Publications

2018

  • J. Henriksen-Bulmer, S. Faily, and V. Katos, “Translating Contextual Integrity into Practice using CLIFOD,” in Proceedings of the 2018 Networked Privacy Workshop at CSCW, 2018.
    [Bibtex]
    @inproceedings{hefk18,
    author = {J. Henriksen-Bulmer and S. Faily and V. Katos},
    booktitle = {{Proceedings of the 2018 Networked Privacy Workshop at CSCW}},
    title = {{Translating Contextual Integrity into Practice using CLIFOD}},
    year = {2018}}
  • S. Alexaki, G. Alexandris, V. Katos, and N. Petroulakis, “Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions,” in Proceedings of the IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks, 2018.
    [Bibtex]
    @inproceedings{aakp18,
    author = {S. Alexaki and G. Alexandris and V. Katos and N. Petroulakis},
    booktitle = {{Proceedings of the IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks}},
    title = {{Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions}},
    publisher = {{IEEE}},
    year = {2018}}
  • G. Alexandris, V. Katos, S. Alexaki, and G. Hatzivasilis, “Blockchains as Enablers for Auditing Cooperative Circular Economy Networks,” in Proceedings of the IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks, 2018.
    [Bibtex]
    @inproceedings{akah18,
    author = {G. Alexandris and V. Katos and S. Alexaki and G. Hatzivasilis},
    booktitle = {{Proceedings of the IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks}},
    title = {{Blockchains as Enablers for Auditing Cooperative Circular Economy Networks}},
    publisher = {{IEEE}},
    year = {2018}}
  • S. Belloro and A. Mylonas, “I know what you did last summer: new persistent tracking mechanisms in the wild,” IEEE Access, pp. 1-1, 2018.
    [Bibtex]
    @ARTICLE{bamy18,
    author={S. Belloro and A. Mylonas},
    journal={{IEEE Access}},
    title={I know what you did last summer: New persistent tracking mechanisms in the wild},
    year={2018},
    volume={},
    number={},
    pages={1-1}}
  • I. Tsimperidis, P. D. Yoo, K. Taha, A. Mylonas, and V. Katos, “R$²$bn: an adaptive model for keystroke-dynamics-based educational level classification,” Ieee transactions on cybernetics, pp. 1-11, 2018.
    [Bibtex]
    @ARTICLE{tytm18,
    author={I. Tsimperidis and P. D. Yoo and K. Taha and A. Mylonas and V. Katos},
    journal={IEEE Transactions on Cybernetics},
    title={R$²$BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification},
    year={2018},
    volume={},
    number={},
    pages={1-11},
    month={}}
  • C. Sample, J. McAlaney, J. Bakdash, and H. Thackray, “A Cultural Exploration of the Social Media Manipulators,” in Proceedings of the 17th European Conference on Cyber Warfare and Security, 2018, p. 432–440.
    [Bibtex]
    @inproceedings{smbt18,
    author = {Char Sample and John McAlaney and Jonathan Bakdash and Helen Thackray},
    booktitle = {{Proceedings of the 17th European Conference on Cyber Warfare and Security}},
    title = {{A Cultural Exploration of the Social Media Manipulators}},
    pages={432--440},
    publisher = {{ACPIL}},
    year = {2018}}
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “Rationalising Decision Making about Risk: A Normative Approach,” in Proceedings of the 12th International Symposium on Human Aspects of Information Security & Assurance, 2018.
    [Bibtex]
    @inproceedings{mfmw18,
    author = {Andrew M'manga and Shamal Faily and John McAlaney and Chris Williams},
    booktitle = {{Proceedings of the 12th International Symposium on Human Aspects of Information Security \& Assurance}},
    title = {{Rationalising Decision Making about Risk: A Normative Approach}},
    publisher = {University of Plymouth},
    year = {2018}}
  • A. Nisioti, A. Mylonas, P. D. Yoo, and V. Katos, “From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods,” IEEE Communications Surveys Tutorials, pp. 1-1, 2018.
    [Bibtex]
    @ARTICLE{nmyk18,
    author={A. Nisioti and A. Mylonas and P. D. Yoo and V. Katos},
    journal={{IEEE Communications Surveys Tutorials}},
    title={{From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods}},
    year={2018},
    volume={},
    number={},
    pages={1-1},
    month={}}
  • N. Saxena, J. A. Stone, and H. Dogan, “Systematic Analysis: Resistance to Traffic Analysis Attacks in Tor System for Critical Infrastructures,” in Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics, 2018.
    [Bibtex]
    @inproceedings{sasd18,
    author = {N. Saxena and J. A. Stone and H. Dogan},
    booktitle = {{Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics}},
    title = {{Systematic Analysis: Resistance to Traffic Analysis Attacks in Tor System for Critical Infrastructures}},
    publisher = {IEEE},
    year = {2018}}
  • D. Ki-Aries, S. Faily, H. Dogan, and C. Williams, “Assessing System of Systems Security Risk and Requirements with OASoSIS,” in Proceedings of the 5th International Workshop on Evolving Security & Privacy Requirements Engineering, 2018.
    [Bibtex]
    @inproceedings{kfdw181,
    Author = {Duncan Ki-Aries and Shamal Faily and Huseyin Dogan and Chris Williams},
    Booktitle = {{Proceedings of the 5th International Workshop on Evolving Security \& Privacy Requirements Engineering}},
    Title = {{Assessing System of Systems Security Risk and Requirements with OASoSIS}},
    Publisher = {IEEE},
    Year = {2018}}
  • J. Coles, S. Faily, and D. Ki-Aries, “Tool-supporting Data Protection Impact Assessments with CAIRIS,” in Proceedings of the 5th International Workshop on Evolving Security & Privacy Requirements Engineering, 2018.
    [Bibtex]
    @inproceedings{cofk18,
    Author = {Joshua Coles and Shamal Faily and Duncan Ki-Aries},
    Booktitle = {{Proceedings of the 5th International Workshop on Evolving Security \& Privacy Requirements Engineering}},
    Title = {{Tool-supporting Data Protection Impact Assessments with CAIRIS}},
    Publisher = {IEEE},
    Year = {2018}}
  • A. M’manga, S. Faily, J. McAlaney, C. Williams, Y. Kadobayashi, and D. Miyamoto, “Qualitative Adaptation: Informing Design for Risk-based Decision Making,” in Proceedings of the 2nd Workshop on the Challenges and Opportunities for Qualitative Data Research Methods in HCI, 2018.
    [Bibtex]
    @inproceedings{mfmwkm181,
    author = {Andrew M'manga and Shamal Faily and John McAlaney and Chris Williams and Youki Kadobayashi and Daisuke Miyamoto},
    booktitle = {{Proceedings of the 2nd Workshop on the Challenges and Opportunities for Qualitative Data Research Methods in HCI}},
    title = {{Qualitative Adaptation: Informing Design for Risk-based Decision Making}},
    publisher = {BCS},
    year = {2018}}
  • J. Henriksen-Bulmer, S. Faily, and S. Jeary, “DPIAs for Charities: a Charity Sector Specific DPIA Framework,” in Proceedings of the 13th International IFIP Summer School on Privacy and Identity Management, 2018.
    [Bibtex]
    @inproceedings{hefj18,
    author = {Jane Henriksen-Bulmer and Shamal Faily and Sheridan Jeary},
    booktitle = {{Proceedings of the 13th International IFIP Summer School on Privacy and Identity Management}},
    title = {{DPIAs for Charities: a Charity Sector Specific DPIA Framework}},
    publisher = {Springer},
    note = {To Appear},
    year = {2018}}
  • N. Jiang and H. Dogan, “TAPCHA: An Invisible CAPTCHA Scheme,” in Proceedings of the 32nd International BCS Human Computer Interaction Conference, 2018.
    [Bibtex]
    @inproceedings{jido18,
    author = {Nan Jiang and Huseyin Dogan},
    booktitle = {{Proceedings of the 32nd International BCS Human Computer Interaction Conference}},
    title = {{TAPCHA: An Invisible CAPTCHA Scheme}},
    publisher = {BCS},
    year = {2018}}
  • S. Ambore, C. J. Richardson, H. Dogan, and E. Apeh, “Have Usability and Security Trade-offs in Mobile Financial Services (MFS) become Untrustworthy?,” in Proceedings of the 32nd International BCS Human Computer Interaction Conference, 2018.
    [Bibtex]
    @inproceedings{arda18,
    author = {Stephen Ambore and Christopher J. Richardson and Huseyin Dogan and Edward Apeh},
    booktitle = {{Proceedings of the 32nd International BCS Human Computer Interaction Conference}},
    title = {{Have Usability and Security Trade-offs in Mobile Financial Services (MFS) become Untrustworthy?}},
    publisher = {BCS},
    year = {2018}}
  • A. M’manga, S. Faily, J. McAlaney, C. Williams, Y. Kadobayashi, and D. Miyamoto, “Eliciting Persona Characteristics for Risk Based Decision Making,” in Proceedings of the 32nd International BCS Human Computer Interaction Conference, 2018.
    [Bibtex]
    @inproceedings{mfmwkm18,
    author = {Andrew M'manga and Shamal Faily and John McAlaney and Chris Williams and Youki Kadobayashi and Daisuke Miyamoto},
    booktitle = {{Proceedings of the 32nd International BCS Human Computer Interaction Conference}},
    title = {{Eliciting Persona Characteristics for Risk Based Decision Making}},
    publisher = {BCS},
    year = {2018}}
  • R. Chaudhary, G. S. Aujla, N. Kumar, A. K. Das, N. Saxena, and J. J. P. C. Rodrigues, “LaCSys: Lattice-based Cryptosystem for Secure Communication in Smart Grid Environment,” in 2018 IEEE International Conference on Communications (ICC), 2018.
    [Bibtex]
    @inproceedings{chau18,
    author = {Rajat Chaudhary and Gagangeet Singh Aujla and Neeraj Kumar and Ashok Kumar Das and Neetesh Saxena and Joel J.P.C. Rodrigues},
    booktitle = {{2018 IEEE International Conference on Communications (ICC)}},
    title = {{LaCSys: Lattice-based Cryptosystem for Secure Communication in Smart Grid Environment}},
    publisher = {IEEE},
    note = {To Appear},
    year = {2018}}
  • R. Chaudhary, A. Jindal, G. S. Aujla, N. Kumar, A. K. Das, and N. Saxena, “LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment,” IEEE Communications Magazine, vol. 56, iss. 4, pp. 24-32, 2018.
    [Bibtex]
    @ARTICLE{chji18,
    author={R. Chaudhary and A. Jindal and G. S. Aujla and N. Kumar and A. K. Das and N. Saxena},
    journal={{IEEE Communications Magazine}},
    title={{LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment}},
    year={2018},
    volume={56},
    number={4},
    pages={24-32},
    month={APRIL}}
  • S. Belloro and A. Mylonas, “Security considerations around the usage of client-side storage APIs. Technical Report BUCSR-2018-01,” Bournemouth University 2018.
    [Bibtex]
    @techreport{bemy18,
    Author = {Stefano Belloro and Alexios Mylonas},
    Institution = {Bournemouth University},
    Title = {{Security considerations around the usage of client-side storage APIs. Technical Report BUCSR-2018-01}},
    Year = {2018}}
  • T. Skinner, J. Taylor, J. Dale, and J. McAlaney, “The Development of Intervention E-Learning Materials and Implementation Techniques for Cyber-Security Behaviour Change,” in Convention of the Study of Artificial Intelligence and Simulation of Behaviour (AISB), 2018, p. 29–34.
    [Bibtex]
    @inproceedings{stdm18,
    author = {Tiffany Skinner and Jacqui Taylor and John Dale and John McAlaney},
    booktitle = {{Convention of the Study of Artificial Intelligence and Simulation of Behaviour (AISB)}},
    title = {{The Development of Intervention E-Learning Materials and Implementation Techniques for Cyber-Security Behaviour Change}},
    publisher = {AISB},
    pages = {29--34},
    year = {2018}}
  • H. Thackray and J. McAlaney, “Groups Online: Hacktivism and Social Protest,” in Psychological and Behavioural Examinations in Cybersecurity, J. McAlaney, L. A. Frumkin, and V. Benson, Eds., IGI-Global, 2018, p. 98–108.
    [Bibtex]
    @incollection{thmc18,
    author = {Helen Thackray and John McAlaney},
    booktitle = {{Psychological and Behavioural Examinations in Cybersecurity}},
    editor = {John McAlaney and Lara A. Frumkin and Vladlena Benson},
    title = {{Groups Online: Hacktivism and Social Protest}},
    publisher = {IGI-Global},
    pages = {98--108},
    year = {2018}}
  • J. Taylor, H. Thackray, S. E. Hodge, and J. McAlaney, “Introducing Psychological Concepts and Methods to Cybersecurity Students,” in Psychological and Behavioural Examinations in Cybersecurity, J. McAlaney, L. A. Frumkin, and V. Benson, Eds., IGI-Global, 2018, p. 98–108.
    [Bibtex]
    @incollection{tthm18,
    author = {Jacqui Taylor and Helen Thackray and Sarah E. Hodge and John McAlaney},
    booktitle = {{Psychological and Behavioural Examinations in Cybersecurity}},
    editor = {John McAlaney and Lara A. Frumkin and Vladlena Benson},
    title = {{Introducing Psychological Concepts and Methods to Cybersecurity Students}},
    publisher = {IGI-Global},
    pages = {98--108},
    year = {2018}}
  • D. Ki-Aries, S. Faily, H. Dogan, and C. Williams, “System of Systems Characterisation assisting Security Risk Assessment,” in Proceedings of the IEEE 13th System of Systems Engineering Conference, 2018.
    [Bibtex]
    @inproceedings{kfdw18,
    author = {Duncan Ki-Aries and Shamal Faily and Huseyin Dogan and Christopher Williams},
    booktitle = {{Proceedings of the IEEE 13th System of Systems Engineering Conference}},
    title = {{System of Systems Characterisation assisting Security Risk Assessment}},
    publisher = {IEEE},
    note = {In Press},
    year = {2018}}
  • S. Simou, C. Kalloniatis, S. Gritzalis, and V. Katos, “A framework for designing cloud forensic-enabled services (CFeS),” Requirements Engineering, 2018.
    [Bibtex]
    @Article{skgk8,
    author="Simou, Stavros
    and Kalloniatis, Christos
    and Gritzalis, Stefanos
    and Katos, Vasilios",
    title={{A framework for designing cloud forensic-enabled services (CFeS)}},
    journal={{Requirements Engineering}},
    year="2018",
    month="Mar",
    day="13"}
  • N. Saxena, H. Shen, N. Komninos, K. K. R. Choo, and N. S. Chaudhari, “BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users,” IEEE Transactions on Dependable and Secure Computing, vol. PP, iss. 99, pp. 1-1, 2018.
    [Bibtex]
    @article{sskc18,
    author={N. Saxena and H. Shen and N. Komninos and K. K. R. Choo and N. S. Chaudhari},
    journal={{IEEE Transactions on Dependable and Secure Computing}},
    title={{BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users}},
    year={2018},
    volume={PP},
    number={99},
    pages={1-1},
    month={}}
  • S. Faily, Designing Usable and Secure Software with IRIS and CAIRIS, Springer, 2018.
    [Bibtex]
    @book{fail18,
    author = {Shamal Faily},
    title = {{Designing Usable and Secure Software with IRIS and CAIRIS}},
    publisher = {Springer},
    note = {In Press},
    year = {2018}
    }
  • N. Saxena, G. Santiago, and B. J. Choi, “Securing Restricted Publisher-Subscriber Communications in Smart Grid Substations,” in Proceedings of the 10th International Conference on COMunicating Systems & NETworks, IEEE, 2018.
    [Bibtex]
    @incollection{sasc18,
    author = {N. Saxena and G. Santiago and B. J. Choi},
    booktitle = {{Proceedings of the 10th International Conference on COMunicating Systems \& NETworks}},
    title = {{Securing Restricted Publisher-Subscriber Communications in Smart Grid Substations}},
    publisher = {IEEE},
    year = {2018}}
  • D. Gritzalis, G. Iseppi, A. Mylonas, and V. Stavrou, “Exiting the Risk Assessment Maze: A Meta-Survey,” ACM Computing Surveys, vol. 51, iss. 1, p. 11:1–11:30, 2018.
    [Bibtex]
    @article{gims17,
    author = {Dimitris Gritzalis and Giulia Iseppi and Alexios Mylonas and Vasilis Stavrou},
    journal = {{ACM Computing Surveys}},
    publisher = {ACM},
    title = {{Exiting the Risk Assessment Maze: A Meta-Survey}},
    volume = {51},
    number = {1},
    month = jan,
    pages = {11:1--11:30},
    year = {2018}}
  • A. Atzeni, S. Faily, and R. Galloni, “Usable Security: HCI-Sec Issues and Motivations,” in Encyclopedia of Information Science and Technology, 4th ed., IGI Global, 2018, p. 5004–5013.
    [Bibtex]
    @incollection{atfg17,
    author = {A. Atzeni and S. Faily and R. Galloni},
    booktitle = {{Encyclopedia of Information Science and Technology}},
    title = {{Usable Security: HCI-Sec Issues and Motivations}},
    edition = {4th},
    pages = {5004--5013},
    publisher = {IGI Global},
    year = {2018}}

2017

  • N. Serketzis, V. Katos, C. Ilioudis, D. Baltatzis, and G. J. Pangalos, “A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness,” International Journal of Systems and Society, vol. 4, iss. 2, p. 57–68, 2017.
    [Bibtex]
    @article{seka17,
    author = {Nikolaos Serketzis and Vasilios Katos and Christos Ilioudis and Dimitrios Baltatzis and George J. Pangalos},
    journal = {{International Journal of Systems and Society}},
    publisher = {IGI-Global},
    title = {{A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness}},
    volume = {4},
    number = {2},
    pages = {57--68},
    year = {2017}}
  • J. McAlanaey, H. Thackray, J. Taylor, C. Richardson, and H. Dogan, “Motivations, Group Processes and Decision Making of Hackers and Hacktivists,” in Symposium on Cyber Security, Foreign and Commonwealth Office, 2017.
    [Bibtex]
    @incollection{mttrd17,
    author = {J. McAlanaey and H. Thackray and J. Taylor and C. Richardson and H. Dogan},
    booktitle = {{Symposium on Cyber Security}},
    title = {{Motivations, Group Processes and Decision Making of Hackers and Hacktivists}},
    publisher = {Foreign and Commonwealth Office},
    year = {2017}}
  • J. McAlanaey, J. Taylor, S. Hodge, H. Thackray, S. James, and J. Dale, “Incorporating Psychology into Cyber Security Education,” in Proceedings of the International Workshop on Realigning Cyber Security Education, Australian Defence Force Academy, 2017.
    [Bibtex]
    @incollection{mthtjd17,
    author = {J. McAlanaey and J. Taylor and S. Hodge and H. Thackray and S. James and J. Dale},
    booktitle = {{Proceedings of the International Workshop on Realigning Cyber Security Education}},
    title = {{Incorporating Psychology into Cyber Security Education}},
    publisher = {Australian Defence Force Academy},
    year = {2017}}
  • N. Saxena, V. Katos, and N. Kumar, “Cyber-Physical Smart Grid Security Tool for Education and Training Purposes,” in Proceedings of the International Workshop on Realigning Cyber Security Education, Australian Defence Force Academy, 2017.
    [Bibtex]
    @incollection{saka17,
    author = {Neetesh Saxena and Vasilis Katos and Neeraj Kumar},
    booktitle = {{Proceedings of the International Workshop on Realigning Cyber Security Education}},
    title = {{Cyber-Physical Smart Grid Security Tool for Education and Training Purposes}},
    publisher = {Australian Defence Force Academy},
    year = {2017}}
  • K. Fysarakis, I. Askoxylakis, V. Katos, S. Ioannidis, and L. Marinos, “Security Concerns in Cooperative Intelligent Transportation Systems,” in Intrusion Detection and Prevention for Mobile Ecosystems, CRC Press, 2017, p. 487–522.
    [Bibtex]
    @incollection{faki17,
    author = {K. Fysarakis and I. Askoxylakis and V. Katos and S. Ioannidis and L. Marinos},
    booktitle = {{Intrusion Detection and Prevention for Mobile Ecosystems}},
    title = {{Security Concerns in Cooperative Intelligent Transportation Systems}},
    publisher = {CRC Press},
    pages = {487--522},
    year = {2017}}
  • E. Throm, S. Faily, H. Dogan, and A. Bishop, “Cyber Security Threats to the Future Railway,” in Poster at: Sixth International Human Factors Rail Conference, 2017.
    [Bibtex]
    @inproceedings{tfdb17,
    author = {Eylem Throm and Shamal Faily and Huseyin Dogan and Alex Bishop},
    booktitle = {{Poster at: Sixth International Human Factors Rail Conference}},
    title = {{Cyber Security Threats to the Future Railway}},
    year = {2017}}
  • N. Saxena, V. Chukwuka, L. Xiong, and S. Grijalva, “CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid,” in Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), 2017, p. 69–79.
    [Bibtex]
    @inproceedings{scxg17,
    author = {Neetesh Saxena and Victor Chukwuka and Leilei Xiong and Santiago Grijalva},
    booktitle = {{Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security \& Privacy (CPS-SPC)}},
    title = {{CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid}},
    publisher = {ACM},
    pages = {69--79},
    year = {2017}}
  • N. Saxena and N. S. Chaudhari, “Secure Algorithms for SAKA Protocol in the GSM Network,” in Proceedings of the 10th Wireless and Mobile Networking Conference (WMNC 2017), 2017, p. 1–8.
    [Bibtex]
    @inproceedings{sach17,
    author = {Neetesh Saxena and Narendra S. Chaudhari},
    booktitle = {{Proceedings of the 10th Wireless and Mobile Networking Conference (WMNC 2017)}},
    title = {{Secure Algorithms for SAKA Protocol in the GSM Network}},
    publisher = {IEEE},
    pages = {1--8},
    year = {2017}}
  • E. Apeh, “Realtime Assessment and Feedback through Cyber Security Hackathons,” in Proceedings of CELebrate 2017 Regional Teaching and Learning Conference, 2017.
    [Bibtex]
    @inproceedings{apeh171,
    author = {Edward Apeh},
    booktitle = {{Proceedings of CELebrate 2017 Regional Teaching and Learning Conference}},
    title = {{Realtime Assessment and Feedback through Cyber Security Hackathons}},
    publisher = {Bournemouth University},
    year = {2017}}
  • E. Apeh, “Analysis of the Security Implications of Wearable Technology using Socio-technical Perspective,” in Proceedings of 25th European Conference on Information Systems, 2017.
    [Bibtex]
    @inproceedings{apeh17,
    author = {Edward Apeh},
    booktitle = {{Proceedings of 25th European Conference on Information Systems}},
    title = {{Analysis of the Security Implications of Wearable Technology using Socio-technical Perspective}},
    publisher = {Association for Information Systems},
    note = {To Appear},
    year = {2017}}
  • E. Apeh and S. Jeffries, “Standard Operating Procedures for Cybercrime Investigations: A Systematic Literature Review,” in Psychological and Behavioural Examinations in Cybersecurity, IGI Global, 2017.
    [Bibtex]
    @incollection{apje17,
    author = {E. Apeh and S. Jeffries},
    booktitle = {{Psychological and Behavioural Examinations in Cybersecurity}},
    title = {{Standard Operating Procedures for Cybercrime Investigations: A Systematic Literature Review}},
    publisher = {IGI Global},
    note = {To Appear},
    year = {2017}}
  • S. Ambore, C. Richardson, H. Dogan, E. Apeh, and D. Osselton, “A Resilient Cybersecurity Framework for Mobile Financial Services (MFS),” Journal of Cyber Security Technology, p. 1–23, 2017.
    [Bibtex]
    @article{arda17,
    author = {Stephen Ambore and Christopher Richardson and Huseyin Dogan and Edward Apeh and David Osselton},
    journal = {{Journal of Cyber Security Technology}},
    publisher = {Taylor \& Francis},
    title = {{A Resilient Cybersecurity Framework for Mobile Financial Services (MFS)}},
    volume = {0},
    number = {0},
    pages = {1--23},
    year = {2017}}
  • D. Ki-Aries and S. Faily, “Persona-Centred Information Security Awareness,” Computers & Security, vol. 70, p. 6–74, 2017.
    [Bibtex]
    @article{kifa17,
    author = {Duncan Ki-Aries and Shamal Faily},
    journal = {{Computers \& Security}},
    publisher = {Elsevier},
    title = {{Persona-Centred Information Security Awareness}},
    volume = {70},
    pages = {6--74},
    Year = {2017}}
  • J. Holdsworth and E. Apeh, “An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector,” in Proceedings of 4th International Workshop on Evolving Security & Privacy Requirements Engineering, 2017.
    [Bibtex]
    @inproceedings{hoap17,
    author = {Jack Holdsworth and Edward Apeh},
    booktitle = {{Proceedings of 4th International Workshop on Evolving Security \& Privacy Requirements Engineering}},
    title = {{An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector}},
    publisher = {IEEE},
    year = {2017}}
  • S. Faily and C. Iacob, “Design as Code: Facilitating Collaboration between Usability and Security Engineers using CAIRIS,” in Proceedings of 4th International Workshop on Evolving Security & Privacy Requirements Engineering, 2017.
    [Bibtex]
    @inproceedings{faia17,
    Author = {Shamal Faily and Claudia Iacob},
    Booktitle = {{Proceedings of 4th International Workshop on Evolving Security \& Privacy Requirements Engineering}},
    Title = {{Design as Code: Facilitating Collaboration between Usability and Security Engineers using CAIRIS}},
    Publisher = {IEEE},
    Year = {2017}}
  • D. Ki-Aries, H. Dogan, S. Faily, P. Whittington, and C. Williams, “From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems,” in Proceedings of 4th International Workshop on Evolving Security & Privacy Requirements Engineering, 2017.
    [Bibtex]
    @inproceedings{kdfw17,
    Author = {Duncan Ki-Aries and Huseyin Dogan and Shamal Faily and Paul Whittington and Christopher Williams},
    Booktitle = {{Proceedings of 4th International Workshop on Evolving Security \& Privacy Requirements Engineering}},
    Title = {{From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems}},
    Publisher = {IEEE},
    Year = {2017}}
  • N. Saxena and B. J. Choi, “Integrated Distributed Authentication Protocol for Smart Grid Communications,” IEEE Systems Journal, vol. PP, iss. 99, pp. 1-12, 2017.
    [Bibtex]
    @ARTICLE{sach171,
    author={N. Saxena and B. J. Choi},
    journal={{IEEE Systems Journal}},
    title={{Integrated Distributed Authentication Protocol for Smart Grid Communications}},
    year={2017},
    volume={PP},
    number={99},
    pages={1-12}}
  • N. Saxena, S. Grijalva, V. Chukwuka, and A. V. Vasilakos, “Network Security and Privacy Challenges in Smart Vehicle-to-Grid,” IEEE Wireless Communications, vol. PP, iss. 99, p. 2–12, 2017.
    [Bibtex]
    @ARTICLE{sagc17,
    author={N. Saxena and S. Grijalva and V. Chukwuka and A. V. Vasilakos},
    journal={{IEEE Wireless Communications}},
    title={{Network Security and Privacy Challenges in Smart Vehicle-to-Grid}},
    year={2017},
    volume={PP},
    number={99},
    pages={2--12}}
  • N. Saxena and S. Grijalva, “Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication,” IEEE Transactions on Industrial Informatics, vol. 13, iss. 3, p. 1482–1491, 2017.
    [Bibtex]
    @ARTICLE{sagr171,
    author={N. Saxena and S. Grijalva},
    journal={{IEEE Transactions on Industrial Informatics}},
    title={{Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication}},
    year={2017},
    volume={13},
    number={3},
    pages={1482--1491},
    month={June}}
  • S. A. Menesidou, V. Katos, and G. Kambourakis, “Cryptographic Key Management in Delay Tolerant Networks: A Survey,” Future Internet, vol. 9, iss. 3, p. 26, 2017.
    [Bibtex]
    @Article{meka17,
    AUTHOR = {Menesidou, Sofia Anna and Katos, Vasilios and Kambourakis, Georgios},
    TITLE = {{Cryptographic Key Management in Delay Tolerant Networks: A Survey}},
    JOURNAL = {{Future Internet}},
    VOLUME = {9},
    YEAR = {2017},
    NUMBER = {3},
    PAGES = {26}}
  • H. Thackray, C. Richardson, H. Dogan, J. Taylor, and J. McAlaney, “Surveying the Hackers: The Challenges of Data Collection from a Secluded Community,” in Proceedings of 16th European Conference on Cyber Warfare and Security, 2017, p. 745–748.
    [Bibtex]
    @inproceedings{thrd17,
    Author = {Helen Thackray and Chris Richardson and Huseyin Dogan and Jacqui Taylor and John McAlaney},
    Booktitle = {{Proceedings of 16th European Conference on Cyber Warfare and Security}},
    Title = {{Surveying the Hackers: The Challenges of Data Collection from a Secluded Community}},
    Pages = {745--748},
    Year = {2017}}
  • A. M’manga, “Designing Systems for Risk Based Decision Making,” in British HCI 2017 Doctoral Consortium, 2017.
    [Bibtex]
    @inproceedings{mman17,
    Author = {Andrew M'manga},
    Booktitle = {{British HCI 2017 Doctoral Consortium}},
    Title = {{Designing Systems for Risk Based Decision Making}},
    Year = {2017}}
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “Folk Risk Analysis: Factors Influencing Security Analysts’ Interpretation of Risk,” in Proceedings of the 3rd Workshop on Security Information Workers, 2017.
    [Bibtex]
    @inproceedings{mfmw17,
    Author = {Andrew M'manga and Shamal Faily and John McAlaney and Christopher Williams},
    Booktitle = {{Proceedings of the 3rd Workshop on Security Information Workers}},
    Publisher = {USENIX Association},
    Title = {{Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk}},
    Year = {2017}}
  • J. Taylor, G. Ollis, J. McAlaney, and H. Thackray, “Observations and Reflections on Teaching Psychological Principle and Methods to Cybersecurity Students,” in Proceedings of the National Conference for Learning and Teaching in Cyber Security, 2017.
    [Bibtex]
    @inproceedings{tomh17,
    Author = {Jacqui Taylor and Gail Ollis and John McAlaney and Helen Thackray},
    Booktitle = {{Proceedings of the National Conference for Learning and Teaching in Cyber Security}},
    Title = {{Observations and Reflections on Teaching Psychological Principle and Methods to Cybersecurity Students}},
    Year = {2017}}
  • J. Henriksen-Bulmer and S. Faily, “Applying contextual integrity to open data publishing,” in Proceedings of the 31st British HCI Group Annual Conference on People and Computers: Digital Make Believe, 2017.
    [Bibtex]
    @inproceedings{hefa17,
    Author = {Jane Henriksen-Bulmer and Shamal Faily},
    Booktitle = {{Proceedings of the 31st British HCI Group Annual Conference on People and Computers: Digital Make Believe}},
    Note = {To Appear},
    Publisher = {British Computer Society},
    Title = {Applying Contextual Integrity to Open Data Publishing},
    Year = {2017}}
  • N. Jiang, H. Dogan, and F. Tian, “Designing Mobile Friendly CAPTCHAs: An Exploratory Study,” in Proceedings of the 31st British HCI Group Annual Conference on People and Computers: Digital Make Believe, 2017.
    [Bibtex]
    @inproceedings{jidt17,
    Author = {Nan Jiang and Huseyin Dogan and Feng Tian},
    Booktitle = {{Proceedings of the 31st British HCI Group Annual Conference on People and Computers: Digital Make Believe}},
    Note = {To Appear},
    Publisher = {British Computer Society},
    Title = {{Designing Mobile Friendly CAPTCHAs: An Exploratory Study}},
    Year = {2017}}
  • N. Serketzis, V. Katos, C. Ilioudis, D. Baltatzis, and G. Pangalos, “Towards a threat intelligence informed digital forensics readiness framework,” in Proceedings of the 25th European Conference on Information Systems, 2017.
    [Bibtex]
    @inproceedings{skib17,
    Author = {Nikolaos Serketzis and Vasileios Katos and Christos Ilioudis and Dimitrios Baltatzis and Georgios Pangalos},
    Booktitle = {{Proceedings of the 25th European Conference on Information Systems}},
    Note = {To Appear},
    Publisher = {Association for Information Systems},
    Title = {Towards A Threat Intelligence Informed Digital Forensics Readiness Framework},
    Year = {2017}}
  • S. Ambore, E. Apeh, H. Dogan, C. Richardson, and D. Osselton, “Development of Human Factors and Cybersecurity Objectives for Mobile Financial Service (MFS),” in Contemporary Ergonomics & Human Factors 2017, 2017.
    [Bibtex]
    @inproceedings{aadr17,
    Author = {Steven Ambore and Edward Apeh and Huseyin Dogan and Christopher Richardson and David Osselton},
    Booktitle = {{Contemporary Ergonomics \& Human Factors 2017}},
    Editor = {Rebecca Charles and John Wilkinson},
    Publisher = {Chartered Institute of Ergonomics \& Human Factors},
    Title = {{Development of Human Factors and Cybersecurity Objectives for Mobile Financial Service (MFS)}},
    Year = {2017}}
  • J. Taylor, J. McAlaney, S. Hodge, H. Thackray, C. Richardson, S. James, and J. Dale, “Teaching psychological principles to cybersecurity students,” in Proceedings of the IEEE Global Engineering Education Conference, 2017, p. 1782–1789.
    [Bibtex]
    @inproceedings{tmht17,
    Author = {Jacqui Taylor and John McAlaney and Sarah Hodge and Helen Thackray and Chris Richardson and Susie James and John Dale},
    Booktitle = {{Proceedings of the IEEE Global Engineering Education Conference}},
    Pages = {1782--1789},
    Publisher = {IEEE},
    Title = {Teaching Psychological Principles to Cybersecurity Students},
    Year = {2017}}
  • T. Tsikrika, B. Akhgar, V. Katos, S. Vrochidis, P. Burnap, and M. L. Williams, “1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web,” in Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017, p. 823–824.
    [Bibtex]
    @inproceedings{takv17,
    Author = {Tsikrika, Theodora and Akhgar, Babak and Katos, Vasilis and Vrochidis, Stefanos and Burnap, Pete and Williams, Matthew L.},
    Booktitle = {{Proceedings of the Tenth ACM International Conference on Web Search and Data Mining}},
    Pages = {823--824},
    Publisher = {ACM},
    Series = {WSDM '17},
    Title = {{1st International Workshop on Search and Mining Terrorist Online Content \& Advances in Data Science for Cyber Security and Risk on the Web}},
    Year = {2017}}
  • A. Nisioti, M. Heydari, A. Mylonas, V. Katos, and V. H. F. Tafreshi, “TRAWL: Protection against rogue sites for the masses,” in Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science, 2017, p. 120–127.
    [Bibtex]
    @inproceedings{nihm17,
    Author = {Antonia Nisioti and Mohammad Heydari and Alexios Mylonas and Vasilios Katos and Vahid Heydari Fami Tafreshi},
    Booktitle = {{Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science}},
    Pages = {120--127},
    Publisher = {IEEE},
    Title = {{TRAWL: Protection against rogue sites for the masses}},
    Year = {2017}}
  • A. Nisioti, A. Mylonas, V. Katos, P. Yoo, and A. Chryssanthou, “You Can Run but You Cannot Hide from Memory: Extracting IM Evidence of Android Apps,” in Proceedings of the 22nd IEEE Symposium on Computers and Communications, 2017.
    [Bibtex]
    @inproceedings{nimk17,
    Author = {Antonia Nisioti and Alexios Mylonas and Vasilis Katos and Paul Yoo and Anargyros Chryssanthou},
    Booktitle = {{Proceedings of the 22nd IEEE Symposium on Computers and Communications}},
    Publisher = {IEEE},
    Note = {To Appear},
    Title = {{You Can Run but You Cannot Hide from Memory: Extracting IM Evidence of Android Apps}},
    Year = {2017}}
  • N. Tsalis, A. Mylonas, A. Nisioti, D. Gritzalis, and V. Katos, “Exploring the protection of private browsing in desktop browsers,” Computers & Security, vol. 67, p. 181–197, 2017.
    [Bibtex]
    @article{tsmy17,
    Author = {N. Tsalis and A. Mylonas and A. Nisioti and D. Gritzalis and V. Katos},
    Journal = {{Computers \& Security}},
    Volume = {67},
    Pages = {181--197},
    Title = {Exploring the protection of private browsing in desktop browsers},
    Year = {2017}}
  • D. Ki-Aries, S. Faily, H. Dogan, and C. Williams, “Re-framing “The AMN”: A Case Study Eliciting and Modelling a System of Systems using the Afghan Mission Network,” in Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science, 2017, p. 103–108.
    [Bibtex]
    @inproceedings{ksdw17,
    Author = {Duncan Ki-Aries and Shamal Faily and Huseyin Dogan and Chris Williams},
    Booktitle = {{Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science}},
    Pages = {103--108},
    Publisher = {IEEE},
    Title = {{Re-framing ``The AMN'': A Case Study Eliciting and Modelling a System of Systems using the Afghan Mission Network}},
    Year = {2017}}
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “System Design Considerations for Risk Perception,” in Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science, 2017, p. 322–327.
    [Bibtex]
    @inproceedings{mafm17,
    Author = {Andrew M'manga and Shamal Faily and John McAlaney and Chris Williams},
    Booktitle = {{Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science}},
    Pages = {322--327},
    Publisher = {IEEE},
    Title = {{System Design Considerations for Risk Perception}},
    Year = {2017}}
  • J. Ward, H. Dogan, E. Apeh, A. Mylonas, and V. Katos, “Using Human Factor Approaches to an Organisation’s Bring Your Own Device scheme,” in Proceedings of the 5th International Conference on Human Aspects of Information Security, Privacy and Trust, 2017.
    [Bibtex]
    @inproceedings{wado17,
    Author = {Jodie Ward and Huseyin Dogan and Edward Apeh and Alexios Mylonas and Vasilios Katos},
    Booktitle = {{Proceedings of the 5th International Conference on Human Aspects of Information Security, Privacy and Trust}},
    Note = {To Appear},
    Publisher = {Springer},
    Title = {{Using Human Factor Approaches to an Organisation's Bring Your Own Device scheme}},
    Year = {2017}}
  • N. Saxena, B. J. Choi, and G. S., “Secure and Privacy-Preserving Concentration of Metering Data in AMI Networks,” in IEEE International Conference on Communications, 2017.
    [Bibtex]
    @inproceedings{sachgr17,
    Author = {N. Saxena and B. J. Choi and Grijava S.},
    Booktitle = {{IEEE International Conference on Communications}},
    Title = {{Secure and Privacy-Preserving Concentration of Metering Data in AMI Networks}},
    Year = {2017}}
  • N. Saxena and S. Grijavla, “Efficient signature scheme for delivering authentic control commands in the smart grid,” IEEE Transactions on Smart Grid, 2017.
    [Bibtex]
    @article{sagr17,
    Author = {N Saxena and S. Grijavla},
    Journal = {{IEEE Transactions on Smart Grid}},
    Title = {Efficient Signature Scheme for Delivering Authentic Control Commands in the Smart Grid},
    Year = {2017}}

2016

  • N. Naik, P. Jenkins, N. Savage, and V. Katos, “Big data security analysis approach using Computational Intelligence techniques in R for desktop users,” in 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 2016, p. 1–8.
    [Bibtex]
    @inproceedings{njsk16,
    Author = {N. Naik and P. Jenkins and N. Savage and V. Katos},
    Booktitle = {{2016 IEEE Symposium Series on Computational Intelligence (SSCI)}},
    Pages = {1--8},
    Title = {{Big data security analysis approach using Computational Intelligence techniques in R for desktop users}},
    Year = {2016}}
  • S. Mohammed and E. Apeh, “A Model for Social Engineering Awareness Program for Schools,” in Proceedings of the 10th International Conference on Software, Knowledge, Information Management and Applications, 2016, p. 392–397.
    [Bibtex]
    @inproceedings{moap16,
    Author = {Saba Mohammed and Edward Apeh},
    Booktitle = {{Proceedings of the 10th International Conference on Software, Knowledge, Information Management and Applications}},
    Pages = {392--397},
    Publisher = {IEEE},
    Title = {{A Model for Social Engineering Awareness Program for Schools}},
    Year = {2016}}
  • R. Rogers, E. Apeh, and C. Richardson, “Resilience of the Internet of Things (IoT) from an Information Assurance (IA) Perspective,” in Proceedings of the 10th International Conference on Software, Knowledge, Information Management and Applications, 2016.
    [Bibtex]
    @inproceedings{roar16,
    Author = {Rebecca Rogers and Edward Apeh and Chris Richardson},
    Booktitle = {{Proceedings of the 10th International Conference on Software, Knowledge, Information Management and Applications}},
    Publisher = {IEEE},
    Title = {{Resilience of the Internet of Things (IoT) from an Information Assurance (IA) Perspective}},
    Volume = {110--115},
    Year = {2016}}
  • A. M’manga, A. Cullen, and A. P. Namanya, “Understanding OAuth as a Predecessor of OpenID Connect and User Awareness of Web Single Sign On (SSO),” in Proceedings of the 32nd UK Performance Engineering Workshop & Cyber Security Workshop 2016, 2016, p. 117–125.
    [Bibtex]
    @inproceedings{macn16,
    Author = {Andrew M'manga and Andrea Cullen and Anitta Patience Namanya},
    Booktitle = {{Proceedings of the 32nd UK Performance Engineering Workshop \& Cyber Security Workshop 2016}},
    Pages = {117--125},
    Publisher = {University of Bradford},
    Title = {{Understanding OAuth as a Predecessor of OpenID Connect and User Awareness of Web Single Sign On (SSO)}},
    Year = {2016}}
  • M. Favale, N. McDonald, S. Faily, and C. Gatzidis, “Human aspects in digital rights management: the perspectives of content developers,” SCRIPTed, vol. 13, iss. 3, p. 289–304, 2016.
    [Bibtex]
    @article{famf161,
    Author = {Marcelle Favale and Neil McDonald and Shamal Faily and Christos Gatzidis},
    Journal = {{SCRIPTed}},
    Number = {3},
    Pages = {289--304},
    Title = {Human Aspects in Digital Rights Management: The Perspectives of Content Developers},
    Volume = {13},
    Year = {2016}}
  • N. Saxena, S. Grijalva, and N. S. Chaudhari, “Authentication Protocol for an IoT-Enabled LTE Network,” ACM Transactions on Internet Technology, vol. 16, iss. 4, p. 25:1 – 25:20, 2016.
    [Bibtex]
    @article{sagc16,
    Author = {N. Saxena and S. Grijalva and N. S. Chaudhari},
    Journal = {{ACM Transactions on Internet Technology}},
    Number = {4},
    Pages = {25:1 -- 25:20},
    Title = {{Authentication Protocol for an IoT-Enabled LTE Network}},
    Volume = {16},
    Year = {2016}}
  • J. McAlaney, H. Thackray, and J. Taylor, “The social psychology of cybersecurity,” The psychologist, vol. 29, p. 686–689, 2016.
    [Bibtex]
    @article{mtht16,
    Author = {John McAlaney and Helen Thackray and Jacqui Taylor},
    Journal = {The Psychologist},
    Pages = {686--689},
    Title = {The social psychology of cybersecurity},
    Volume = {29},
    Year = {2016}}
  • K. Fysarakis, I. Askoxylakis, C. Manifavas, O. Soultatos, I. Papaefstathiou, and V. Katos, “Which IoT Protocol? Comparing standardized approaches over acCommon M2M application,” in Proceedings of IEEE Global Communications Conference, 2016.
    [Bibtex]
    @inproceedings{fyas16,
    Author = {K. Fysarakis and I. Askoxylakis and C. Manifavas and O. Soultatos and I. Papaefstathiou and V. Katos},
    Booktitle = {{Proceedings of IEEE Global Communications Conference}},
    Title = {{Which IoT Protocol? Comparing standardized approaches over acCommon M2M application}},
    Year = {2016}}
  • I. Tsimperidis, S. Rostami, and V. Katos, “Age Detection Through Keystroke Dynamics from User Authentication Failures,” International journal of digital crime and forensics, vol. 9, iss. 1, p. 1–16, 2016.
    [Bibtex]
    @article{tskr16,
    Author = {I. Tsimperidis and S. Rostami and V. Katos},
    Journal = {International Journal of Digital Crime and Forensics},
    Number = {1},
    Pages = {1--16},
    Title = {{Age Detection Through Keystroke Dynamics from User Authentication Failures}},
    Volume = {9},
    Year = {2016}}
  • K. Fysarakis, O. Soultatos, C. Manifavas, I. Papaefstathiou, and I. Askoxylakis, “XSACd–-Cross-domain resource sharing & access control for smart environments,” Future generation computer systems, 2016.
    [Bibtex]
    @article{Fysarakis2016,
    Author = {Konstantinos Fysarakis and Othonas Soultatos and Charalampos Manifavas and Ioannis Papaefstathiou and Ioannis Askoxylakis},
    Journal = {Future Generation Computer Systems},
    Title = {{XSACd---Cross-domain resource sharing \& access control for smart environments}},
    Year = {2016}}
  • T. Mahmoodi, V. Kulkarni, W. Kellerer, P. Mangan, F. Zeiger, S. Spirou, I. Askoxylakis, X. Vilajosana, H. J. H.J. Einsiedler, and J. Quittek, “VirtuWind: virtual and programmable industrial network prototype deployed in operational wind park,” Transactions on emerging telecommunications technologies, vol. 27, iss. 9, pp. 1281-1288, 2016.
    [Bibtex]
    @article{makk16,
    Author = {T. Mahmoodi and V. Kulkarni and W. Kellerer and P. Mangan and F. Zeiger and S. Spirou and I. Askoxylakis and X. Vilajosana and H.J. Einsiedler, H.J. and Quittek, J.},
    Journal = {Transactions on Emerging Telecommunications Technologies},
    Number = {9},
    Pages = {1281-1288},
    Title = {{VirtuWind: virtual and programmable industrial network prototype deployed in operational wind park}},
    Volume = {27},
    Year = {2016}}
  • J. Henriksen-Bulmer and S. Jeary, “Re-identification attacks: a systematic literature review,” International Journal of Information Management, vol. 36, iss. 6, Part B, p. 1184–1192, 2016.
    [Bibtex]
    @article{hebj16,
    Author = {Jane Henriksen-Bulmer and Sheridan Jeary},
    Journal = {{International Journal of Information Management}},
    Number = {6, Part B},
    Pages = {1184--1192},
    Title = {Re-identification Attacks: A Systematic Literature Review},
    Volume = {36},
    Year = {2016}}
  • [PDF] S. Ambore, C. Richardson, H. Dogan, E. Apeh, and D. Osselton, “A “soft” approach to analysing mobile financial services sociotechnical systems,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016.
    [Bibtex]
    @inproceedings{amri16,
    Author = {Stephen Ambore and Christopher Richardson and Huseyin Dogan and Edward Apeh and David Osselton},
    Booktitle = {{Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion}},
    Note = {To Appear},
    Publisher = {British Computer Society},
    Title = {A ``Soft'' Approach to Analysing Mobile Financial Services Sociotechnical Systems},
    Year = {2016}}
  • [PDF] A. Partridge and S. Faily, “The application of useless japanese inventions for requirements elicitation in information security,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016.
    [Bibtex]
    @inproceedings{pafa16,
    Author = {Anton Partridge and Shamal Faily},
    Booktitle = {{Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion}},
    Note = {To Appear},
    Publisher = {British Computer Society},
    Title = {The Application of useless Japanese Inventions for Requirements Elicitation in Information Security},
    Year = {2016}}
  • [PDF] D. Ki-Aries, S. Faily, and K. Beckers, “Persona-Driven Information Security Awareness,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016.
    [Bibtex]
    @inproceedings{kifa16,
    Author = {Duncan Ki-Aries and Shamal Faily and Kristian Beckers},
    Booktitle = {{Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion}},
    Note = {To Appear},
    Publisher = {British Computer Society},
    Title = {{Persona-Driven Information Security Awareness}},
    Year = {2016}}
  • [PDF] S. Faily, G. Lykou, A. Partridge, D. Gritzalis, A. Mylonas, and V. Katos, “Human-Centered Specification Exemplars for Critical Infrastructure Environments,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers, 2016.
    [Bibtex]
    @inproceedings{falp16,
    Author = {Shamal Faily and Georgia Lykou and Anton Partridge and Dimitris Gritzalis and Alexios Mylonas and Vasilios Katos},
    Booktitle = {{Proceedings of the 30th British HCI Group Annual Conference on People and Computers}},
    Note = {To Appear},
    Title = {{Human-Centered Specification Exemplars for Critical Infrastructure Environments}},
    Year = {2016}}
  • [PDF] S. Faily, C. Iacob, and S. Field, “Ethical Hazards and Safeguards in Penetration Testing,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016.
    [Bibtex]
    @inproceedings{faif16,
    Author = {Shamal Faily and Claudia Iacob and Sarah Field},
    Booktitle = {{Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion}},
    Note = {To Appear},
    Publisher = {British Computer Society},
    Title = {{Ethical Hazards and Safeguards in Penetration Testing}},
    Year = {2016}}
  • [PDF] S. Faily, G. Stergiopoulos, V. Katos, and D. Gritzalis, ““water, water, every where”: nuances for a water industry critical infrastructure specification exemplar,” in Critical information infrastructures security: 10th international conference, critis 2015, berlin, germany, october 5-7, 2015, revised selected papers, E. Rome, M. Theocharidou, and S. Wolthusen, Eds., Springer International Publishing, 2016, p. 243–246.
    [Bibtex]
    @incollection{fsvg15,
    Author = {Faily, Shamal and Stergiopoulos, George and Katos, Vasilios and Gritzalis, Dimitris},
    Booktitle = {Critical Information Infrastructures Security: 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers},
    Editor = {Rome, Erich and Theocharidou, Marianthi and Wolthusen, Stephen},
    Pages = {243--246},
    Publisher = {Springer International Publishing},
    Title = {``Water, Water, Every Where'': Nuances for a Water Industry Critical Infrastructure Specification Exemplar},
    Year = {2016}}
  • N. Tsalis, A. Mylonas, and D. Gritzalis, “An intensive analysis of security and privacy browser add-ons,” in Risks and Security of Internet and Systems: 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers, C. Lambrinoudakis and A. Gabillon, Eds., Springer, 2016, p. 258–273.
    [Bibtex]
    @incollection{tsmy16,
    Author = {Tsalis, Nikolaos and Mylonas, Alexios and Gritzalis, Dimitris},
    Booktitle = {{Risks and Security of Internet and Systems: 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers}},
    Editor = {Lambrinoudakis, Costas and Gabillon, Alban},
    Pages = {258--273},
    Publisher = {Springer},
    Title = {An Intensive Analysis of Security and Privacy Browser Add-Ons},
    Year = {2016}}
  • [PDF] S. Faily, D. Power, and I. Fléchais, “Gulfs of Expectation: Eliciting and Verifying Differences in Trust Expectations using Personas,” Journal of Trust Management, vol. 3, iss. 1, p. 1–22, 2016.
    [Bibtex]
    @article{fapf16,
    Author = {Shamal Faily and David Power and Ivan Fl\'{e}chais},
    Journal = {{Journal of Trust Management}},
    Number = {1},
    Pages = {1--22},
    Title = {{Gulfs of Expectation: Eliciting and Verifying Differences in Trust Expectations using Personas}},
    Volume = {3},
    Year = {2016}}
  • A. Dimitriadis, P. S. Efraimidis, and V. Katos, “Malevolent App Pairs: An Android Permission Overpassing Scheme,” in Proceedings of the 1st International Workshop for Malicious Software and Hardware in Internet of Things (MAL-IoT 2016), 2016.
    [Bibtex]
    @inproceedings{dief16,
    Author = {Antonios Dimitriadis and Pavlos S. Efraimidis and Vasilios Katos},
    Booktitle = {{Proceedings of the 1st International Workshop for Malicious Software and Hardware in Internet of Things (MAL-IoT 2016)}},
    Title = {{Malevolent App Pairs: An Android Permission Overpassing Scheme}},
    Year = {2016}}
  • P. Palmieri, “Anonymity networks and access to information during conflicts,” in Proceedings of the 8th International Conference on Cyber Conflict (CyCon 2016), 2016.
    [Bibtex]
    @inproceedings{palm161,
    Author = {Paolo Palmieri},
    Booktitle = {{Proceedings of the 8th International Conference on Cyber Conflict (CyCon 2016)}},
    Note = {To Appear},
    Title = {{Anonymity networks and access to information during conflicts}},
    Year = {2016}}
  • C. A. Pozo, S. P. Portillo, G. Suarez-Tangil, and P. Palmieri, “Security Analysis and Exploitation of Arduino devices in the Internet of Things,” in Proceedings of the 1st international workshop for malicious software and hardware in internet of things (mal-iot 2016), 2016.
    [Bibtex]
    @inproceedings{popa16,
    Author = {Carlos Alberca Pozo and Sergio Pastrana Portillo and Guillermo Suarez-Tangil and Paolo Palmieri},
    Booktitle = {Proceedings of the 1st International Workshop for Malicious Software and Hardware in Internet of Things (MAL-IoT 2016)},
    Note = {To Appear},
    Title = {{Security Analysis and Exploitation of Arduino devices in the Internet of Things}},
    Year = {2016}}
  • [PDF] S. Faily and I. Fléchais, “Finding and Resolving Security Misusability with Misusability Cases,” Requirements Engineering, vol. 21, iss. 2, p. 209–223, 2016.
    [Bibtex]
    @article{fafl141,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Journal = {{Requirements Engineering}},
    Number = {2},
    Pages = {209--223},
    Publisher = {Springer},
    Title = {{Finding and Resolving Security Misusability with Misusability Cases}},
    Volume = {21},
    Year = {2016}}
  • [PDF] J. Henriksen-Bulmer, “A Framework for Public Bodies for Managing the Secure and Appropriate Release of Open Source Data,” in British HCI 2016 Doctoral Consortium, 2016.
    [Bibtex]
    @inproceedings{henr16,
    Author = {Jane Henriksen-Bulmer},
    Booktitle = {{British HCI 2016 Doctoral Consortium}},
    Title = {{A Framework for Public Bodies for Managing the Secure and Appropriate Release of Open Source Data}},
    Year = {2016}}
  • [PDF] H. Thackray, J. McAlaney, H. Dogan, J. Taylor, and C. Richardson, “Social Psychology: An under-used tool in Cybersecurity,” in Proceedings of the 30th British HCI Group Annual Conference on People and Security: Fusion, 2016.
    [Bibtex]
    @inproceedings{tmht16,
    Author = {Helen Thackray and John McAlaney and Huseyin Dogan and Jacqui Taylor and Christopher Richardson},
    Booktitle = {{Proceedings of the 30th British HCI Group Annual Conference on People and Security: Fusion}},
    Publisher = {BCS},
    Title = {{Social Psychology: An under-used tool in Cybersecurity}},
    Year = {2016}}
  • P. Andriotis, G. Oikonomou, A. Mylonas, and T. Tryfonas, “A Study on Usability and Security Features of the Android Pattern Lock Screen,” Information and Computer Security, vol. 24, iss. 1, p. 53–72, 2016.
    [Bibtex]
    @article{aomt16,
    Author = {P. Andriotis and G. Oikonomou and A. Mylonas and T. Tryfonas},
    Journal = {{Information and Computer Security}},
    Number = {1},
    Pages = {53--72},
    Title = {{A Study on Usability and Security Features of the Android Pattern Lock Screen}},
    Volume = {24},
    Year = {2016}}
  • N. E. Petroulakis, G. Spanoudakis, I. G. Askoxylakis, A. Miaoudakis, and A. Tragantis, “A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems,” in Proceedings of the 2015 IEEE Global Communications Conference, 2016, p. 1–6.
    [Bibtex]
    @inproceedings{pesa16,
    Author = {N. E. Petroulakis and G. Spanoudakis and I. G. Askoxylakis and A. Miaoudakis and A. Tragantis},
    Booktitle = {{Proceedings of the 2015 IEEE Global Communications Conference}},
    Pages = {1--6},
    Title = {{A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems}},
    Year = {2016}}
  • S. A. Medesidou, D. Vardalis, and V. Katos, “Automated key exchange protocol evaluation in delay tolerant networks,” Computers & security, vol. 59, p. 1–8, 2016.
    [Bibtex]
    @article{mevk16,
    Author = {S. A. Medesidou and D. Vardalis and V. Katos},
    Journal = {Computers \& Security},
    Pages = {1--8},
    Title = {Automated Key Exchange Protocol Evaluation in Delay Tolerant Networks},
    Volume = {59},
    Year = {2016}}
  • S. Medesidou and V. Katos, “Opportunistic Key Management in Delay Tolerant Networks,” International journal of information and computer security, 2016.
    [Bibtex]
    @article{meka16,
    Author = {S. Medesidou and V. Katos},
    Journal = {International Journal of Information and Computer Security},
    Title = {{Opportunistic Key Management in Delay Tolerant Networks}},
    Year = {2016}}

2015

  • E. Apeh, C. Richardson, and T. Curran, “Monitoring Social Media for Cyber-stalking,” Cyber Security Review, vol. Spring, p. 67–74, 2015.
    [Bibtex]
    @article{aprc15,
    author = {E. Apeh and C. Richardson and T. Curran},
    journal = {{Cyber Security Review}},
    publisher = {Delta Business Media},
    title = {{Monitoring Social Media for Cyber-stalking}},
    volume = {Spring},
    pages = {67--74},
    year = {2015}}
  • P. Palmieri, “Preserving context privacy in distributed hash table wireless sensor networks,” in Information and communications security – 17th international conference (icics 2015), 2015, p. 436–444.
    [Bibtex]
    @inproceedings{palm16,
    Author = {Paolo Palmieri},
    Booktitle = {Information and Communications Security - 17th International Conference (ICICS 2015)},
    Pages = {436--444},
    Publisher = {Springer},
    Title = {Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks},
    Year = {2015}}
  • N. Jiang and H. Dogan, “A Gesture-based CAPTCHA Design Supporting Mobile Devices,” in Proceedings of the 2015 british hci conference, 2015, p. 202–207.
    [Bibtex]
    @inproceedings{jido15,
    Author = {Jiang, Nan and Dogan, Huseyin},
    Booktitle = {Proceedings of the 2015 British HCI Conference},
    Pages = {202--207},
    Publisher = {ACM},
    Series = {British HCI '15},
    Title = {{A Gesture-based CAPTCHA Design Supporting Mobile Devices}},
    Year = {2015}}
  • I. Tsimperidis, V. Katos, and N. Clarke, “Language-independent gender identification through keystroke analysis,” Information and computer security, vol. 23, iss. 3, pp. 286-301, 2015.
    [Bibtex]
    @article{tskc15,
    Author = {Ioannis Tsimperidis and Vasilios Katos and Nathan Clarke},
    Journal = {Information and Computer Security},
    Number = {3},
    Pages = {286-301},
    Title = {Language-independent gender identification through keystroke analysis},
    Volume = {23},
    Year = {2015}}
  • I. Psaroudakis, V. Katos, and P. S. Efraimidis, “A novel mechanism for anonymizing global system for mobile communications calls using a resource-based session initiation protocol community network,” Security and communication networks, vol. 8, iss. 3, p. 486–500, 2015.
    [Bibtex]
    @article{pske15,
    Author = {Psaroudakis, Ioannis and Katos, Vasilios and Efraimidis, Pavlos S.},
    Journal = {Security and Communication Networks},
    Number = {3},
    Pages = {486--500},
    Title = {A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network},
    Volume = {8},
    Year = {2015}}
  • M. Tsavli, P. S. Efraimidis, V. Katos, and L. Mitrou, “Reengineering the user: privacy concerns about personal data on smartphones,” Information and computer security, vol. 23, iss. 4, pp. 394-405, 2015.
    [Bibtex]
    @article{tekm15,
    Author = {Matina Tsavli and Pavlos S. Efraimidis and Vasilios Katos and Lilian Mitrou},
    Journal = {Information and Computer Security},
    Number = {4},
    Pages = {394-405},
    Title = {Reengineering the user: privacy concerns about personal data on smartphones},
    Volume = {23},
    Year = {2015}}
  • A. Tasidou, Y. Soupionis, P. Efraimidis, L. Mitrou, and V. Katos, “Privacy-preserving, user-centric voip captcha challenges: an integrated solution in the sip environment,” Information and computer security, 2015.
    [Bibtex]
    @article{tsem15,
    Author = {A. Tasidou and Y. Soupionis and P. Efraimidis and L. Mitrou and V. Katos},
    Journal = {Information and Computer Security},
    Note = {In Press},
    Title = {Privacy-preserving, User-centric VOIP CAPTCHA Challenges: an Integrated Solution in the SIP Environment},
    Year = {2015}}
  • P. Palmieri and J. A. Pouwelse, “Paying the guard: an entry-guard-based payment system for tor,” in Financial cryptography and data security – 19th international conference, FC 2015, 2015, p. 437–444.
    [Bibtex]
    @inproceedings{papo15,
    Author = {Paolo Palmieri and Johan A. Pouwelse},
    Booktitle = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015},
    Pages = {437--444},
    Title = {Paying the Guard: An Entry-Guard-Based Payment System for Tor},
    Url = {http://dx.doi.org/10.1007/978-3-662-47854-7_26},
    Year = {2015},
    Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-662-47854-7_26}}
  • L. Calderoni, P. Palmieri, and D. Maio, “Location privacy without mutual trust: the spatial bloom filter,” Computer communications, vol. 68, p. 4–16, 2015.
    [Bibtex]
    @article{capm15,
    Author = {Luca Calderoni and Paolo Palmieri and Dario Maio},
    Journal = {Computer Communications},
    Pages = {4--16},
    Title = {Location privacy without mutual trust: The spatial Bloom filter},
    Url = {http://dx.doi.org/10.1016/j.comcom.2015.06.011},
    Volume = {68},
    Year = {2015},
    Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.comcom.2015.06.011}}
  • [PDF] R. Ali, J. McAlaney, S. Faily, K. Phalp, and V. Katos, “Mitigating Circumstances in Cybercrime: A Position Paper,” in Proceedings of the 3rd International Workshop on Cybercrime and Emerging Web Environments, 2015.
    [Bibtex]
    @inproceedings{aafp15,
    Author = {Raian Ali and John McAlaney and Shamal Faily and Keith Phalp and Vasilos Katos},
    Booktitle = {{Proceedings of the 3rd International Workshop on Cybercrime and Emerging Web Environments}},
    Note = {To Appear},
    Publisher = {IEEE},
    Title = {{Mitigating Circumstances in Cybercrime: A Position Paper}},
    Year = {2015}}
  • [PDF] A. Vallindras and S. Faily, “The Mystery of Security Design,” in Proceedings of the 2015 British Human Computer Interaction Conference , 2015, p. 316–317.
    [Bibtex]
    @inproceedings{vafa15,
    Author = {Antonios Vallindras and Shamal Faily},
    Booktitle = {{Proceedings of the 2015 British Human Computer Interaction Conference }},
    Pages = {316--317},
    Publisher = {ACM},
    Title = {{The Mystery of Security Design}},
    Year = {2015}}
  • [PDF] S. Faily and M. Jones, “Embedding professional practice into the cybersecurity curriculum using ethics,” in Proceedings of the 1st UK Workshop on Cybersecurity Training & Education, 2015.
    [Bibtex]
    @inproceedings{fajo15,
    Author = {Shamal Faily and Michael Jones},
    Booktitle = {{Proceedings of the 1st UK Workshop on Cybersecurity Training \& Education}},
    Title = {Embedding Professional Practice into the Cybersecurity Curriculum using Ethics},
    Year = {2015}}
  • [PDF] S. Faily, J. McAlaney, and C. Iacob, “Ethical Dilemmas and Dimensions in Penetration Testing,” in Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015), 2015, p. 233–242.
    [Bibtex]
    @inproceedings{fami15,
    Author = {Shamal Faily and John McAlaney and Claudia Iacob},
    Booktitle = {{Proceedings of the 9th International Symposium on Human Aspects of Information Security \& Assurance (HAISA 2015)}},
    Pages = {233--242},
    Publisher = {University of Plymouth},
    Title = {{Ethical Dilemmas and Dimensions in Penetration Testing}},
    Year = {2015}}
  • [PDF] N. McDonald, S. Faily, M. Favale, and C. Gatzidis, “Digital Rights Management: The Four Perspectives of Developers, Distributors, Users, and Lawyers,” in Proceedings of the 9th International Symposium on Human Aspects on Information Security & Assurance (HAISA 2015), 2015, p. 276–285.
    [Bibtex]
    @inproceedings{mffg15,
    Author = {Neil McDonald and Shamal Faily and Marcella Favale and Christos Gatzidis},
    Booktitle = {{Proceedings of the 9th International Symposium on Human Aspects on Information Security \& Assurance (HAISA 2015)}},
    Pages = {276--285},
    Publisher = {University of Plymouth},
    Title = {{Digital Rights Management: The Four Perspectives of Developers, Distributors, Users, and Lawyers}},
    Year = {2015}}
  • [PDF] S. Faily, “Engaging stakeholders during late stage security design with assumption personas,” Information and computer security, vol. 23, iss. 4, p. 435–446, 2015.
    [Bibtex]
    @article{fail15,
    Author = {Shamal Faily},
    Journal = {Information and Computer Security},
    Number = {4},
    Pages = {435--446},
    Title = {Engaging Stakeholders during Late Stage Security Design with Assumption Personas},
    Volume = {23},
    Year = {2015}}
  • [PDF] J. McAlaney, J. Taylor, and S. Faily, “The social psychology of cybersecurity,” in Proceedings of the 1st International Conference on Cyber Security for Sustainable Society, 2015.
    [Bibtex]
    @inproceedings{mctf15,
    Author = {John McAlaney and Jacqui Taylor and Shamal Faily},
    Booktitle = {{Proceedings of the 1st International Conference on Cyber Security for Sustainable Society}},
    Note = {To Appear},
    Publisher = {Working Papers of the SSN+},
    Title = {The Social Psychology of Cybersecurity},
    Year = {2015}}
  • [PDF] S. Faily, J. Lyle, I. Fléchais, and A. Simpson, “Usability and Security by Design: A Case Study in Research and Development,” in Proceedings of the ndss workshop on usable security, 2015.
    [Bibtex]
    @inproceedings{flfs15,
    Author = {Shamal Faily and John Lyle and Ivan Fl\'{e}chais and Andrew Simpson},
    Booktitle = {Proceedings of the NDSS Workshop on Usable Security},
    Publisher = {Internet Society},
    Title = {{Usability and Security by Design: A Case Study in Research and Development}},
    Year = {2015}}

2014

  • I. Psaroudakis, V. Katos, P. Saragiotis, and L. Mitrou, “A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol,” International journal of electronic security and digital forensics, vol. 6, iss. 4, p. 241–267, 2014.
    [Bibtex]
    @article{pksm14,
    Author = {Psaroudakis, Ioannis and Katos, Vasilios and Saragiotis, Panagiotis and Mitrou, Lilian},
    Journal = {International Journal of Electronic Security and Digital Forensics},
    Month = nov,
    Number = {4},
    Pages = {241--267},
    Publisher = {Inderscience Publishers},
    Title = {A Method for Forensic Artefact Collection, Analysis and Incident Response in Environments Running Session Initiation Protocol and Session Description Protocol},
    Volume = {6},
    Year = {2014}}
  • C. Tsochatridou, A. Arampatzis, and V. Katos, “Improving digital forensics through data mining,” in Proceedings of the 4th international conference on advances in information mining and management, 2014, p. 20–25.
    [Bibtex]
    @inproceedings{tsak14,
    Author = {C. Tsochatridou and A. Arampatzis and V. Katos},
    Booktitle = {Proceedings of the 4th International Conference on Advances in Information Mining and Management},
    Pages = {20--25},
    Title = {Improving Digital Forensics Through Data Mining},
    Year = {2014}}
  • M. Tavli, P. Efraimidis, and V. Katos, “Reengineering the user: privacy concerns about personal data on smartphones,” in Proceedings of the 8th international symposium on human aspects of information security & assurance, 2014, p. 80–89.
    [Bibtex]
    @inproceedings{taek14,
    Author = {M. Tavli and P. Efraimidis and V. Katos},
    Booktitle = {Proceedings of the 8th International Symposium on Human Aspects of Information Security \& Assurance},
    Pages = {80--89},
    Publisher = {Plymouth University},
    Title = {Reengineering the user: Privacy concerns about personal data on smartphones},
    Year = {2014}}
  • M. Sadok, V. Katos, and P. Bednar, “Developing contextual understanding of information security risks,” in Proceedings of the eighth international symposium on human aspects of information security & assurance (haisa 2014), 2014, p. 1–10.
    [Bibtex]
    @inproceedings{sakb14,
    Author = {Sadok, Moufida and Katos, Vasilios and Bednar, Peter},
    Booktitle = {Proceedings of the Eighth International Symposium on Human Aspects of Information Security \& Assurance (HAISA 2014)},
    Editor = {Clarke, Nathan and Furnell, Steven},
    Pages = {1--10},
    Publisher = {Plymouth University},
    Title = {Developing contextual understanding of information security risks},
    Year = {2014}}
  • [DOI] P. Palmieri and J. A. Pouwelse, “Key management for onion routing in a true peer to peer setting,” in Advances in information and computer security – 9th international workshop on security, IWSEC 2014, hirosaki, japan, august 27-29, 2014. proceedings, 2014, p. 62–71.
    [Bibtex]
    @inproceedings{papo14,
    Author = {Paolo Palmieri and Johan A. Pouwelse},
    Booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings},
    Doi = {10.1007/978-3-319-09843-2_5},
    Pages = {62--71},
    Title = {Key Management for Onion Routing in a True Peer to Peer Setting},
    Year = {2014},
    Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-319-09843-2_5}}
  • [DOI] P. Palmieri, L. Calderoni, and D. Maio, “Spatial bloom filters: enabling privacy in location-aware applications,” in Information security and cryptology – 10th international conference, inscrypt 2014, beijing, china, december 13-15, 2014, revised selected papers, 2014, p. 16–36.
    [Bibtex]
    @inproceedings{pacm14,
    Author = {Paolo Palmieri and Luca Calderoni and Dario Maio},
    Booktitle = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers},
    Doi = {10.1007/978-3-319-16745-9_2},
    Pages = {16--36},
    Title = {Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications},
    Year = {2014},
    Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-319-16745-9_2}}
  • G. Avoine, L. Calderoni, J. Delvaux, D. Maio, and P. Palmieri, “Passengers information in public transport and privacy: can anonymous tickets prevent tracking?,” Int j. information management, vol. 34, iss. 5, p. 682–688, 2014.
    [Bibtex]
    @article{acdp14,
    Author = {Gildas Avoine and Luca Calderoni and Jonathan Delvaux and Dario Maio and Paolo Palmieri},
    Journal = {Int J. Information Management},
    Number = {5},
    Pages = {682--688},
    Title = {Passengers information in public transport and privacy: Can anonymous tickets prevent tracking?},
    Url = {http://dx.doi.org/10.1016/j.ijinfomgt.2014.05.004},
    Volume = {34},
    Year = {2014},
    Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.ijinfomgt.2014.05.004}}
  • S. Gaitan, L. Calderoni, P. Palmieri, M. -C. Ten Veldhuis, D. Maio, and M. B. van Riemsdijk, “From sensing to action: quick and reliable access to information in cities vulnerable to heavy rain,” Sensors journal, ieee, vol. 14, iss. 12, p. 4175–4184, 2014.
    [Bibtex]
    @article{gcpt14,
    Author = {Gaitan, S. and Calderoni, L. and Palmieri, P. and Ten Veldhuis, M.-C. and Maio, D. and van Riemsdijk, M.B.},
    Journal = {Sensors Journal, IEEE},
    Month = {Dec},
    Number = {12},
    Pages = {4175--4184},
    Title = {From Sensing to Action: Quick and Reliable Access to Information in Cities Vulnerable to Heavy Rain},
    Url = {http://dx.doi.org/10.1109/JSEN.2014.2354980},
    Volume = {14},
    Year = {2014},
    Bdsk-Url-1 = {http://dx.doi.org/10.1109/JSEN.2014.2354980}}
  • [PDF] S. Faily and I. Fléchais, “Eliciting and Visualising Trust Expectations using Persona Trust Characteristics and Goal Models,” in Proceedings of the 6th International Workshop on Social Software Engineering, 2014, p. 17–24.
    [Bibtex]
    @inproceedings{fafl142,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {{Proceedings of the 6th International Workshop on Social Software Engineering}},
    Pages = {17--24},
    Publisher = {ACM},
    Title = {{Eliciting and Visualising Trust Expectations using Persona Trust Characteristics and Goal Models}},
    Year = {2014}}
  • [PDF] S. Faily, “Ethical Hacking Assessment as a Vehicle for Undergraduate Cybersecurity Education,” in Processing of the BCS 19th Annual INSPIRE Conference, 2014.
    [Bibtex]
    @inproceedings{fail141,
    Author = {Shamal Faily},
    Booktitle = {{Processing of the BCS 19th Annual INSPIRE Conference}},
    Note = {In Press},
    Title = {{Ethical Hacking Assessment as a Vehicle for Undergraduate Cybersecurity Education}},
    Year = {2014}}
  • [PDF] S. Faily, “Engaging Stakeholders in Security Design: An Assumption-Driven Approach,” in Proceedings of the 8th international symposium on human aspects of information security & assurance, 2014, pp. 21-29.
    [Bibtex]
    @inproceedings{fail14,
    Author = {Shamal Faily},
    Booktitle = {Proceedings of the 8th International Symposium on Human Aspects of Information Security \& Assurance},
    Pages = {21-29},
    Publisher = {University of Plymouth},
    Title = {{Engaging Stakeholders in Security Design: An Assumption-Driven Approach}},
    Year = {2014}}
  • [PDF] S. Faily, J. Lyle, I. Fléchais, A. Atzeni, C. Cameroni, H. Myrhaug, A. Göker, and R. Kleinfeld, “Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework,” in Proceedings of the 28th British HCI Group Annual Conference on People and Computers: Sand, sea and Sky, 2014.
    [Bibtex]
    @inproceedings{falf14,
    Author = {Shamal Faily and John Lyle and Ivan Fl\'{e}chais and Andrea Atzeni and Cesare Cameroni and Hans Myrhaug and Ayse G\"{o}ker and Robert Kleinfeld},
    Booktitle = {{Proceedings of the 28th British HCI Group Annual Conference on People and Computers: Sand, sea and Sky}},
    Note = {To Appear},
    Publisher = {British Computer Society},
    Title = {{Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework}},
    Year = {2014}}
  • [PDF] S. Faily, S. Parkin, and J. Lyle, “Evaluating the Implications of Attack and Security Patterns with Premortems,” in Cyberpatterns – Unifying Design Patterns with Security, Attack and Forensic Patterns, Springer, 2014, p. 199–209.
    [Bibtex]
    @incollection{fapl14,
    Author = {Shamal Faily and Simon Parkin and John Lyle},
    Booktitle = {{Cyberpatterns - Unifying Design Patterns with Security, Attack and Forensic Patterns}},
    Pages = {199--209},
    Publisher = {Springer},
    Title = {{Evaluating the Implications of Attack and Security Patterns with Premortems}},
    Year = {2014}}
  • K. Beckers, S. Faily, S. Lee, and N. Mead, Proceedings of the 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE ’14), IEEE, 2014.
    [Bibtex]
    @book{bflm14,
    Author = {Kristan Beckers and Shamal Faily and Seok-Won Lee and Nancy Mead},
    Publisher = {IEEE},
    Title = {{Proceedings of the 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE '14)}},
    Year = {2014}}

2013

  • N. Jiang and F. Tian, “A novel gesture-based captcha design for smart devices,” in Proceedings of the 27th international bcs human computer interaction conference, 2013, p. 49:1–49:5.
    [Bibtex]
    @inproceedings{jiti13,
    Author = {Jiang, Nan and Tian, Feng},
    Booktitle = {Proceedings of the 27th International BCS Human Computer Interaction Conference},
    Pages = {49:1--49:5},
    Publisher = {British Computer Society},
    Series = {BCS-HCI '13},
    Title = {A Novel Gesture-based CAPTCHA Design for Smart Devices},
    Year = {2013}}
  • V. Katos, F. Stowell, and P. Bednar, “Macroeconomics of privacy and security for identity management and surveillance,” Kybernetes, vol. 42, iss. 1, pp. 140-163, 2013.
    [Bibtex]
    @article{kasb13,
    Author = {Vasilios Katos and Frank Stowell and Peter Bednar},
    Journal = {Kybernetes},
    Number = {1},
    Pages = {140-163},
    Title = {Macroeconomics of privacy and security for identity management and surveillance},
    Volume = {42},
    Year = {2013}}
  • S. Shiaeles, A. Chryssanthou, and V. Katos, “On-scene triage open source forensic tool chests: are they effective?,” Digital investigation, vol. 10, iss. 2, pp. 99-115, 2013.
    [Bibtex]
    @article{shck13,
    Author = {Stavros Shiaeles and Anargyros Chryssanthou and Vasilios Katos},
    Journal = {Digital Investigation},
    Number = {2},
    Pages = {99 - 115},
    Title = {On-scene triage open source forensic tool chests: Are they effective?},
    Volume = {10},
    Year = {2013}}
  • A. Provataki and V. Katos, “Differential malware forensics,” Digital investigation, vol. 10, iss. 4, pp. 311-322, 2013.
    [Bibtex]
    @article{prka13,
    Author = {Athina Provataki and Vasilios Katos},
    Journal = {Digital Investigation},
    Number = {4},
    Pages = {311 - 322},
    Title = {Differential malware forensics},
    Volume = {10},
    Year = {2013}}
  • K. Barmpatsalou, D. Damopoulos, G. Kambourakis, and V. Katos, “A critical review of 7 years of mobile device forensics,” Digital investigation, vol. 10, iss. 4, pp. 323-349, 2013.
    [Bibtex]
    @article{bdkk13,
    Author = {Konstantia Barmpatsalou and Dimitrios Damopoulos and Georgios Kambourakis and Vasilios Katos},
    Journal = {Digital Investigation},
    Number = {4},
    Pages = {323 - 349},
    Title = {A critical review of 7 years of Mobile Device Forensics},
    Volume = {10},
    Year = {2013}}
  • S. Furnell, N. Clarke, and V. Katos, Proceedings of the european information security multi-conference, Plymouth University, 2013.
    [Bibtex]
    @book{fucn13,
    Author = {S. Furnell and N. Clarke and V. Katos},
    Publisher = {Plymouth University},
    Title = {Proceedings of the European Information Security Multi-Conference},
    Year = {2013}}
  • P. Bednar, M. Sadok, and V. Katos, “Contextual dependencies in information security systems,” in Ais sigsec and ifip tc 11.1 workshop on information security & privacy, 2013.
    [Bibtex]
    @inproceedings{besk13,
    Author = {P. Bednar and M. Sadok and V. Katos},
    Booktitle = {AIS SIGSEC and IFIP TC 11.1 Workshop on Information Security & Privacy},
    Title = {Contextual dependencies in information security systems},
    Year = {2013}}
  • I. Tsimperidis and V. Katos, “Keystroke forensics: are you typing on a desktop or a laptop?,” in Proceedings of the 6th balkan conference in informatics, 2013, p. 89–94.
    [Bibtex]
    @inproceedings{tska13,
    Author = {Tsimperidis, Ioannis and Katos, Vasilios},
    Booktitle = {Proceedings of the 6th Balkan Conference in Informatics},
    Pages = {89--94},
    Publisher = {ACM},
    Series = {BCI '13},
    Title = {Keystroke Forensics: Are You Typing on a Desktop or a Laptop?},
    Year = {2013}}
  • D. Gritzalis, Y. Soupionis, V. Katos, I. Psaroudakis, P. Katsaros, and A. Mentis, “The sphinx enigma in critical voip infrastructures: human or botnet?,” in Information, intelligence, systems and applications (iisa), 2013 fourth international conference on, 2013, pp. 1-6.
    [Bibtex]
    @inproceedings{gskp13,
    Author = {Gritzalis, D. and Soupionis, Y. and Katos, V. and Psaroudakis, I. and Katsaros, P. and Mentis, A.},
    Booktitle = {Information, Intelligence, Systems and Applications (IISA), 2013 Fourth International Conference on},
    Pages = {1-6},
    Title = {The Sphinx enigma in critical VoIP infrastructures: Human or botnet?},
    Year = {2013}}
  • N. Zeilemaker, Z. Erkin, P. Palmieri, and J. A. Pouwelse, “Building a privacy-preserving semantic overlay for peer-to-peer networks,” in Wifs, 2013, p. 79–84.
    [Bibtex]
    @inproceedings{zzpp13,
    Author = {Niels Zeilemaker and Zekeriya Erkin and Paolo Palmieri and Johan A. Pouwelse},
    Booktitle = {WIFS},
    Ee = {http://dx.doi.org/10.1109/WIFS.2013.6707798},
    Pages = {79--84},
    Title = {Building a privacy-preserving semantic overlay for Peer-to-Peer networks},
    Year = {2013}}
  • P. Palmieri and O. Pereira, “Unconditionally secure oblivious transfer from real network behavior,” in Iwsec, 2013, p. 168–182.
    [Bibtex]
    @inproceedings{pape13,
    Author = {Paolo Palmieri and Olivier Pereira},
    Booktitle = {IWSEC},
    Ee = {http://dx.doi.org/10.1007/978-3-642-41383-4_11},
    Pages = {168--182},
    Title = {Unconditionally Secure Oblivious Transfer from Real Network Behavior},
    Year = {2013}}
  • [PDF] S. Faily, D. Power, P. Armstrong, and I. Fléchais, “Formal Evaluation of Persona Trustworthiness with EUSTACE (Extended Abstract),” in Proceedings of the 6th international conference on trust & trustworthy computing, 2013, p. 267–268.
    [Bibtex]
    @inproceedings{fpaf13,
    Author = {Shamal Faily and David Power and Philip Armstrong and Ivan Fl\'{e}chais},
    Booktitle = {Proceedings of the 6th International Conference on Trust \& Trustworthy Computing},
    Pages = {267--268},
    Publisher = {Springer},
    Title = {{Formal Evaluation of Persona Trustworthiness with EUSTACE (Extended Abstract)}},
    Year = {2013}}
  • [PDF] S. Faily and J. Lyle, “Security lessons learned building concept apps for webinos,” in Human aspects in mobile apps engineering: workshop at british hci 2013, 2013.
    [Bibtex]
    @inproceedings{faly132,
    Author = {Shamal Faily and John Lyle},
    Booktitle = {Human Aspects in Mobile Apps Engineering: Workshop at British HCI 2013},
    Title = {Security Lessons Learned Building Concept Apps for webinos},
    Year = {2013}}
  • [PDF] J. Lyle, A. Paverd, J. King-Lacroix, A. Atzeni, H. Virji, I. Fléchais, and S. Faily, “Personal PKI for the smart device era,” in Public Key Infrastructures, Services and Applications (EuroPKI 2012), 2013, p. 69–84.
    [Bibtex]
    @inproceedings{lypa13,
    Author = {John Lyle and Andrew Paverd and Justin King-Lacroix and Andrea Atzeni and Habib Virji and Ivan Fl\'{e}chais and Shamal Faily},
    Booktitle = {{Public Key Infrastructures, Services and Applications (EuroPKI 2012)}},
    Pages = {69--84},
    Publisher = {Springer},
    Title = {{Personal PKI for the smart device era}},
    Year = {2013}}
  • [PDF] J. Lyle, C. Nilsson, A. Isberg, and S. Faily, “Extending the web to support personal network services,” in Proceedings of the 28th ACM Symposium on Applied Computing, 2013, p. 711–716.
    [Bibtex]
    @inproceedings{lnif13,
    Author = {John Lyle and Claes Nilsson and Anders Isberg and Shamal Faily},
    Booktitle = {{Proceedings of the 28th ACM Symposium on Applied Computing}},
    Pages = {711--716},
    Publisher = {ACM},
    Title = {{Extending the web to support personal network services}},
    Year = {2013}}
  • [PDF] S. Faily, L. Coles-Kemp, P. Dunphy, M. Just, Y. Akama, and A. De Luca, “Designing Interactive Secure Systems: CHI 2013 Special Interest Group,” in CHI ’13 Extended Abstracts on Human Factors in Computing Systems, 2013, p. 2469–2472.
    [Bibtex]
    @inproceedings{faco13,
    Author = {Faily, Shamal and Coles-Kemp, Lizzie and Dunphy, Paul and Just, Mike and Akama, Yoko and De Luca, Alexander},
    Booktitle = {{CHI '13 Extended Abstracts on Human Factors in Computing Systems}},
    Pages = {2469--2472},
    Publisher = {ACM},
    Title = {{Designing Interactive Secure Systems: CHI 2013 Special Interest Group}},
    Year = {2013}}
  • [PDF] S. Faily and J. Lyle, “Guidelines for integrating personas into software engineering tools,” in Proceedings of the 5th acm sigchi symposium on engineering interactive computing systems, 2013, p. 69–74.
    [Bibtex]
    @inproceedings{faly131,
    Author = {Shamal Faily and John Lyle},
    Booktitle = {Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems},
    Pages = {69--74},
    Publisher = {ACM},
    Series = {EICS '13},
    Title = {Guidelines for Integrating Personas into Software Engineering Tools},
    Year = {2013}}
  • [PDF] T. Su, J. Lyle, A. Atzeni, S. Faily, H. Virji, C. Ntanos, and C. Botsikas, “Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project,” in Proceedings of the 9th International Haifa Verification Conference, 2013, p. 145–150.
    [Bibtex]
    @inproceedings{sula13,
    Author = {Tao Su and John Lyle and Andrea Atzeni and Shamal Faily and Habib Virji and Christos Ntanos and Christos Botsikas},
    Booktitle = {{Proceedings of the 9th International Haifa Verification Conference}},
    Pages = {145--150},
    Publisher = {Springer},
    Title = {{Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project}},
    Year = {2013}}
  • [PDF] C. Iacob, R. Harrison, and S. Faily, “Online Reviews as First Class Artifacts in Mobile App Development,” in Proceedings of the 5th International Conference on Mobile Computing, Applications, and Services (MobiCASE), 2013, p. 47–53.
    [Bibtex]
    @inproceedings{iahf13,
    Author = {Claudia Iacob and Rachel Harrison and Shamal Faily},
    Booktitle = {{Proceedings of the 5th International Conference on Mobile Computing, Applications, and Services (MobiCASE)}},
    Pages = {47--53},
    Publisher = {Springer},
    Title = {{Online Reviews as First Class Artifacts in Mobile App Development}},
    Year = {2013}}
  • A. Atzeni, J. Lyle, and S. Faily, “Developing secure, unified multi-device and multi-domain platforms: a case study from the webinos project,” in Architectures and protocols for secure information technology, IGI Global, 2013, p. 310–333.
    [Bibtex]
    @incollection{atlf13,
    Author = {Andrea Atzeni and John Lyle and Shamal Faily},
    Booktitle = {Architectures and Protocols for Secure Information Technology},
    Pages = {310--333},
    Publisher = {IGI Global},
    Title = {Developing secure, unified multi-device and multi-domain platforms: A case study from the webinos project},
    Year = {2013}}
  • [PDF] J. Lyle, S. Faily, and M. Winandy, Proceedings of the Workshop on Web Applications and Secure Hardware (WASH ’13), CEUR Workshop Proceedings, 2013.
    [Bibtex]
    @book{lyfw13,
    Author = {John Lyle and Shamal Faily and Marcus Winandy},
    Publisher = {CEUR Workshop Proceedings},
    Title = {{Proceedings of the Workshop on Web Applications and Secure Hardware (WASH '13)}},
    Year = {2013}}

2012

  • V. Katos, “An integrated model for online transactions: illuminating the black box,” Information management & computer security, vol. 20, iss. 3, pp. 184-206, 2012.
    [Bibtex]
    @article{kat12,
    Author = {Vasilios Katos},
    Journal = {Information Management \& Computer Security},
    Number = {3},
    Pages = {184-206},
    Title = {An integrated model for online transactions: illuminating the black box},
    Volume = {20},
    Year = {2012},
    Bdsk-Url-1 = {http://dx.doi.org/10.1108/09685221211247299}}
  • S. Karayianni, V. Katos, and C. K. Georgiadis, “A framework for password harvesting from volatile memory,” International journal of electronic security and digital forensics, vol. 4, iss. 2/3, p. 154–163, 2012.
    [Bibtex]
    @article{skkg12,
    Author = {Stavroula Karayianni and Vasilios Katos and Christos K. Georgiadis},
    Journal = {International Journal of Electronic Security and Digital Forensics},
    Number = {2/3},
    Pages = {154--163},
    Title = {A framework for password harvesting from volatile memory},
    Volume = {4},
    Year = {2012}}
  • S. N. Shiaeles, V. Katos, A. S. Karakos, and B. K. Papadopoulos, “Real time \DDoS\ detection using fuzzy estimators,” Computers & security, vol. 31, iss. 6, pp. 782-790, 2012.
    [Bibtex]
    @article{skkp12,
    Author = {Stavros N. Shiaeles and Vasilios Katos and Alexandros S. Karakos and Basil K. Papadopoulos},
    Journal = {Computers \& Security},
    Number = {6},
    Pages = {782 - 790},
    Title = {Real time \{DDoS\} detection using fuzzy estimators},
    Volume = {31},
    Year = {2012}}
  • A. M. Varka and V. Katos, “On the user acceptance of graphical passwords,” in Proceedings of the 6th international symposium on human aspects of information security & assurance, 2012, p. 150–159.
    [Bibtex]
    @inproceedings{vaka12,
    Author = {A. M. Varka and V. Katos},
    Booktitle = {Proceedings of the 6th International Symposium on Human Aspects of Information Security \& Assurance},
    Pages = {150--159},
    Publisher = {Plymouth University},
    Title = {On the User Acceptance of Graphical Passwords},
    Year = {2012}}
  • A. Tasidou, P. S. Efraimidis, Y. Soupionis, L. Mitrou, and V. Katos, “User-centric, privacy-preserving adaptation for voip captcha challenges,” in Proceedings of the 6th international symposium on human aspects of information security & assurance, 2012, p. 139–149.
    [Bibtex]
    @inproceedings{tesm12,
    Author = {A. Tasidou and P. S. Efraimidis and Y. Soupionis and L. Mitrou and V. Katos},
    Booktitle = {Proceedings of the 6th International Symposium on Human Aspects of Information Security \& Assurance},
    Pages = {139--149},
    Title = {User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges},
    Year = {2012}}
  • S. Menesidou and V. Katos, “Authenticated key exchange (ake) in delay tolerant networks,” in Information security and privacy research, D. Gritzalis, S. Furnell, and M. Theoharidou, Eds., Springer Berlin Heidelberg, 2012, vol. 376, pp. 49-60.
    [Bibtex]
    @incollection{meka12,
    Author = {Menesidou, SofiaAnna and Katos, Vasilios},
    Booktitle = {Information Security and Privacy Research},
    Editor = {Gritzalis, Dimitris and Furnell, Steven and Theoharidou, Marianthi},
    Pages = {49-60},
    Publisher = {Springer Berlin Heidelberg},
    Series = {IFIP Advances in Information and Communication Technology},
    Title = {Authenticated Key Exchange (AKE) in Delay Tolerant Networks},
    Volume = {376},
    Year = {2012}}
  • I. Psaroudakis, V. Katos, and P. Efraimidis, “A framework for anonymizing gsm calls over a smartphone voip network,” in Information security and privacy research, Springer Berlin Heidelberg, 2012, vol. 376, pp. 543-548.
    [Bibtex]
    @incollection{pske12,
    Author = {Psaroudakis, Ioannis and Katos, Vasilios and Efraimidis, PavlosS.},
    Booktitle = {Information Security and Privacy Research},
    Pages = {543-548},
    Publisher = {Springer Berlin Heidelberg},
    Series = {IFIP Advances in Information and Communication Technology},
    Title = {A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network},
    Volume = {376},
    Year = {2012}}
  • N. Clarke, V. Katos, S. Menesidou, B. Ghita, and S. Furnell, “A novel security architecture for a space-data dtn,” in Wired/wireless internet communication, Springer Berlin Heidelberg, 2012, vol. 7277, pp. 342-349.
    [Bibtex]
    @incollection{ckmg21,
    Author = {Clarke, NathanL. and Katos, Vasilis and Menesidou, Sofia-Anna and Ghita, Bogdan and Furnell, Steven},
    Booktitle = {Wired/Wireless Internet Communication},
    Pages = {342-349},
    Publisher = {Springer Berlin Heidelberg},
    Series = {Lecture Notes in Computer Science},
    Title = {A Novel Security Architecture for a Space-Data DTN},
    Volume = {7277},
    Year = {2012}}
  • S. Karayianni and V. Katos, “Practical password harvesting from volatile memory,” in Global security, safety and sustainability & e-democracy, Springer Berlin Heidelberg, 2012, vol. 99, pp. 17-22.
    [Bibtex]
    @incollection{kaka12,
    Author = {Karayianni, Stavroula and Katos, Vasilios},
    Booktitle = {Global Security, Safety and Sustainability & e-Democracy},
    Pages = {17-22},
    Publisher = {Springer Berlin Heidelberg},
    Series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
    Title = {Practical Password Harvesting from Volatile Memory},
    Volume = {99},
    Year = {2012}}
  • T. Spyridopoulos and V. Katos, “Data recovery strategies for cloud environments,” in Cybercrime and cloud forensics: applications for investigation processes, IGI Global, 2012, p. 251–265.
    [Bibtex]
    @incollection{spka12,
    Author = {T. Spyridopoulos and V. Katos},
    Booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes},
    Pages = {251--265},
    Publisher = {IGI Global},
    Title = {Data recovery strategies for cloud environments},
    Year = {2012}}
  • L. Calderoni, D. Maio, and P. Palmieri, “Location-aware mobile services for a smart city: design, implementation and deployment,” Jtaer, vol. 7, iss. 3, 2012.
    [Bibtex]
    @article{camp12,
    Author = {Luca Calderoni and Dario Maio and Paolo Palmieri},
    Ee = {http://www.jtaer.com/dec2012/Calderoni_p7.pdf},
    Journal = {JTAER},
    Number = {3},
    Title = {Location-aware Mobile Services for a Smart City: Design, Implementation and Deployment},
    Volume = {7},
    Year = {2012}}
  • [PDF] C. Fuhrhop, J. Lyle, and S. Faily, “The webinos project,” in Proceedings of the 21st international conference companion on world wide web, 2012, p. 259–262.
    [Bibtex]
    @inproceedings{fuly12,
    Acmid = {2188024},
    Author = {Fuhrhop, Christian and Lyle, John and Faily, Shamal},
    Booktitle = {Proceedings of the 21st international conference companion on World Wide Web},
    Pages = {259--262},
    Publisher = {ACM},
    Series = {WWW '12 Companion},
    Title = {The webinos project},
    Year = {2012}}
  • [PDF] S. Faily, “Analysing chindogu: applying defamiliarisation to security design,” in Proceedings of the CHI 2012 Workshop on Defamiliarisation in Innovation and Usability, 2012.
    [Bibtex]
    @inproceedings{failydefam,
    Author = {Shamal Faily},
    Booktitle = {{Proceedings of the CHI 2012 Workshop on Defamiliarisation in Innovation and Usability}},
    Title = {Analysing Chindogu: Applying Defamiliarisation to Security Design},
    Year = {2012}}
  • [PDF] S. Faily and I. Fléchais, “Software for interactive secure systems design: lessons learned developing and applying cairis,” in Designing Interactive Secure Systems: Workshop at British HCI 2012, 2012.
    [Bibtex]
    @inproceedings{fafl121,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {{Designing Interactive Secure Systems: Workshop at British HCI 2012}},
    Title = {Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS},
    Year = {2012}}
  • S. Faily, J. Lyle, and S. Parkin, “Tool-supported premortems with attack and security patterns,” in Proceedings of the First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns, 2012, p. 10–11.
    [Bibtex]
    @inproceedings{falp12,
    Author = {Shamal Faily and John Lyle and Simon Parkin},
    Booktitle = {{Proceedings of the First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns}},
    Pages = {10--11},
    Title = {Tool-supported premortems with Attack and Security Patterns},
    Year = {2012}}
  • S. Faily, “Security Patterns Considered Harmful?,” in Proceedings of the Second International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns, 2012, p. 108–109.
    [Bibtex]
    @inproceedings{fail13,
    Author = {Shamal Faily},
    Booktitle = {{Proceedings of the Second International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns}},
    Pages = {108--109},
    Title = {{Security Patterns Considered Harmful?}},
    Year = {2012}}
  • [PDF] S. Faily, J. Lyle, and S. Parkin, “Secure Sytem? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems,” in Designing interactive secure systems: workshop at british hci 2012, 2012.
    [Bibtex]
    @inproceedings{falp121,
    Author = {Shamal Faily and John Lyle and Simon Parkin},
    Booktitle = {Designing Interactive Secure Systems: Workshop at British HCI 2012},
    Publisher = {British Computer Society},
    Title = {{Secure Sytem? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems}},
    Year = {2012}}
  • [PDF] S. Faily, J. Lyle, C. Namiluko, A. Atzeni, and C. Cameroni, “Model-driven architectural risk analysis using architectural and contextualised attack patterns,” in Proceedings of the workshop on model-driven security, 2012, p. 3:1–3:6.
    [Bibtex]
    @inproceedings{faln12,
    Author = {Faily, Shamal and Lyle, John and Namiluko, Cornelius and Atzeni, Andrea and Cameroni, Cesare},
    Booktitle = {Proceedings of the Workshop on Model-Driven Security},
    Pages = {3:1--3:6},
    Publisher = {ACM},
    Title = {Model-driven architectural risk analysis using architectural and contextualised attack patterns},
    Year = {2012}}
  • [PDF] J. Lyle, S. Monteleone, S. Faily, D. Patti, and F. Ricciato, “Cross-plaform access control for mobile web applications,” in Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on, 2012, p. 37–44.
    [Bibtex]
    @inproceedings{lymo12,
    Author = {John Lyle and Salvatore Monteleone and Shamal Faily and Davide Patti and Fabio Ricciato},
    Booktitle = {{Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on}},
    Pages = {37--44},
    Publisher = {IEEE},
    Title = {{Cross-plaform access control for mobile web applications}},
    Year = {2012}}
  • [PDF] J. Lyle, S. Faily, I. Fléchais, A. Paul, A. Göker, H. Myrhaug, H. Desruelle, and A. Martin, “On the design and development of webinos: a distributed mobile application middleware,” in Proceedings of the 12th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, 2012, p. 140–147.
    [Bibtex]
    @inproceedings{lyff12,
    Author = {John Lyle and Shamal Faily and Ivan Fl\'{e}chais and Andre Paul and Ayse G\"{o}ker and Hans Myrhaug and Heiko Desruelle and Andrew Martin},
    Booktitle = {{Proceedings of the 12th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems}},
    Pages = {140--147},
    Publisher = {Springer},
    Title = {{On the design and development of webinos: a distributed mobile application middleware}},
    Year = {2012}}
  • [PDF] S. Faily, J. Lyle, A. Paul, A. Atzeni, D. Blomme, H. Desruelle, and K. Bangalore, “Requirements Sensemaking using Concept Maps,” in Proceedings of the 4th International Conference on Human-Centered Software Engineering, 2012, p. 217–232.
    [Bibtex]
    @inproceedings{fapa12,
    Author = {Shamal Faily and John Lyle and Andre Paul and Andrea Atzeni and Dieter Blomme and Heiko Desruelle and Krishna Bangalore},
    Booktitle = {{Proceedings of the 4th International Conference on Human-Centered Software Engineering}},
    Pages = {217--232},
    Publisher = {Springer},
    Title = {{Requirements Sensemaking using Concept Maps}},
    Year = {2012}}
  • [PDF] S. Faily, I. Fléchais, and L. Coles-Kemp, Proceedings of Designing Interactive Secure Systems: Workshop at British HCI 2012 (DISS ’12), British Computer Society, 2012.
    [Bibtex]
    @book{fafc12,
    Author = {Shamal Faily and Ivan Fl\'{e}chais and Lizzie Coles-Kemp},
    Howpublished = {\url{http://ewic.bcs.org/content/ConWebDoc/48809}},
    Publisher = {British Computer Society},
    Title = {{Proceedings of Designing Interactive Secure Systems: Workshop at British HCI 2012 (DISS '12)}},
    Year = {2012}}

2011

  • R. E. Gunstone, “Integrating privacy during requirements capture for ubiquious computing,” in Proceedings of 1st international conference on social eco-informatics, 2011.
    [Bibtex]
    @inproceedings{gune11,
    Author = {R. E. Gunstone},
    Booktitle = {Proceedings of 1st International Conference on Social Eco-Informatics},
    Title = {Integrating privacy during requirements capture for ubiquious computing},
    Year = {2011}}
  • R. Gunstone, “Use cases and their application to ubiquitous computing technologies,” in Proceedings of bcs quality specialist group annual international software quality management conference, 2011.
    [Bibtex]
    @inproceedings{guns11,
    Author = {Richard Gunstone},
    Booktitle = {Proceedings of BCS Quality Specialist Group Annual International Software Quality Management Conference},
    Title = {Use cases and their application to ubiquitous computing technologies},
    Year = {2011}}
  • R. E. Gunstone, K. T. Phalp, and S. Jeary, “On the application of use cases for requirement capture in ubiquitous computing technologies,” in Bcs quality specialist group annual international software quality management sqm/inspire conference, 2011.
    [Bibtex]
    @inproceedings{gupj11,
    Author = {R. E. Gunstone and K. T. Phalp and S. Jeary},
    Booktitle = {BCS Quality Specialist Group Annual International Software Quality Management SQM/INSPIRE Conference},
    Title = {On the Application of Use Cases for Requirement Capture in Ubiquitous Computing Technologies},
    Year = {2011}}
  • A. Aggelis, E. T. Sarris, and V. Katos, “A location privacy extension for dvb-rcs,” Radioengineering, vol. 20, iss. 1, p. 151–158, 2011.
    [Bibtex]
    @article{agsk11,
    Author = {A. Aggelis and E. T. Sarris and V. Katos},
    Journal = {Radioengineering},
    Number = {1},
    Pages = {151--158},
    Title = {A location privacy extension for DVB-RCS},
    Volume = {20},
    Year = {2011}}
  • T. Spyridopoulos and V. Katos, “Requirements for a forensically ready cloud storage service,” International journal of digital crime and forensics, vol. 3, iss. 3, p. 19–36, 2011.
    [Bibtex]
    @article{spka111,
    Author = {Theodoros Spyridopoulos and Vasilios Katos},
    Journal = {International Journal of Digital Crime and Forensics},
    Number = {3},
    Pages = {19--36},
    Title = {Requirements for a Forensically Ready Cloud Storage Service},
    Volume = {3},
    Year = {2011}}
  • T. Spyridopoulos and V. Katos, “Towards a forensically ready cloud storage service,” in Proceedings of the 6th international workshop on digital forensics and incident analysis, 2011, p. 93–107.
    [Bibtex]
    @inproceedings{spka11,
    Author = {Theodoros Spyridopoulos and Vasilios Katos},
    Booktitle = {Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis},
    Pages = {93--107},
    Publisher = {Plymouth University},
    Title = {Towards a forensically ready cloud storage service},
    Year = {2011}}
  • P. Bednar and V. Katos, “Ssd: new challenges for digital forensics,” in Proceedings of the 8th conference of the italian chapter of the association for information systems, 2011.
    [Bibtex]
    @inproceedings{beka11,
    Author = {P. Bednar and V. Katos},
    Booktitle = {Proceedings of the 8th Conference of the Italian Chapter of the Association for Information Systems},
    Title = {SSD: New Challenges for Digital Forensics},
    Year = {2011}}
  • V. Katos, D. Vrakas, and P. Katsaros, “A framework for access control with inference constraints,” in Computer software and applications conference (compsac), 2011 ieee 35th annual, 2011, pp. 289-297.
    [Bibtex]
    @inproceedings{kavk11,
    Author = {Katos, V. and Vrakas, D. and Katsaros, P.},
    Booktitle = {Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual},
    Pages = {289-297},
    Title = {A Framework for Access Control with Inference Constraints},
    Year = {2011}}
  • V. Katos, F. Stowell, and P. Bednar, “Surveillance, privacy and the law of requisite variety,” in Data privacy management and autonomous spontaneous security, Springer Berlin Heidelberg, 2011, pp. 123-139.
    [Bibtex]
    @incollection{kasb11,
    Author = {Katos, Vasilios and Stowell, Frank and Bednar, Peter},
    Booktitle = {Data Privacy Management and Autonomous Spontaneous Security},
    Pages = {123-139},
    Publisher = {Springer Berlin Heidelberg},
    Title = {Surveillance, Privacy and the Law of Requisite Variety},
    Year = {2011}}
  • V. Katos, Symmetric cryptography in computer communications, LAP Lambert Academic Publishing, 2011.
    [Bibtex]
    @book{kato11,
    Author = {Katos, Vasilios},
    Publisher = {LAP Lambert Academic Publishing},
    Title = {Symmetric Cryptography in Computer Communications},
    Year = {2011}}
  • P. Palmieri and O. Pereira, “Secure two-party computation over a z-channel,” in Provsec, 2011, pp. 3-15.
    [Bibtex]
    @inproceedings{pape111,
    Author = {Paolo Palmieri and Olivier Pereira},
    Booktitle = {ProvSec},
    Ee = {http://dx.doi.org/10.1007/978-3-642-24316-5_3},
    Pages = {3-15},
    Title = {Secure Two-Party Computation over a Z-Channel},
    Year = {2011}}
  • P. Palmieri and O. Pereira, “Implementing information-theoretically secure oblivious transfer from packet reordering,” in Icisc, 2011, p. 332–345.
    [Bibtex]
    @inproceedings{pape11,
    Author = {Paolo Palmieri and Olivier Pereira},
    Booktitle = {ICISC},
    Ee = {http://dx.doi.org/10.1007/978-3-642-31912-9_22},
    Pages = {332--345},
    Title = {Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering},
    Year = {2011}}
  • [PDF] I. Fléchais and S. Faily, “Seeking the philosopher’s stone,” Interfaces: Quarterly Magazine of BCS Interaction Group, iss. 86, p. 14–15, 2011.
    [Bibtex]
    @article{flfa11,
    Author = {Ivan Fl\'{e}chais and Shamal Faily},
    Journal = {{Interfaces: Quarterly Magazine of BCS Interaction Group}},
    Month = {Spring},
    Number = {86},
    Pages = {14--15},
    Title = {Seeking the Philosopher's Stone},
    Year = {2011}}
  • [PDF] S. Faily and I. Fléchais, “Eliciting Usable Security Requirements with Misusability Cases,” in Proceedings of the 19th IEEE International Requirements Engineering Conference, 2011, p. 339–340.
    [Bibtex]
    @inproceedings{fafl112,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {{Proceedings of the 19th IEEE International Requirements Engineering Conference}},
    Pages = {339--340},
    Publisher = {IEEE Computer Society},
    Title = {{Eliciting Usable Security Requirements with Misusability Cases}},
    Year = {2011}}
  • [PDF] S. Faily, “Two Requirements for Usable and Secure Software Engineering,” in Proceedings of the 1st Software and Usable Security Aligned for Good Engineering (SAUSAGE) Workshop, National Institute of Standards and Technology (NIST), Gaithersburg MD, USA, 2011.
    [Bibtex]
    @inproceedings{failysausage11,
    Address = {National Institute of Standards and Technology (NIST), Gaithersburg MD, USA},
    Author = {Shamal Faily},
    Booktitle = {{Proceedings of the 1st Software and Usable Security Aligned for Good Engineering (SAUSAGE) Workshop}},
    Title = {{Two Requirements for Usable and Secure Software Engineering}},
    Year = {2011}}
  • [PDF] S. Faily, “Security goes to ground: on the applicability of Security Entrepreneurship to Grassroot Activism,” in Proceedings of the chi workshop on hci, politics and the city, 2011.
    [Bibtex]
    @inproceedings{fail112,
    Author = {Shamal Faily},
    Booktitle = {Proceedings of the CHI Workshop on HCI, Politics and the City},
    Title = {{Security goes to ground: on the applicability of Security Entrepreneurship to Grassroot Activism}},
    Year = {2011}}
  • [PDF] G. Gionis, H. Desruelle, D. Blomme, J. Lyle, S. Faily, and L. Bassbouss, ““do we know each other or is it just our devices?”: a federated context model for describing social activity across devices,” in Proceedings of the W3C Workshop: Federated Social Architectures and Protocols, 2011.
    [Bibtex]
    @inproceedings{gide11,
    Author = {George Gionis and Heiko Desruelle and Dieter Blomme and John Lyle and Shamal Faily and Louay Bassbouss},
    Booktitle = {{Proceedings of the W3C Workshop: Federated Social Architectures and Protocols}},
    Title = {``Do we know each other or is it just our Devices?'': A Federated Context Model for Describing Social Activity Across Devices},
    Year = {2011}}
  • [PDF] S. Faily, “Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases,” in Proceedings of the 5th international i* workshop, 2011, p. 114–119.
    [Bibtex]
    @inproceedings{failyre11,
    Author = {Shamal Faily},
    Booktitle = {Proceedings of the 5th International i* Workshop},
    Pages = {114--119},
    Publisher = {CEUR Workshop Proceedings},
    Title = {{Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases}},
    Year = {2011}}
  • [PDF] S. Faily and I. Fléchais, “Persona Cases: A Technique for Grounding Personas,” in Proceedings of the 29th international conference on Human factors in computing systems, 2011, p. 2267–2270.
    [Bibtex]
    @inproceedings{fafl111,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {{Proceedings of the 29th international conference on Human factors in computing systems}},
    Pages = {2267--2270},
    Publisher = {ACM},
    Title = {{Persona Cases: A Technique for Grounding Personas}},
    Year = {2011}}
  • [PDF] S. Faily and I. Fléchais, “User-centered information security policy development in a post-stuxnet world,” in Proceedings of the 6th International Conference on Availability, Reliability and Security, 2011, p. 716–721.
    [Bibtex]
    @inproceedings{fafl113,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {{Proceedings of the 6th International Conference on Availability, Reliability and Security}},
    Pages = {716--721},
    Title = {User-Centered Information Security Policy Development in a Post-Stuxnet World},
    Year = {2011}}
  • [PDF] A. Atzeni, C. Cameroni, S. Faily, J. Lyle, and I. Fléchais, “Here’s Johnny: a Methodology for Developing Attacker Personas,” in Proceedings of the 6th international conference on availability, reliability and security, 2011, p. 722–727.
    [Bibtex]
    @inproceedings{atfa11,
    Author = {Andrea Atzeni and Cesare Cameroni and Shamal Faily and John Lyle and Ivan Fl\'{e}chais},
    Booktitle = {Proceedings of the 6th International Conference on Availability, Reliability and Security},
    Pages = {722--727},
    Title = {{Here's Johnny: a Methodology for Developing Attacker Personas}},
    Year = {2011}}
  • [PDF] S. Faily and I. Fléchais, “Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework,” International journal of secure software engineering, vol. 2, iss. 4, p. 114–119, 2011.
    [Bibtex]
    @article{fafl114,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Journal = {International Journal of Secure Software Engineering},
    Number = {4},
    Pages = {114--119},
    Title = {{Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework}},
    Volume = {2},
    Year = {2011}}

2010

  • R. E. Gunstone and B. P. Weston, “Improving information sharing in major incidents using mobile devices and novel infrastructure,” Emergency services time, p. 69, 2010.
    [Bibtex]
    @article{guwe10,
    Author = {R. E. Gunstone and B. P. Weston},
    Journal = {Emergency Services Time},
    Month = {August},
    Pages = {69},
    Title = {Improving Information Sharing in Major Incidents using Mobile Devices and Novel Infrastructure},
    Year = {2010}}
  • T. Kavallaris and V. Katos, “On the detection of pod slurping attacks,” Computers & security, vol. 29, iss. 6, pp. 680-685, 2010.
    [Bibtex]
    @article{kavk10,
    Author = {Theodoros Kavallaris and Vasilios Katos},
    Journal = {Computers & Security},
    Number = {6},
    Pages = {680 - 685},
    Title = {On the detection of pod slurping attacks},
    Volume = {29},
    Year = {2010}}
  • G. Pangalos and V. Katos, “Information assurance and forensic readiness,” in Next generation society. technological and legal issues, Springer Berlin Heidelberg, 2010, pp. 181-188.
    [Bibtex]
    @incollection{paka10,
    Author = {Pangalos, Georgios and Katos, Vasilios},
    Booktitle = {Next Generation Society. Technological and Legal Issues},
    Pages = {181-188},
    Publisher = {Springer Berlin Heidelberg},
    Title = {Information Assurance and Forensic Readiness},
    Year = {2010}}
  • A. Tasidou, P. S. Efraimidis, and V. Katos, “Economics of personal data management: fair personal information trades,” in Next generation society. technological and legal issues, Springer Berlin Heidelberg, 2010, pp. 151-160.
    [Bibtex]
    @incollection{taef10,
    Author = {Tasidou, A. and Efraimidis, P.S. and Katos, V.},
    Booktitle = {Next Generation Society. Technological and Legal Issues},
    Pages = {151-160},
    Publisher = {Springer Berlin Heidelberg},
    Title = {Economics of Personal Data Management: Fair Personal Information Trades},
    Year = {2010}}
  • P. Palmieri and O. Pereira, “Building oblivious transfer on channel delays,” in Inscrypt, 2010, pp. 125-138.
    [Bibtex]
    @inproceedings{pape10,
    Author = {Paolo Palmieri and Olivier Pereira},
    Booktitle = {Inscrypt},
    Ee = {http://dx.doi.org/10.1007/978-3-642-21518-6_10},
    Pages = {125-138},
    Title = {Building Oblivious Transfer on Channel Delays},
    Year = {2010}}
  • [PDF] S. Faily and I. Fléchais, “Security through usability: a user-centered approach for balanced security policy requirements,” in Poster at: computer security applications conference, 2010. acsac ’10. annual, 2010.
    [Bibtex]
    @inproceedings{fafl109,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {Poster at: Computer Security Applications Conference, 2010. ACSAC '10. Annual},
    Month = {Dec.},
    Title = {Security through Usability: a user-centered approach for balanced security policy requirements},
    Year = {2010}}
  • [PDF] S. Faily and I. Fléchais, “Analysing and Visualising Security and Usability in IRIS,” in Proceedings of the 5th International Conference on Availability, Reliability and Security, 2010, p. 543–548.
    [Bibtex]
    @inproceedings{fafl101,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {{Proceedings of the 5th International Conference on Availability, Reliability and Security}},
    Pages = {543--548},
    Publisher = {IEEE},
    Title = {{Analysing and Visualising Security and Usability in IRIS}},
    Year = {2010}}
  • [PDF] S. Faily and I. Fléchais, “A Meta-Model for Usable Secure Requirements Engineering,” in Proceedings of the 6th international workshop on software engineering for secure systems, 2010, pp. 126-135.
    [Bibtex]
    @inproceedings{fafl102,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {Proceedings of the 6th International Workshop on Software Engineering for Secure Systems},
    Pages = {126-135},
    Publisher = {IEEE},
    Title = {{A Meta-Model for Usable Secure Requirements Engineering}},
    Year = {2010}}
  • [PDF] S. Faily and I. Fléchais, “A Model of Security Culture for e-Science,” in Proceedings of the south african information security multi-conference (saismc 2010), 2010, p. 154–164.
    [Bibtex]
    @inproceedings{fafl104,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {Proceedings of the South African Information Security Multi-Conference (SAISMC 2010)},
    Pages = {154--164},
    Publisher = {University of Plymouth},
    Title = {{A Model of Security Culture for e-Science}},
    Year = {2010}}
  • [PDF] S. Faily and I. Fléchais, “Barry is not the weakest link: eliciting secure system requirements with personas,” in Proceedings of the 24th BCS Interaction Specialist Group Conference, 2010, p. 124–132.
    [Bibtex]
    @inproceedings{fafl106,
    Author = {Faily, Shamal and Fl{\'e}chais, Ivan},
    Booktitle = {{Proceedings of the 24th BCS Interaction Specialist Group Conference}},
    Pages = {124--132},
    Publisher = {British Computer Society},
    Title = {Barry is not the weakest link: eliciting secure system requirements with personas},
    Year = {2010}}
  • [PDF] S. Faily and I. Fléchais, “To boldly go where invention isn’t secure: applying Security Entrepreneurship to secure systems design,” in Proceedings of the 2010 new security paradigms workshop, 2010, p. 73–84.
    [Bibtex]
    @inproceedings{fafl107,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {Proceedings of the 2010 New Security Paradigms Workshop},
    Pages = {73--84},
    Publisher = {ACM},
    Title = {{To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design}},
    Year = {2010}}
  • [PDF] S. Faily and I. Fléchais, “The secret lives of assumptions: developing and refining assumption personas for secure system design,” in Proceedings of the 3rd Conference on Human-Centered Software Engineering, 2010, p. 111–118.
    [Bibtex]
    @inproceedings{fafl108,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {{Proceedings of the 3rd Conference on Human-Centered Software Engineering}},
    Pages = {111--118},
    Publisher = {Springer},
    Title = {The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design},
    Year = {2010}}
  • [PDF] S. Faily and I. Fléchais, “Towards tool-support for Usable Secure Requirements Engineering with CAIRIS,” International journal of secure software engineering, vol. 1, iss. 3, p. 56–70, 2010.
    [Bibtex]
    @article{fafl103,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Journal = {International Journal of Secure Software Engineering},
    Month = {July-September},
    Number = {3},
    Organization = {IGI Global},
    Pages = {56--70},
    Title = {{Towards tool-support for Usable Secure Requirements Engineering with CAIRIS}},
    Volume = {1},
    Year = {2010}}
  • [PDF] S. Faily and I. Fléchais, “Designing and Aligning e-Science Security Culture with Design,” Information management and computer security, vol. 18, iss. 5, p. 339–349, 2010.
    [Bibtex]
    @article{fafl1010,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Journal = {Information Management and Computer Security},
    Number = {5},
    Pages = {339--349},
    Title = {{Designing and Aligning e-Science Security Culture with Design}},
    Volume = {18},
    Year = {2010}}

2009

  • R. E. Gunstone, “Advances in inter-vehicle communication systems and potential military applications,” The journal for defence engineering and science, vol. 5, p. 73–76, 2009.
    [Bibtex]
    @article{guns09,
    Author = {R. E. Gunstone},
    Journal = {The Journal for Defence Engineering and Science},
    Pages = {73--76},
    Title = {Advances in Inter-Vehicle Communication Systems and Potential Military Applications},
    Volume = {5},
    Year = {2009}}
  • V. Katos, F. Stowell, and P. Bednar, “From synergy to symbiosis: new directions in security and privacy?,” International journal of information technologies and systems approach, vol. 2, iss. 2, p. 1–14, 2009.
    [Bibtex]
    @article{kasb09,
    Author = {Vasilios Katos and Frank Stowell and Peter Bednar},
    Journal = {International Journal of Information Technologies and Systems Approach},
    Number = {2},
    Pages = {1--14},
    Title = {From Synergy to Symbiosis: New Directions in Security and Privacy?},
    Volume = {2},
    Year = {2009}}
  • P. M. Bednar, V. Katos, and C. Hennell, “On the complexity of collaborative cyber crime investigations,” in Digital evidence and electronic signature law review, 2009.
    [Bibtex]
    @inproceedings{bekh09,
    Author = {P. M. Bednar and V. Katos and C. Hennell},
    Booktitle = {Digital Evidence and Electronic Signature Law Review},
    Title = {On the complexity of collaborative cyber crime investigations},
    Volume = {6},
    Year = {2009}}
  • P. Bednar and V. Katos, “Diversity networks in digital investigations,” in Proceedings of the 4th international workshop on digital forensics & incident analysis, 2009, p. 63–71.
    [Bibtex]
    @inproceedings{beka09,
    Author = {P. Bednar and V. Katos},
    Booktitle = {Proceedings of the 4th International Workshop on Digital Forensics \& Incident Analysis},
    Pages = {63--71},
    Title = {Diversity Networks in Digital Investigations},
    Year = {2009}}
  • P. Efraimidis and V. Katos, “Probability and information theory (in greek),” in Modern cryptography: theory and applications, Papasotiriou, 2009.
    [Bibtex]
    @incollection{efka091,
    Author = {P. Efraimidis and V. Katos},
    Booktitle = {Modern Cryptography: Theory and Applications},
    Publisher = {Papasotiriou},
    Title = {Probability and Information Theory (in Greek)},
    Year = {2009}}
  • V. Katos and P. Efraimidis, “Identity assurance in the surveilliance society (in greek),” in Privacy protection in ict: technical and legal aspects, Papasotiriou, 2009.
    [Bibtex]
    @incollection{kaef09,
    Author = {V. Katos and P. Efraimidis},
    Booktitle = {Privacy Protection in ICT: Technical and Legal Aspects},
    Publisher = {Papasotiriou},
    Title = {Identity Assurance in the Surveilliance Society (in Greek)},
    Year = {2009}}
  • [PDF] S. Faily and I. Fléchais, “Context-Sensitive Requirements and Risk Management with IRIS,” in Proceedings of the 17th IEEE International Requirements Engineering Conference, 2009, p. 379–380.
    [Bibtex]
    @inproceedings{faily091,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {{Proceedings of the 17th IEEE International Requirements Engineering Conference}},
    Pages = {379--380},
    Publisher = {IEEE Computer Society},
    Title = {{Context-Sensitive Requirements and Risk Management with IRIS}},
    Year = {2009}}
  • S. Faily, “Context-Sensitive Requirements and Risk Analysis,” in Proceedings of the 17th International Conference on Requirements Engineering – Doctoral Symposium, 2009.
    [Bibtex]
    @inproceedings{failyrephd09,
    Author = {Shamal Faily},
    Booktitle = {{Proceedings of the 17th International Conference on Requirements Engineering - Doctoral Symposium}},
    Title = {{Context-Sensitive Requirements and Risk Analysis}},
    Year = {2009}}

2008

  • P. Bednar, C. Welch, and V. Katos, “Innovation management through the use of diversity networks,” International journal of knowledge and learning, vol. 4, iss. 4, p. 357–369, 2008.
    [Bibtex]
    @article{bewk08,
    Author = {Peter Bednar and Christine Welch and Vasilios Katos},
    Journal = {International Journal of Knowledge and Learning},
    Number = {4},
    Pages = {357--369},
    Title = {Innovation management through the use of diversity networks},
    Volume = {4},
    Year = {2008}}
  • V. Katos and A. Patel, “A partial equilibrium view on security and privacy,” Information management & computer security, vol. 16, iss. 1, pp. 74-83, 2008.
    [Bibtex]
    @article{kapa08,
    Author = {Vasilios Katos and Ahmed Patel},
    Journal = {Information Management \& Computer Security},
    Number = {1},
    Pages = {74-83},
    Title = {A partial equilibrium view on security and privacy},
    Volume = {16},
    Year = {2008}}
  • V. Katos and P. M. Bednar, “A cyber-crime investigation framework,” Computer standards & interfaces, vol. 30, iss. 4, pp. 223-228, 2008.
    [Bibtex]
    @article{kabe08,
    Author = {Vasilios Katos and Peter M. Bednar},
    Journal = {Computer Standards & Interfaces},
    Number = {4},
    Pages = {223 - 228},
    Title = {A cyber-crime investigation framework},
    Volume = {30},
    Year = {2008}}
  • V. Katos and S. Furnell, “The security and privacy impact of criminalising the distribution of hacking tools,” Computer fraud & security, vol. 2008, iss. 7, pp. 9-16, 2008.
    [Bibtex]
    @article{kafu08,
    Author = {Vasilios Katos and Steven Furnell},
    Journal = {Computer Fraud \& Security},
    Number = {7},
    Pages = {9 - 16},
    Title = {The security and privacy impact of criminalising the distribution of hacking tools},
    Volume = {2008},
    Year = {2008}}
  • [PDF] S. Faily, “Towards requirements engineering practice for professional end user developers: a case study,” in Proceedings of the 3rd International Workshop on Requirements Engineering Education and Training, 2008, p. 38–44.
    [Bibtex]
    @inproceedings{fail08,
    Author = {Shamal Faily},
    Booktitle = {{Proceedings of the 3rd International Workshop on Requirements Engineering Education and Training}},
    Pages = {38--44},
    Publisher = {IEEE Computer Society},
    Title = {Towards Requirements Engineering Practice for Professional End User Developers: a Case Study},
    Year = {2008}}

2007

  • C. Adams and V. Katos, “Exoinformation space audits: an information richness view of privacy and security obligations,” Journal of information privacy and security, vol. 3, iss. 3, pp. 29-44, 2007.
    [Bibtex]
    @article{adka07,
    Author = {Carl Adams and Vasilios Katos},
    Journal = {Journal of Information Privacy and Security},
    Number = {3},
    Pages = {29-44},
    Title = {Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations},
    Volume = {3},
    Year = {2007}}
  • V. Katos and B. Doherty, “Exploring confusion in product ciphers through regression analysis,” Information sciences, vol. 177, iss. 8, pp. 1789-1795, 2007.
    [Bibtex]
    @article{kado07,
    Author = {Vasilios Katos and Bernard Doherty},
    Journal = {Information Sciences},
    Number = {8},
    Pages = {1789 - 1795},
    Title = {Exploring confusion in product ciphers through regression analysis},
    Volume = {177},
    Year = {2007}}
  • V. Katos, “Network intrusion detection: evaluating cluster, discriminant, and logit analysis,” Information sciences, vol. 177, iss. 15, pp. 3060-3073, 2007.
    [Bibtex]
    @article{kato07,
    Author = {Vasilios Katos},
    Journal = {Information Sciences},
    Number = {15},
    Pages = {3060 - 3073},
    Title = {Network intrusion detection: Evaluating cluster, discriminant, and logit analysis},
    Volume = {177},
    Year = {2007}}
  • V. Katos, F. Stowell, and P. Bednar, “Quis custodiet ipsos custodies?,” Systemist, vol. 29, iss. 2, p. 96–105, 2007.
    [Bibtex]
    @article{kasb07,
    Author = {V. Katos and F. Stowell and P. Bednar},
    Journal = {Systemist},
    Number = {2},
    Pages = {96--105},
    Title = {Quis Custodiet Ipsos Custodies?},
    Volume = {29},
    Year = {2007}}
  • P. Bednar, C. Welch, and V. Katos, “Dealing with complexity in knowledge sharing processes’,” in Proceedings of the 8th european conference on knowledge management, 2007, p. 101–108.
    [Bibtex]
    @inproceedings{bewk07,
    Author = {Bednar, Peter and Welch, Christine and Katos, Vasilios},
    Booktitle = {Proceedings of the 8th European Conference on Knowledge Management},
    Pages = {101--108},
    Publisher = {ACI Academic Conferences International},
    Title = {Dealing with Complexity in Knowledge Sharing Processes{\textquoteright}},
    Year = {2007}}
  • P. M. Bednar, V. Katos, and C. Welch, “Systems analysis: exploring the spectrum of diversity,” in Proceedings of the 15th european conference on information systems, 2007, p. 647–657.
    [Bibtex]
    @inproceedings{bekw07,
    Author = {P. M. Bednar and V. Katos and C. Welch},
    Booktitle = {Proceedings of the 15th European Conference on Information Systems},
    Pages = {647--657},
    Title = {Systems analysis: Exploring the spectrum of diversity},
    Year = {2007}}
  • C. Wilson, V. Katos, and C. Strevens, “An interdisciplinary approach to forensic it and forensic psychology education,” in Fifth world conference on information security education, Springer US, 2007, pp. 65-71.
    [Bibtex]
    @incollection{wiks07,
    Author = {Wilson, Clare and Katos, Vasilios and Strevens, Caroline},
    Booktitle = {Fifth World Conference on Information Security Education},
    Pages = {65-71},
    Publisher = {Springer US},
    Title = {An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education},
    Year = {2007}}

2006

  • P. Bednar, C. Welch, and V. Katos, “Four valued logic: supporting complexity in knowledge sharing processes,” in Proceedings of the european conference on knowledge management, 2006, p. 29–35.
    [Bibtex]
    @inproceedings{bewk06,
    Author = {P. Bednar and C. Welch and V. Katos},
    Booktitle = {Proceedings of the European Conference on Knowledge Management},
    Pages = {29--35},
    Title = {Four valued logic: Supporting complexity in knowledge sharing processes},
    Year = {2006}}
  • V. Katos and I. Mavridis, “A practical location aware access control solution for html content in wireless networks,” in MediaWIN 2006, 2006, p. 44–50.
    [Bibtex]
    @inproceedings{kama06,
    Author = {V. Katos and I. Mavridis},
    Booktitle = {{MediaWIN 2006}},
    Pages = {44--50},
    Title = {A Practical Location Aware Access Control Solution for HTML Content in Wireless Networks},
    Year = {2006}}
  • V. Katos, “Forecasting volatility of active phishing sites,” Information risk mangement & audit, vol. 16, iss. 2, p. 8–11, 2006.
    [Bibtex]
    @article{kato06,
    Author = {Vasilios Katos},
    Journal = {Information Risk Mangement \& Audit},
    Number = {2},
    Pages = {8--11},
    Title = {Forecasting Volatility of Active Phishing Sites},
    Volume = {16},
    Year = {2006}}
  • V. Katos, P. Bednar, and C. Welch, “Dealing with epistemic uncertainty in the sst framework,” , F. Adam, P. Brezillon, S. Carlsson, and P. Humphreys, Eds., Decision Support Press / IFIP TC8 WG8.3, 2006, vol. 2, p. 886–903.
    [Bibtex]
    @inbook{kabw12,
    Author = {Katos, Vasilios and Bednar, Peter and Welch, Christine},
    Editor = {Adam, Frederic and Brezillon, Patrick and Carlsson, Sven and Humphreys, Patrick},
    Pages = {886--903},
    Publisher = {Decision Support Press / IFIP TC8 WG8.3},
    Series = {Creativity and Innovation in Decision-making and Decision Support},
    Title = {Dealing with epistemic uncertainty in the SST framework},
    Volume = {2},
    Year = {2006}}

2005

  • P. E. Fouliras and V. Katos, “A novel security protocol enhancement on distributed multicasting for video on demand,” in Proceedings of the 5th international network conference, 2005, p. 129–136.
    [Bibtex]
    @inproceedings{foka05,
    Author = {P. E. Fouliras and V. Katos},
    Booktitle = {Proceedings of the 5th International Network Conference},
    Pages = {129--136},
    Publisher = {Plymouth University},
    Title = {A novel security protocol enhancement on distributed multicasting for video on demand},
    Year = {2005}}
  • C. Adams and V. Katos, “Privacy challenges for location aware technologies,” in Mobile information systems ii, J. Krogstie, K. Kautz, and D. Allen, Eds., Springer US, 2005, vol. 191, pp. 303-310.
    [Bibtex]
    @incollection{adka051,
    Author = {Adams, Carl and Katos, Vasilios},
    Booktitle = {Mobile Information Systems II},
    Editor = {Krogstie, John and Kautz, Karlheinz and Allen, David},
    Pages = {303-310},
    Publisher = {Springer US},
    Series = {IFIP --- The International Federation for Information Processing},
    Title = {Privacy Challenges for Location Aware Technologies},
    Volume = {191},
    Year = {2005}}
  • V. Katos, “Statistical risk cluster analysis for network segmentation,” Information risk mangement & audit, vol. 162, iss. 1, p. 7–11, 2005.
    [Bibtex]
    @article{kato051,
    Author = {V. Katos},
    Journal = {Information Risk Mangement \& Audit},
    Number = {1},
    Pages = {7--11},
    Title = {Statistical Risk Cluster Analysis for Network Segmentation},
    Volume = {162},
    Year = {2005}}
  • V. Katos, “A randomness test for block ciphers,” Applied mathematics and computation, vol. 162, iss. 1, pp. 29-35, 2005.
    [Bibtex]
    @article{kato05,
    Author = {Vasilios Katos},
    Journal = {Applied Mathematics and Computation},
    Number = {1},
    Pages = {29 - 35},
    Title = {A randomness test for block ciphers},
    Volume = {162},
    Year = {2005}}
  • C. Adams and V. Katos, “The ubiquitous mobile and location-awareness time bomb,” Cutter it journal, vol. 18, iss. 6, p. 20–26, 2005.
    [Bibtex]
    @article{adka05,
    Author = {C. Adams and V. Katos},
    Journal = {Cutter IT Journal},
    Number = {6},
    Pages = {20--26},
    Title = {The ubiquitous mobile and location-awareness time bomb},
    Volume = {18},
    Year = {2005}}
  • V. Katos, T. King, and C. Adams, “Towards a computer based training tool for education in cryptography,” Upgrade journal, vol. 6, p. 30–35, 2005.
    [Bibtex]
    @article{kaka05,
    Author = {V. Katos and T. King and C. Adams},
    Journal = {UPGRADE Journal},
    Pages = {30--35},
    Title = {Towards a Computer Based Training Tool for Education in Cryptography},
    Volume = {6},
    Year = {2005}}
  • V. Katos and C. Adams, “Modelling corporate wireless security and privacy,” The journal of strategic information systems, vol. 14, iss. 3, pp. 307-321, 2005.
    [Bibtex]
    @article{kaad05,
    Author = {Vasilios Katos and Carl Adams},
    Journal = {The Journal of Strategic Information Systems},
    Number = {3},
    Pages = {307 - 321},
    Title = {Modelling corporate wireless security and privacy},
    Volume = {14},
    Year = {2005}}
  • S. Faily, “Does Object-Oriented Domain Analysis Work?,” Newsletter of the British Computer Society Requirements Engineering Specialist Interest Group, iss. 37, pp. 10-11, 2005.
    [Bibtex]
    @article{fail05,
    Author = {Shamal Faily},
    Journal = {{Newsletter of the British Computer Society Requirements Engineering Specialist Interest Group}},
    Number = {37},
    Pages = {10-11},
    Title = {{Does Object-Oriented Domain Analysis Work?}},
    Year = {2005}}

2004

  • V. Katos, “Risk cluster analysis for network segmentation,” in Proceedings of the fourth international network conference, 2004, p. 111–119.
    [Bibtex]
    @inproceedings{kato041,
    Author = {V. Katos},
    Booktitle = {Proceedings of the Fourth International Network Conference},
    Pages = {111--119},
    Publisher = {Plymouth University},
    Title = {Risk Cluster Analysis for Network Segmentation},
    Year = {2004}}
  • V. Katos, “Diffusion behaviour of cryptographic primitives in feistel networks,” in Proceedings of the 2nd international workshop on security in information systems, 2004, p. 79–87.
    [Bibtex]
    @inproceedings{kato04,
    Author = {V. Katos},
    Booktitle = {Proceedings of the 2nd International Workshop on Security in Information Systems},
    Pages = {79--87},
    Publisher = {Insticc Press},
    Title = {Diffusion Behaviour of Cryptographic Primitives in Feistel Networks},
    Year = {2004}}

2002

  • E. Kalentzi, V. Katos, and C. Batzios, “On the scalability of the BRODESSYS decision support system,” in Proceedings of the 6th world multiconference in systemics, cybernetics and informatics, 2002.
    [Bibtex]
    @inproceedings{kakb02,
    Author = {E. Kalentzi and V. Katos and C. Batzios},
    Booktitle = {Proceedings of the 6th World Multiconference in Systemics, Cybernetics and Informatics},
    Title = {{On the scalability of the BRODESSYS decision support system}},
    Year = {2002}}

2001

  • V. Katos and W. Alyea, “Trust models for access control,” Journal of information technology impact, vol. 2, iss. 3, p. 117–123, 2001.
    [Bibtex]
    @article{kaal01,
    Author = {V. Katos and W. Alyea},
    Journal = {Journal of Information Technology Impact},
    Number = {3},
    Pages = {117--123},
    Title = {Trust Models for Access Control},
    Volume = {2},
    Year = {2001}}
  • A. Chrysanthou and V. Katos, “Assessing forensic readiness,” in Proceedings of the 7th international workshop on digital forensics and incident analysis, .
    [Bibtex]
    @inproceedings{chka12,
    Author = {Anargyros Chrysanthou and Vasilios Katos},
    Booktitle = {Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis},
    Publisher = {Plymouth University},
    Title = {Assessing forensic readiness}}