Skip to main content

Research Repository

Advanced Search

All Outputs (32)

Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations (2015)
Journal Article
Andriotis, P., Oikonomou, G., Tryfonas, T., & Li, S. (2016). Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations. IEEE Transactions on Cybernetics, 46(9), 1974-1985. https://doi.org/10.1109/TCYB.2015.2454733

© 2013 IEEE. Social media networks are becoming increasingly popular because they can satisfy diverse needs of individuals (both personal and professional). Modern mobile devices are empowered with increased capabilities, taking advantage of the tech... Read More about Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Journal Article
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘norm... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

A framework for describing multimedia circulation in a smartphone ecosystem (2015)
Journal Article
Andriotis, P., Tryfonas, T., Oikonomou, G., & King, I. (2015). A framework for describing multimedia circulation in a smartphone ecosystem. IFIP Advances in Information and Communication Technology, 462, 251-267. https://doi.org/10.1007/978-3-319-24123-4_15

© IFIP International Federation for Information Processing 2015. Contemporary mobile devices allow almost unrestricted sharing of multimedia and other types of files. However, because smartphones and tablets can easily access the Internet and exchang... Read More about A framework for describing multimedia circulation in a smartphone ecosystem.

Messaging activity reconstruction with sentiment polarity identification (2015)
Journal Article
Andriotis, P., & Oikonomou, G. (2015). Messaging activity reconstruction with sentiment polarity identification. Lecture Notes in Artificial Intelligence, 9190, 475-486. https://doi.org/10.1007/978-3-319-20376-8_42

© Springer International Publishing Switzerland 2015. Sentiment Analysis aims to extract information related to the emotional state of the person that produced a text document and also describe the sentiment polarity of the short or long message. Thi... Read More about Messaging activity reconstruction with sentiment polarity identification.

An extensible platform for the forensic analysis of social media data (2015)
Journal Article
Read, H., Xynos, K., Sutherland, I., Roarson, F., Andriotis, P., & Oikonomou, G. (2015). An extensible platform for the forensic analysis of social media data. Lecture Notes in Artificial Intelligence, 9190, 404-414. https://doi.org/10.1007/978-3-319-20376-8_36

© Springer International Publishing Switzerland 2015. Visualising data is an important part of the forensic analysis process. Many cell phone forensic tools have specialised visualisation components, but are as of yet able to tackle questions concern... Read More about An extensible platform for the forensic analysis of social media data.

On the development of automated forensic analysis methods for mobile devices (2014)
Journal Article
Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., …Prevelakis, V. (2014). On the development of automated forensic analysis methods for mobile devices. Lecture Notes in Artificial Intelligence, 8564 LNCS, 212-213. https://doi.org/10.1007/978-3-319-08593-7_17

We live in a connected world where mobile devices are used by humans as valuable tools. The use of mobile devices leaves traces that can be treasured assets for a forensic analyst. Our aim is to investigate methods and exercise techniques that will m... Read More about On the development of automated forensic analysis methods for mobile devices.

Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method (2014)
Journal Article
Andriotis, P., Tryfonas, T., & Oikonomou, G. (2014). Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. Lecture Notes in Artificial Intelligence, 8533 LNCS, 115-126. https://doi.org/10.1007/978-3-319-07620-1_11

One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system. In this paper we investigate the impact of password strength meters on the... Read More about Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method.

Smartphone message sentiment analysis (2014)
Book Chapter
Andriotis, P., Takasu, A., & Tryfonas, T. (2014). Smartphone message sentiment analysis. In G. Peterson, & S. Shenoi (Eds.), Advances in Digital Forensics X (253-265). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-44952-3_17

Humans tend to use specific words to express their emotional states in written and oral communications. Scientists in the area of text mining and natural language processing have studied sentiment fingerprints residing in text to extract the emotiona... Read More about Smartphone message sentiment analysis.

A pilot study on the security of pattern screen-lock methods and soft side channel attacks (2013)
Conference Proceeding
Andriotis, P., Tryfonas, T., Oikonomou, G., & Yildiz, C. (2013). A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In L. Buttyan, A. Sadeghi, & M. Gruteser (Eds.), Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (1-6). https://doi.org/10.1145/2462096.2462098

Graphical passwords that allow a user to unlock a smartphone's screen are one of the Android operating system's features and many users prefer them instead of traditional textbased codes. A variety of attacks has been proposed against this mechanism,... Read More about A pilot study on the security of pattern screen-lock methods and soft side channel attacks.

Multilevel visualization using enhanced social network analysis with smartphone data (2013)
Journal Article
Andriotis, P., Tzermias, Z., Mparmpaki, A., Ioannidis, S., & Oikonomou, G. (2013). Multilevel visualization using enhanced social network analysis with smartphone data. International Journal of Digital Crime and Forensics, 5(4), 34-54. https://doi.org/10.4018/ijdcf.2013100103

While technology matures and becomes more productive, mobile devices can be affordable and, consequently, fully integrated in peopleàs lives. After their unexpected bloom and acceptance, Online Social Networks are now sources of valuable information.... Read More about Multilevel visualization using enhanced social network analysis with smartphone data.

JPEG steganography detection with Benford's Law (2013)
Journal Article
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2013). JPEG steganography detection with Benford's Law. Digital Investigation, 9(3-4), 246-257. https://doi.org/10.1016/j.diin.2013.01.005

In this paper we present a novel approach to the problem of steganography detection in JPEG images by applying a statistical attack. The method is based on the empirical Benford's Law and, more specifically, on its generalized form. We prove and exte... Read More about JPEG steganography detection with Benford's Law.

Forensic analysis of wireless networking evidence of Android smartphones (2012)
Conference Proceeding
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2012). Forensic analysis of wireless networking evidence of Android smartphones. In 2012 IEEE International Workshop on Information Forensics and Security (WIFS) (109-114). https://doi.org/10.1109/WIFS.2012.6412634

This paper introduces a method for acquiring forensic-grade evidence from Android smartphones using open source tools. We investigate in particular cases where the suspect has made use of the smartphone's Wi-Fi or Bluetooth interfaces. We discuss the... Read More about Forensic analysis of wireless networking evidence of Android smartphones.