pages = {14--15},
    }
  • S. Faily and I. Fléchais, “Eliciting Usable Security Requirements with Misusability Cases,” in Proceedings of the 19th IEEE International Requirements Engineering Conference, 2011, p. 339–340.
    [Bibtex]
    @inproceedings{faily_eliciting_2011,
    title = {Eliciting {Usable} {Security} {Requirements} with {Misusability} {Cases}},
    booktitle = {Proceedings of the 19th {IEEE} {International} {Requirements} {Engineering} {Conference}},
    publisher = {IEEE Computer Society},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2011},
    pages = {339--340},
    }
  • S. Faily, “Two Requirements for Usable and Secure Software Engineering,” in Proceedings of the 1st Software and Usable Security Aligned for Good Engineering (SAUSAGE) Workshop, National Institute of Standards and Technology (NIST), Gaithersburg MD, USA, 2011.
    [Bibtex]
    @inproceedings{faily_two_2011,
    address = {National Institute of Standards and Technology (NIST), Gaithersburg MD, USA},
    title = {Two {Requirements} for {Usable} and {Secure} {Software} {Engineering}},
    booktitle = {Proceedings of the 1st {Software} and {Usable} {Security} {Aligned} for {Good} {Engineering} ({SAUSAGE}) {Workshop}},
    author = {Faily, Shamal},
    year = {2011},
    }
  • S. Faily, “Security goes to ground: on the applicability of Security Entrepreneurship to Grassroot Activism,” in Proceedings of the CHI Workshop on HCI, Politics and the City, 2011.
    [Bibtex]
    @inproceedings{faily_security_2011,
    title = {Security goes to ground: on the applicability of {Security} {Entrepreneurship} to {Grassroot} {Activism}},
    booktitle = {Proceedings of the {CHI} {Workshop} on {HCI}, {Politics} and the {City}},
    author = {Faily, Shamal},
    year = {2011},
    }
  • G. Gionis, H. Desruelle, D. Blomme, J. Lyle, S. Faily, and L. Bassbouss, ““Do we know each other or is it just our Devices?”: A Federated Context Model for Describing Social Activity Across Devices,” in Proceedings of the W3C Workshop: Federated Social Architectures and Protocols, 2011.
    [Bibtex]
    @inproceedings{gionis_we_2011,
    title = {“{Do} we know each other or is it just our {Devices}?”: {A} {Federated} {Context} {Model} for {Describing} {Social} {Activity} {Across} {Devices}},
    booktitle = {Proceedings of the {W3C} {Workshop}: {Federated} {Social} {Architectures} and {Protocols}},
    author = {Gionis, George and Desruelle, Heiko and Blomme, Dieter and Lyle, John and Faily, Shamal and Bassbouss, Louay},
    year = {2011},
    }
  • S. Faily, “Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases,” in Proceedings of the 5th International i* Workshop, 2011, p. 114–119.
    [Bibtex]
    @inproceedings{faily_bridging_2011,
    title = {Bridging {User}-{Centered} {Design} and {Requirements} {Engineering} with {GRL} and {Persona} {Cases}},
    booktitle = {Proceedings of the 5th {International} i* {Workshop}},
    publisher = {CEUR Workshop Proceedings},
    author = {Faily, Shamal},
    year = {2011},
    pages = {114--119},
    }
  • S. Faily and I. Fléchais, “Persona Cases: A Technique for Grounding Personas,” in Proceedings of the 29th international conference on Human factors in computing systems, 2011, p. 2267–2270.
    [Bibtex]
    @inproceedings{faily_persona_2011,
    title = {Persona {Cases}: {A} {Technique} for {Grounding} {Personas}},
    booktitle = {Proceedings of the 29th international conference on {Human} factors in computing systems},
    publisher = {ACM},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2011},
    pages = {2267--2270},
    }
  • S. Faily and I. Fléchais, “User-Centered Information Security Policy Development in a Post-Stuxnet World,” in Proceedings of the 6th International Conference on Availability, Reliability and Security, 2011, p. 716–721.
    [Bibtex]
    @inproceedings{faily_user-centered_2011,
    title = {User-{Centered} {Information} {Security} {Policy} {Development} in a {Post}-{Stuxnet} {World}},
    booktitle = {Proceedings of the 6th {International} {Conference} on {Availability}, {Reliability} and {Security}},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2011},
    pages = {716--721},
    }
  • A. Atzeni, C. Cameroni, S. Faily, J. Lyle, and I. Fléchais, “Here’s Johnny: a Methodology for Developing Attacker Personas,” in Proceedings of the 6th International Conference on Availability, Reliability and Security, 2011, p. 722–727.
    [Bibtex]
    @inproceedings{atzeni_heres_2011,
    title = {Here's {Johnny}: a {Methodology} for {Developing} {Attacker} {Personas}},
    booktitle = {Proceedings of the 6th {International} {Conference} on {Availability}, {Reliability} and {Security}},
    author = {Atzeni, Andrea and Cameroni, Cesare and Faily, Shamal and Lyle, John and Fléchais, Ivan},
    year = {2011},
    pages = {722--727},
    }
  • S. Faily and I. Fléchais, “Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework,” International journal of secure software engineering, vol. 2, iss. 4, p. 114–119, 2011.
    [Bibtex]
    @article{faily_eliciting_2011-1,
    title = {Eliciting {Policy} {Requirements} for {Critical} {National} {Infrastructure} using the {IRIS} {Framework}},
    volume = {2},
    number = {4},
    journal = {International Journal of Secure Software Engineering},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2011},
    pages = {114--119},
    }

2010

  • R. E. Gunstone and B. P. Weston, “Improving Information Sharing in Major Incidents using Mobile Devices and Novel Infrastructure,” Emergency services time, p. 69, 2010.
    [Bibtex]
    @article{gunstone_improving_2010,
    title = {Improving {Information} {Sharing} in {Major} {Incidents} using {Mobile} {Devices} and {Novel} {Infrastructure}},
    journal = {Emergency Services Time},
    author = {Gunstone, R. E. and Weston, B. P.},
    month = aug,
    year = {2010},
    pages = {69},
    }
  • T. Kavallaris and V. Katos, “On the detection of pod slurping attacks,” Computers & security, vol. 29, iss. 6, p. 680 – 685, 2010.
    [Bibtex]
    @article{kavallaris_detection_2010,
    title = {On the detection of pod slurping attacks},
    volume = {29},
    number = {6},
    journal = {Computers \& Security},
    author = {Kavallaris, Theodoros and Katos, Vasilios},
    year = {2010},
    pages = {680 -- 685},
    }
  • G. Pangalos and V. Katos, “Information Assurance and Forensic Readiness,” in Next Generation Society. Technological and Legal Issues, Springer Berlin Heidelberg, 2010, p. 181–188.
    [Bibtex]
    @incollection{pangalos_information_2010,
    title = {Information {Assurance} and {Forensic} {Readiness}},
    booktitle = {Next {Generation} {Society}. {Technological} and {Legal} {Issues}},
    publisher = {Springer Berlin Heidelberg},
    author = {Pangalos, Georgios and Katos, Vasilios},
    year = {2010},
    pages = {181--188},
    }
  • A. Tasidou, P. S. Efraimidis, and V. Katos, “Economics of Personal Data Management: Fair Personal Information Trades,” in Next Generation Society. Technological and Legal Issues, Springer Berlin Heidelberg, 2010, p. 151–160.
    [Bibtex]
    @incollection{tasidou_economics_2010,
    title = {Economics of {Personal} {Data} {Management}: {Fair} {Personal} {Information} {Trades}},
    booktitle = {Next {Generation} {Society}. {Technological} and {Legal} {Issues}},
    publisher = {Springer Berlin Heidelberg},
    author = {Tasidou, A. and Efraimidis, P.S. and Katos, V.},
    year = {2010},
    pages = {151--160},
    }
  • P. Palmieri and O. Pereira, “Building Oblivious Transfer on Channel Delays,” in Inscrypt, 2010, p. 125–138.
    [Bibtex]
    @inproceedings{palmieri_building_2010,
    title = {Building {Oblivious} {Transfer} on {Channel} {Delays}},
    booktitle = {Inscrypt},
    author = {Palmieri, Paolo and Pereira, Olivier},
    year = {2010},
    pages = {125--138},
    }
  • S. Faily and I. Fléchais, “Security through Usability: a user-centered approach for balanced security policy requirements,” in Poster at: Computer Security Applications Conference, 2010. ACSAC ’10. Annual, 2010.
    [Bibtex]
    @inproceedings{faily_security_2010,
    title = {Security through {Usability}: a user-centered approach for balanced security policy requirements},
    booktitle = {Poster at: {Computer} {Security} {Applications} {Conference}, 2010. {ACSAC} '10. {Annual}},
    author = {Faily, Shamal and Fléchais, Ivan},
    month = dec,
    year = {2010},
    }
  • S. Faily and I. Fléchais, “Analysing and Visualising Security and Usability in IRIS,” in Proceedings of the 5th International Conference on Availability, Reliability and Security, 2010, p. 543–548.
    [Bibtex]
    @inproceedings{faily_analysing_2010,
    title = {Analysing and {Visualising} {Security} and {Usability} in {IRIS}},
    booktitle = {Proceedings of the 5th {International} {Conference} on {Availability}, {Reliability} and {Security}},
    publisher = {IEEE},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2010},
    pages = {543--548},
    }
  • S. Faily and I. Fléchais, “A Meta-Model for Usable Secure Requirements Engineering,” in Proceedings of the 6th International Workshop on Software Engineering for Secure Systems, 2010, p. 126–135.
    [Bibtex]
    @inproceedings{faily_meta-model_2010,
    title = {A {Meta}-{Model} for {Usable} {Secure} {Requirements} {Engineering}},
    booktitle = {Proceedings of the 6th {International} {Workshop} on {Software} {Engineering} for {Secure} {Systems}},
    publisher = {IEEE},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2010},
    pages = {126--135},
    }
  • S. Faily and I. Fléchais, “A Model of Security Culture for e-Science,” in Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), 2010, p. 154–164.
    [Bibtex]
    @inproceedings{faily_model_2010,
    title = {A {Model} of {Security} {Culture} for e-{Science}},
    booktitle = {Proceedings of the {South} {African} {Information} {Security} {Multi}-{Conference} ({SAISMC} 2010)},
    publisher = {University of Plymouth},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2010},
    pages = {154--164},
    }
  • S. Faily and I. Fléchais, “Barry is not the weakest link: eliciting secure system requirements with personas,” in Proceedings of the 24th BCS Interaction Specialist Group Conference, 2010, p. 124–132.
    [Bibtex]
    @inproceedings{faily_barry_2010,
    title = {Barry is not the weakest link: eliciting secure system requirements with personas},
    booktitle = {Proceedings of the 24th {BCS} {Interaction} {Specialist} {Group} {Conference}},
    publisher = {British Computer Society},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2010},
    pages = {124--132},
    }
  • S. Faily and I. Fléchais, “To boldly go where invention isn’t secure: applying Security Entrepreneurship to secure systems design,” in Proceedings of the 2010 New Security Paradigms Workshop, 2010, p. 73–84.
    [Bibtex]
    @inproceedings{faily_boldly_2010,
    title = {To boldly go where invention isn't secure: applying {Security} {Entrepreneurship} to secure systems design},
    booktitle = {Proceedings of the 2010 {New} {Security} {Paradigms} {Workshop}},
    publisher = {ACM},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2010},
    pages = {73--84},
    }
  • S. Faily and I. Fléchais, “The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design,” in Proceedings of the 3rd Conference on Human-Centered Software Engineering, 2010, p. 111–118.
    [Bibtex]
    @inproceedings{faily_secret_2010,
    title = {The {Secret} {Lives} of {Assumptions}: {Developing} and {Refining} {Assumption} {Personas} for {Secure} {System} {Design}},
    booktitle = {Proceedings of the 3rd {Conference} on {Human}-{Centered} {Software} {Engineering}},
    publisher = {Springer},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2010},
    pages = {111--118},
    }
  • S. Faily and I. Fléchais, “Towards tool-support for Usable Secure Requirements Engineering with CAIRIS,” International journal of secure software engineering, vol. 1, iss. 3, p. 56–70, 2010.
    [Bibtex]
    @article{faily_towards_2010,
    title = {Towards tool-support for {Usable} {Secure} {Requirements} {Engineering} with {CAIRIS}},
    volume = {1},
    number = {3},
    journal = {International Journal of Secure Software Engineering},
    author = {Faily, Shamal and Fléchais, Ivan},
    month = sep,
    year = {2010},
    pages = {56--70},
    }
  • S. Faily and I. Fléchais, “Designing and Aligning e-Science Security Culture with Design,” Information management and computer security, vol. 18, iss. 5, p. 339–349, 2010.
    [Bibtex]
    @article{faily_designing_2010,
    title = {Designing and {Aligning} e-{Science} {Security} {Culture} with {Design}},
    volume = {18},
    number = {5},
    journal = {Information Management and Computer Security},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2010},
    pages = {339--349},
    }

2009

  • R. E. Gunstone, “Advances in Inter-Vehicle Communication Systems and Potential Military Applications,” The journal for defence engineering and science, vol. 5, p. 73–76, 2009.
    [Bibtex]
    @article{gunstone_advances_2009,
    title = {Advances in {Inter}-{Vehicle} {Communication} {Systems} and {Potential} {Military} {Applications}},
    volume = {5},
    journal = {The Journal for Defence Engineering and Science},
    author = {Gunstone, R. E.},
    year = {2009},
    pages = {73--76},
    }
  • V. Katos, F. Stowell, and P. Bednar, “From Synergy to Symbiosis: New Directions in Security and Privacy?,” International journal of information technologies and systems approach, vol. 2, iss. 2, p. 1–14, 2009.
    [Bibtex]
    @article{katos_synergy_2009,
    title = {From {Synergy} to {Symbiosis}: {New} {Directions} in {Security} and {Privacy}?},
    volume = {2},
    number = {2},
    journal = {International Journal of Information Technologies and Systems Approach},
    author = {Katos, Vasilios and Stowell, Frank and Bednar, Peter},
    year = {2009},
    pages = {1--14},
    }
  • P. M. Bednar, V. Katos, and C. Hennell, “On the complexity of collaborative cyber crime investigations,” in Digital Evidence and Electronic Signature Law Review, 2009.
    [Bibtex]
    @inproceedings{bednar_complexity_2009,
    title = {On the complexity of collaborative cyber crime investigations},
    volume = {6},
    booktitle = {Digital {Evidence} and {Electronic} {Signature} {Law} {Review}},
    author = {Bednar, P. M. and Katos, V. and Hennell, C.},
    year = {2009},
    }
  • P. Bednar and V. Katos, “Diversity Networks in Digital Investigations,” in Proceedings of the 4th International Workshop on Digital Forensics & Incident Analysis, 2009, p. 63–71.
    [Bibtex]
    @inproceedings{bednar_diversity_2009,
    title = {Diversity {Networks} in {Digital} {Investigations}},
    booktitle = {Proceedings of the 4th {International} {Workshop} on {Digital} {Forensics} \& {Incident} {Analysis}},
    author = {Bednar, P. and Katos, V.},
    year = {2009},
    pages = {63--71},
    }
  • P. Efraimidis and V. Katos, “Probability and Information Theory (in Greek),” in Modern Cryptography: Theory and Applications, Papasotiriou, 2009.
    [Bibtex]
    @incollection{efraimidis_probability_2009,
    title = {Probability and {Information} {Theory} (in {Greek})},
    booktitle = {Modern {Cryptography}: {Theory} and {Applications}},
    publisher = {Papasotiriou},
    author = {Efraimidis, P. and Katos, V.},
    year = {2009},
    }
  • V. Katos and P. Efraimidis, “Identity Assurance in the Surveilliance Society (in Greek),” in Privacy Protection in ICT: Technical and Legal Aspects, Papasotiriou, 2009.
    [Bibtex]
    @incollection{katos_identity_2009,
    title = {Identity {Assurance} in the {Surveilliance} {Society} (in {Greek})},
    booktitle = {Privacy {Protection} in {ICT}: {Technical} and {Legal} {Aspects}},
    publisher = {Papasotiriou},
    author = {Katos, V. and Efraimidis, P.},
    year = {2009},
    }
  • S. Faily and I. Fléchais, “Context-Sensitive Requirements and Risk Management with IRIS,” in Proceedings of the 17th IEEE International Requirements Engineering Conference, 2009, p. 379–380.
    [Bibtex]
    @inproceedings{faily_context-sensitive_2009,
    title = {Context-{Sensitive} {Requirements} and {Risk} {Management} with {IRIS}},
    booktitle = {Proceedings of the 17th {IEEE} {International} {Requirements} {Engineering} {Conference}},
    publisher = {IEEE Computer Society},
    author = {Faily, Shamal and Fléchais, Ivan},
    year = {2009},
    pages = {379--380},
    }
  • S. Faily, “Context-Sensitive Requirements and Risk Analysis,” in Proceedings of the 17th International Conference on Requirements Engineering – Doctoral Symposium, 2009.
    [Bibtex]
    @inproceedings{faily_context-sensitive_2009-1,
    title = {Context-{Sensitive} {Requirements} and {Risk} {Analysis}},
    booktitle = {Proceedings of the 17th {International} {Conference} on {Requirements} {Engineering} - {Doctoral} {Symposium}},
    author = {Faily, Shamal},
    year = {2009},
    }

2008

  • P. Bednar, C. Welch, and V. Katos, “Innovation management through the use of diversity networks,” International journal of knowledge and learning, vol. 4, iss. 4, p. 357–369, 2008.
    [Bibtex]
    @article{bednar_innovation_2008,
    title = {Innovation management through the use of diversity networks},
    volume = {4},
    number = {4},
    journal = {International Journal of Knowledge and Learning},
    author = {Bednar, Peter and Welch, Christine and Katos, Vasilios},
    year = {2008},
    pages = {357--369},
    }
  • V. Katos and A. Patel, “A partial equilibrium view on security and privacy,” Information management & computer security, vol. 16, iss. 1, p. 74–83, 2008.
    [Bibtex]
    @article{katos_partial_2008,
    title = {A partial equilibrium view on security and privacy},
    volume = {16},
    number = {1},
    journal = {Information Management \& Computer Security},
    author = {Katos, Vasilios and Patel, Ahmed},
    year = {2008},
    pages = {74--83},
    }
  • V. Katos and P. M. Bednar, “A cyber-crime investigation framework,” Computer standards & interfaces, vol. 30, iss. 4, p. 223 – 228, 2008.
    [Bibtex]
    @article{katos_cyber-crime_2008,
    title = {A cyber-crime investigation framework},
    volume = {30},
    number = {4},
    journal = {Computer Standards \& Interfaces},
    author = {Katos, Vasilios and Bednar, Peter M.},
    year = {2008},
    pages = {223 -- 228},
    }
  • V. Katos and S. Furnell, “The security and privacy impact of criminalising the distribution of hacking tools,” Computer fraud & security, vol. 2008, iss. 7, p. 9 – 16, 2008.
    [Bibtex]
    @article{katos_security_2008,
    title = {The security and privacy impact of criminalising the distribution of hacking tools},
    volume = {2008},
    number = {7},
    journal = {Computer Fraud \& Security},
    author = {Katos, Vasilios and Furnell, Steven},
    year = {2008},
    pages = {9 -- 16},
    }
  • S. Faily, “Towards Requirements Engineering Practice for Professional End User Developers: a Case Study,” in Proceedings of the 3rd International Workshop on Requirements Engineering Education and Training, 2008, p. 38–44.
    [Bibtex]
    @inproceedings{faily_towards_2008,
    title = {Towards {Requirements} {Engineering} {Practice} for {Professional} {End} {User} {Developers}: a {Case} {Study}},
    booktitle = {Proceedings of the 3rd {International} {Workshop} on {Requirements} {Engineering} {Education} and {Training}},
    publisher = {IEEE Computer Society},
    author = {Faily, Shamal},
    year = {2008},
    pages = {38--44},
    }

2007

  • C. Adams and V. Katos, “Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations,” Journal of information privacy and security, vol. 3, iss. 3, p. 29–44, 2007.
    [Bibtex]
    @article{adams_exoinformation_2007,
    title = {Exoinformation {Space} {Audits}: {An} {Information} {Richness} {View} of {Privacy} and {Security} {Obligations}},
    volume = {3},
    number = {3},
    journal = {Journal of Information Privacy and Security},
    author = {Adams, Carl and Katos, Vasilios},
    year = {2007},
    pages = {29--44},
    }
  • V. Katos and B. Doherty, “Exploring confusion in product ciphers through regression analysis,” Information sciences, vol. 177, iss. 8, p. 1789 – 1795, 2007.
    [Bibtex]
    @article{katos_exploring_2007,
    title = {Exploring confusion in product ciphers through regression analysis},
    volume = {177},
    number = {8},
    journal = {Information Sciences},
    author = {Katos, Vasilios and Doherty, Bernard},
    year = {2007},
    pages = {1789 -- 1795},
    }
  • V. Katos, “Network intrusion detection: Evaluating cluster, discriminant, and logit analysis,” Information sciences, vol. 177, iss. 15, p. 3060 – 3073, 2007.
    [Bibtex]
    @article{katos_network_2007,
    title = {Network intrusion detection: {Evaluating} cluster, discriminant, and logit analysis},
    volume = {177},
    number = {15},
    journal = {Information Sciences},
    author = {Katos, Vasilios},
    year = {2007},
    pages = {3060 -- 3073},
    }
  • V. Katos, F. Stowell, and P. Bednar, “Quis Custodiet Ipsos Custodies?,” Systemist, vol. 29, iss. 2, p. 96–105, 2007.
    [Bibtex]
    @article{katos_quis_2007,
    title = {Quis {Custodiet} {Ipsos} {Custodies}?},
    volume = {29},
    number = {2},
    journal = {Systemist},
    author = {Katos, V. and Stowell, F. and Bednar, P.},
    year = {2007},
    pages = {96--105},
    }
  • P. Bednar, C. Welch, and V. Katos, “Dealing with Complexity in Knowledge Sharing Processes’,” in Proceedings of the 8th European Conference on Knowledge Management, 2007, p. 101–108.
    [Bibtex]
    @inproceedings{bednar_dealing_2007,
    title = {Dealing with {Complexity} in {Knowledge} {Sharing} {Processes}’},
    booktitle = {Proceedings of the 8th {European} {Conference} on {Knowledge} {Management}},
    publisher = {ACI Academic Conferences International},
    author = {Bednar, Peter and Welch, Christine and Katos, Vasilios},
    year = {2007},
    pages = {101--108},
    }
  • P. M. Bednar, V. Katos, and C. Welch, “Systems analysis: Exploring the spectrum of diversity,” in Proceedings of the 15th European Conference on Information Systems, 2007, p. 647–657.
    [Bibtex]
    @inproceedings{bednar_systems_2007,
    title = {Systems analysis: {Exploring} the spectrum of diversity},
    booktitle = {Proceedings of the 15th {European} {Conference} on {Information} {Systems}},
    author = {Bednar, P. M. and Katos, V. and Welch, C.},
    year = {2007},
    pages = {647--657},
    }
  • C. Wilson, V. Katos, and C. Strevens, “An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education,” in Fifth World Conference on Information Security Education, Springer US, 2007, p. 65–71.
    [Bibtex]
    @incollection{wilson_interdisciplinary_2007,
    title = {An {Interdisciplinary} {Approach} to {Forensic} {IT} and {Forensic} {Psychology} {Education}},
    booktitle = {Fifth {World} {Conference} on {Information} {Security} {Education}},
    publisher = {Springer US},
    author = {Wilson, Clare and Katos, Vasilios and Strevens, Caroline},
    year = {2007},
    pages = {65--71},
    }

2006

  • P. Bednar, C. Welch, and V. Katos, “Four valued logic: Supporting complexity in knowledge sharing processes,” in Proceedings of the European Conference on Knowledge Management, 2006, p. 29–35.
    [Bibtex]
    @inproceedings{bednar_four_2006,
    title = {Four valued logic: {Supporting} complexity in knowledge sharing processes},
    booktitle = {Proceedings of the {European} {Conference} on {Knowledge} {Management}},
    author = {Bednar, P. and Welch, C. and Katos, V.},
    year = {2006},
    pages = {29--35},
    }
  • V. Katos and I. Mavridis, “A Practical Location Aware Access Control Solution for HTML Content in Wireless Networks,” in MediaWIN 2006, 2006, p. 44–50.
    [Bibtex]
    @inproceedings{katos_practical_2006,
    title = {A {Practical} {Location} {Aware} {Access} {Control} {Solution} for {HTML} {Content} in {Wireless} {Networks}},
    booktitle = {{MediaWIN} 2006},
    author = {Katos, V. and Mavridis, I.},
    year = {2006},
    pages = {44--50},
    }
  • V. Katos, “Forecasting Volatility of Active Phishing Sites,” Information risk mangement & audit, vol. 16, iss. 2, p. 8–11, 2006.
    [Bibtex]
    @article{katos_forecasting_2006,
    title = {Forecasting {Volatility} of {Active} {Phishing} {Sites}},
    volume = {16},
    number = {2},
    journal = {Information Risk Mangement \& Audit},
    author = {Katos, Vasilios},
    year = {2006},
    pages = {8--11},
    }
  • V. Katos, P. Bednar, and C. Welch, “Dealing with epistemic uncertainty in the SST framework,” , F. Adam, P. Brezillon, S. Carlsson, and P. Humphreys, Eds., Decision Support Press / IFIP TC8 WG8.3, 2006, vol. 2, p. 886–903.
    [Bibtex]
    @incollection{katos_dealing_2006,
    series = {Creativity and {Innovation} in {Decision}-making and {Decision} {Support}},
    title = {Dealing with epistemic uncertainty in the {SST} framework},
    volume = {2},
    publisher = {Decision Support Press / IFIP TC8 WG8.3},
    author = {Katos, Vasilios and Bednar, Peter and Welch, Christine},
    editor = {Adam, Frederic and Brezillon, Patrick and Carlsson, Sven and Humphreys, Patrick},
    year = {2006},
    pages = {886--903},
    }

2005

  • P. E. Fouliras and V. Katos, “A novel security protocol enhancement on distributed multicasting for video on demand,” in Proceedings of the 5th International Network Conference, 2005, p. 129–136.
    [Bibtex]
    @inproceedings{fouliras_novel_2005,
    title = {A novel security protocol enhancement on distributed multicasting for video on demand},
    booktitle = {Proceedings of the 5th {International} {Network} {Conference}},
    publisher = {Plymouth University},
    author = {Fouliras, P. E. and Katos, V.},
    year = {2005},
    pages = {129--136},
    }
  • C. Adams and V. Katos, “Privacy Challenges for Location Aware Technologies,” in Mobile Information Systems II, J. Krogstie, K. Kautz, and D. Allen, Eds., Springer US, 2005, vol. 191, p. 303–310.
    [Bibtex]
    @incollection{adams_privacy_2005,
    series = {{IFIP} — {The} {International} {Federation} for {Information} {Processing}},
    title = {Privacy {Challenges} for {Location} {Aware} {Technologies}},
    volume = {191},
    booktitle = {Mobile {Information} {Systems} {II}},
    publisher = {Springer US},
    author = {Adams, Carl and Katos, Vasilios},
    editor = {Krogstie, John and Kautz, Karlheinz and Allen, David},
    year = {2005},
    pages = {303--310},
    }
  • V. Katos, “Statistical Risk Cluster Analysis for Network Segmentation,” Information risk mangement & audit, vol. 162, iss. 1, p. 7–11, 2005.
    [Bibtex]
    @article{katos_statistical_2005,
    title = {Statistical {Risk} {Cluster} {Analysis} for {Network} {Segmentation}},
    volume = {162},
    number = {1},
    journal = {Information Risk Mangement \& Audit},
    author = {Katos, V.},
    year = {2005},
    pages = {7--11},
    }
  • V. Katos, “A randomness test for block ciphers,” Applied mathematics and computation, vol. 162, iss. 1, p. 29 – 35, 2005.
    [Bibtex]
    @article{katos_randomness_2005,
    title = {A randomness test for block ciphers},
    volume = {162},
    number = {1},
    journal = {Applied Mathematics and Computation},
    author = {Katos, Vasilios},
    year = {2005},
    pages = {29 -- 35},
    }
  • C. Adams and V. Katos, “The ubiquitous mobile and location-awareness time bomb,” Cutter it journal, vol. 18, iss. 6, p. 20–26, 2005.
    [Bibtex]
    @article{adams_ubiquitous_2005,
    title = {The ubiquitous mobile and location-awareness time bomb},
    volume = {18},
    number = {6},
    journal = {Cutter IT Journal},
    author = {Adams, C. and Katos, V.},
    year = {2005},
    pages = {20--26},
    }
  • V. Katos, T. King, and C. Adams, “Towards a Computer Based Training Tool for Education in Cryptography,” Upgrade journal, vol. 6, p. 30–35, 2005.
    [Bibtex]
    @article{katos_towards_2005,
    title = {Towards a {Computer} {Based} {Training} {Tool} for {Education} in {Cryptography}},
    volume = {6},
    journal = {UPGRADE Journal},
    author = {Katos, V. and King, T. and Adams, C.},
    year = {2005},
    pages = {30--35},
    }
  • V. Katos and C. Adams, “Modelling corporate wireless security and privacy,” The journal of strategic information systems, vol. 14, iss. 3, p. 307 – 321, 2005.
    [Bibtex]
    @article{katos_modelling_2005,
    title = {Modelling corporate wireless security and privacy},
    volume = {14},
    number = {3},
    journal = {The Journal of Strategic Information Systems},
    author = {Katos, Vasilios and Adams, Carl},
    year = {2005},
    pages = {307 -- 321},
    }
  • S. Faily, “Does Object-Oriented Domain Analysis Work?,” Newsletter of the british computer society requirements engineering specialist interest group, iss. 37, p. 10–11, 2005.
    [Bibtex]
    @article{faily_does_2005,
    title = {Does {Object}-{Oriented} {Domain} {Analysis} {Work}?},
    number = {37},
    journal = {Newsletter of the British Computer Society Requirements Engineering Specialist Interest Group},
    author = {Faily, Shamal},
    year = {2005},
    pages = {10--11},
    }

2004

  • V. Katos, “Risk Cluster Analysis for Network Segmentation,” in Proceedings of the Fourth International Network Conference, 2004, p. 111–119.
    [Bibtex]
    @inproceedings{katos_risk_2004,
    title = {Risk {Cluster} {Analysis} for {Network} {Segmentation}},
    booktitle = {Proceedings of the {Fourth} {International} {Network} {Conference}},
    publisher = {Plymouth University},
    author = {Katos, V.},
    year = {2004},
    pages = {111--119},
    }
  • V. Katos, “Diffusion Behaviour of Cryptographic Primitives in Feistel Networks,” in Proceedings of the 2nd International Workshop on Security in Information Systems, 2004, p. 79–87.
    [Bibtex]
    @inproceedings{katos_diffusion_2004,
    title = {Diffusion {Behaviour} of {Cryptographic} {Primitives} in {Feistel} {Networks}},
    booktitle = {Proceedings of the 2nd {International} {Workshop} on {Security} in {Information} {Systems}},
    publisher = {Insticc Press},
    author = {Katos, V.},
    year = {2004},
    pages = {79--87},
    }

2002

  • E. Kalentzi, V. Katos, and C. Batzios, “On the scalability of the BRODESSYS decision support system,” in Proceedings of the 6th World Multiconference in Systemics, Cybernetics and Informatics, 2002.
    [Bibtex]
    @inproceedings{kalentzi_scalability_2002,
    title = {On the scalability of the {BRODESSYS} decision support system},
    booktitle = {Proceedings of the 6th {World} {Multiconference} in {Systemics}, {Cybernetics} and {Informatics}},
    author = {Kalentzi, E. and Katos, V. and Batzios, C.},
    year = {2002},
    }

2001

  • V. Katos and W. Alyea, “Trust Models for Access Control,” Journal of information technology impact, vol. 2, iss. 3, p. 117–123, 2001.
    [Bibtex]
    @article{katos_trust_2001,
    title = {Trust {Models} for {Access} {Control}},
    volume = {2},
    number = {3},
    journal = {Journal of Information Technology Impact},
    author = {Katos, V. and Alyea, W.},
    year = {2001},
    pages = {117--123},
    }
  • C. Iliou, T. Kostoulas, T. Tsikrika, V. Katos, S. Vrochidis, and Y. Kompatsiaris, “Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics,” Digital threats: research and practice, iss. ja.
    [Bibtex]
    @article{iliou_detection_nodate,
    title = {Detection of {Advanced} {Web} {Bots} by {Combining} {Web} {Logs} with {Mouse} {Behavioural} {Biometrics}},
    volume = {0},
    number = {ja},
    journal = {Digital Threats: Research and Practice},
    author = {Iliou, Christos and Kostoulas, Theodoros and Tsikrika, Theodora and Katos, Vasilios and Vrochidis, Stefanos and Kompatsiaris, Yiannis},
    }
  • A. Chrysanthou and V. Katos, “Assessing forensic readiness,” in Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, .
    [Bibtex]
    @inproceedings{chrysanthou_assessing_nodate,
    title = {Assessing forensic readiness},
    booktitle = {Proceedings of the 7th {International} {Workshop} on {Digital} {Forensics} and {Incident} {Analysis}},
    publisher = {Plymouth University},
    author = {Chrysanthou, Anargyros and Katos, Vasilios},
    }