Skip to main content

Research Repository

Advanced Search

All Outputs (22)

Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification (2022)
Journal Article
McCarthy, A., Ghadafi, E., Andriotis, P., & Legg, P. (2023). Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification. Journal of Information Security and Applications, 72, Article 103398. https://doi.org/10.1016/j.jisa.2022.103398

Machine learning is key for automated detection of malicious network activity to ensure that computer networks and organizations are protected against cyber security attacks. Recently, there has been growing interest in the domain of adversarial mach... Read More about Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification.

AI hyped? A horizon scan of discourse on artificial intelligence in education (AIED) and development (2022)
Journal Article
Nemorin, S., Vlachidis, A., Ayerakwa, H. M., & Andriotis, P. (2023). AI hyped? A horizon scan of discourse on artificial intelligence in education (AIED) and development. Learning, Media and Technology, 48(1), 38-51. https://doi.org/10.1080/17439884.2022.2095568

The study seeks to understand how the AI ecosystem might be implicated in a form of knowledge production which reifies particular kinds of epistemologies over others. Using text mining and thematic analysis, this paper offers a horizon scan of the ke... Read More about AI hyped? A horizon scan of discourse on artificial intelligence in education (AIED) and development.

Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey (2022)
Journal Article
McCarthy, A., Ghadafi, E., Andriotis, P., & Legg, P. (2022). Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey. Journal of Cybersecurity and Privacy, 2(1), 154-190. https://doi.org/10.3390/jcp2010010

Machine learning has become widely adopted as a strategy for dealing with a variety of cybersecurity issues, ranging from insider threat detection to intrusion and malware detection. However, by their very nature, machine learning systems can introdu... Read More about Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey.

MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version) (2019)
Journal Article
Onwuzurike, L., Mariconti, E., Andriotis, P., De Cristofaro, E., Ross, G., & Stringhini, G. (2019). MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version). ACM Transactions on Privacy and Security, 22(2), Article 14. https://doi.org/10.1145/3313391

As Android has become increasingly popular, so has malware targeting it, thus motivating the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard... Read More about MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version).

Distributed consensus algorithm for events detection in cyber-physical systems (2019)
Journal Article
Li, S., Zhao, S., Yang, P., Andriotis, P., Xu, L., & Sun, Q. (2019). Distributed consensus algorithm for events detection in cyber-physical systems. IEEE Internet of Things, 6(2), 2299-2308. https://doi.org/10.1109/JIOT.2019.2906157

In the harsh environmental conditions of cyber-physical systems (CPSs), the consensus problem seems to be one of the central topics that affect the performance of consensus-based applications, such as events detection, estimation, tracking, blockchai... Read More about Distributed consensus algorithm for events detection in cyber-physical systems.

Studying users’ adaptation to Android's run-time fine-grained access control system (2018)
Journal Article
Andriotis, P., Stringhini, G., & Sasse, A. (2018). Studying users’ adaptation to Android's run-time fine-grained access control system. Journal of Information Security and Applications, 40, 31-43. https://doi.org/10.1016/j.jisa.2018.02.004

© 2018 Elsevier Ltd The advent of the sixth Android version brought a significant security and privacy advancement to its users. The platform's security model has changed dramatically, allowing users to grant or deny access to resources when requeste... Read More about Studying users’ adaptation to Android's run-time fine-grained access control system.

A comparative study of android users’ privacy preferences under the runtime permission model (2017)
Journal Article
Andriotis, P., Li, S., Spyridopoulos, T., & Stringhini, G. (2017). A comparative study of android users’ privacy preferences under the runtime permission model. Lecture Notes in Artificial Intelligence, 10292 LNCS, 604-622. https://doi.org/10.1007/978-3-319-58460-7_42

© Springer International Publishing AG 2017. Android users recently were given the ability to selectively grant access to sensitive resources of their mobile devices when apps request them at runtime. The Android fine-grained runtime permission model... Read More about A comparative study of android users’ privacy preferences under the runtime permission model.

Privacy decision-making in the digital era: A game theoretic review (2017)
Journal Article
Anastasopoulou, K., Kokolakis, S., & Andriotis, P. (2017). Privacy decision-making in the digital era: A game theoretic review. Lecture Notes in Artificial Intelligence, 10292 LNCS, 589-603. https://doi.org/10.1007/978-3-319-58460-7_41

© Springer International Publishing AG 2017. Information privacy is constantly negotiated when people interact with enterprises and government agencies via the Internet. In this context, all relevant stakeholders take privacy-related decisions. Indiv... Read More about Privacy decision-making in the digital era: A game theoretic review.

Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network (2016)
Journal Article
Li, S., Tryfonas, T., Russell, G., & Andriotis, P. (2016). Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network. IEEE Transactions on Cybernetics, 46(8), 1749-1759. https://doi.org/10.1109/TCYB.2016.2537649

© 2015 IEEE. Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess... Read More about Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.

A study on usability and security features of the Android pattern lock screen (2016)
Journal Article
Andriotis, P., Oikonomou, G., Mylonas, A., & Tryfonas, T. (2016). A study on usability and security features of the Android pattern lock screen. Information and Computer Security, 24(1), 53-72. https://doi.org/10.1108/ICS-01-2015-0001

© Emerald Group Publishing Limited. Purpose: - The Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by the visual representation of a password, which enhance its memora... Read More about A study on usability and security features of the Android pattern lock screen.

Mass surveillance in cyberspace and the lost art of keeping a secret: Policy lessons for government after the snowden leaks (2016)
Journal Article
Tryfonas, T., Carter, M., Crick, T., & Andriotis, P. (2016). Mass surveillance in cyberspace and the lost art of keeping a secret: Policy lessons for government after the snowden leaks. Lecture Notes in Artificial Intelligence, 9750, 174-185. https://doi.org/10.1007/978-3-319-39381-0_16

© Springer International Publishing Switzerland 2016. Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which w... Read More about Mass surveillance in cyberspace and the lost art of keeping a secret: Policy lessons for government after the snowden leaks.

Optimizing short message text sentiment analysis for mobile device forensics (2016)
Journal Article
Aboluwarin, O., Andriotis, P., Takasu, A., & Tryfonas, T. (2016). Optimizing short message text sentiment analysis for mobile device forensics. IFIP Advances in Information and Communication Technology, 484, 69-87. https://doi.org/10.1007/978-3-319-46279-0_4

© IFIP International Federation for Information Processing 2016. Mobile devices are now the dominant medium for communications. Humans express various emotions when communicating with others and these communications can be analyzed to deduce their em... Read More about Optimizing short message text sentiment analysis for mobile device forensics.

Impact of user data privacy management controls on mobile device investigations (2016)
Journal Article
Andriotis, P., & Tryfonas, T. (2016). Impact of user data privacy management controls on mobile device investigations. IFIP Advances in Information and Communication Technology, 484, 89-105. https://doi.org/10.1007/978-3-319-46279-0_5

© IFIP International Federation for Information Processing 2016. There are many different types of mobile device users, but most of them do not seek to expand the functionality of their smartphones and prefer to interact with them using predefined us... Read More about Impact of user data privacy management controls on mobile device investigations.

Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations (2015)
Journal Article
Andriotis, P., Oikonomou, G., Tryfonas, T., & Li, S. (2016). Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations. IEEE Transactions on Cybernetics, 46(9), 1974-1985. https://doi.org/10.1109/TCYB.2015.2454733

© 2013 IEEE. Social media networks are becoming increasingly popular because they can satisfy diverse needs of individuals (both personal and professional). Modern mobile devices are empowered with increased capabilities, taking advantage of the tech... Read More about Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations.

An extensible platform for the forensic analysis of social media data (2015)
Journal Article
Read, H., Xynos, K., Sutherland, I., Roarson, F., Andriotis, P., & Oikonomou, G. (2015). An extensible platform for the forensic analysis of social media data. Lecture Notes in Artificial Intelligence, 9190, 404-414. https://doi.org/10.1007/978-3-319-20376-8_36

© Springer International Publishing Switzerland 2015. Visualising data is an important part of the forensic analysis process. Many cell phone forensic tools have specialised visualisation components, but are as of yet able to tackle questions concern... Read More about An extensible platform for the forensic analysis of social media data.

Messaging activity reconstruction with sentiment polarity identification (2015)
Journal Article
Andriotis, P., & Oikonomou, G. (2015). Messaging activity reconstruction with sentiment polarity identification. Lecture Notes in Artificial Intelligence, 9190, 475-486. https://doi.org/10.1007/978-3-319-20376-8_42

© Springer International Publishing Switzerland 2015. Sentiment Analysis aims to extract information related to the emotional state of the person that produced a text document and also describe the sentiment polarity of the short or long message. Thi... Read More about Messaging activity reconstruction with sentiment polarity identification.

A framework for describing multimedia circulation in a smartphone ecosystem (2015)
Journal Article
Andriotis, P., Tryfonas, T., Oikonomou, G., & King, I. (2015). A framework for describing multimedia circulation in a smartphone ecosystem. IFIP Advances in Information and Communication Technology, 462, 251-267. https://doi.org/10.1007/978-3-319-24123-4_15

© IFIP International Federation for Information Processing 2015. Contemporary mobile devices allow almost unrestricted sharing of multimedia and other types of files. However, because smartphones and tablets can easily access the Internet and exchang... Read More about A framework for describing multimedia circulation in a smartphone ecosystem.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Journal Article
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘norm... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

On the development of automated forensic analysis methods for mobile devices (2014)
Journal Article
Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., …Prevelakis, V. (2014). On the development of automated forensic analysis methods for mobile devices. Lecture Notes in Artificial Intelligence, 8564 LNCS, 212-213. https://doi.org/10.1007/978-3-319-08593-7_17

We live in a connected world where mobile devices are used by humans as valuable tools. The use of mobile devices leaves traces that can be treasured assets for a forensic analyst. Our aim is to investigate methods and exercise techniques that will m... Read More about On the development of automated forensic analysis methods for mobile devices.

Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method (2014)
Journal Article
Andriotis, P., Tryfonas, T., & Oikonomou, G. (2014). Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. Lecture Notes in Artificial Intelligence, 8533 LNCS, 115-126. https://doi.org/10.1007/978-3-319-07620-1_11

One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system. In this paper we investigate the impact of password strength meters on the... Read More about Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method.