Skip to main content

Research Repository

Advanced Search

All Outputs (5)

System dynamics approach to malicious insider cyber-threat modelling and analysis (2017)
Journal Article
Fagade, T., Spyridopoulos, T., Albishry, N., & Tryfonas, T. (2017). System dynamics approach to malicious insider cyber-threat modelling and analysis. Lecture Notes in Artificial Intelligence, 10292 LNCS, 309-321. https://doi.org/10.1007/978-3-319-58460-7_21

© Springer International Publishing AG 2017. Enforcing cybersecurity controls against malicious insiders touches upon complex issues like people, process and technology. In large and complex systems, addressing the problem of insider cyber threat inv... Read More about System dynamics approach to malicious insider cyber-threat modelling and analysis.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Journal Article
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘norm... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

Application of a game theoretic approach in smart sensor data trustworthiness problems (2015)
Journal Article
Maraslis, K., Spyridopoulos, T., Oikonomou, G., Tryfonas, T., & Haghighi, M. (2015). Application of a game theoretic approach in smart sensor data trustworthiness problems. IFIP Advances in Information and Communication Technology, 455, 601-615. https://doi.org/10.1007/978-3-319-18467-8_40

© IFIP International Federation for Information Processing 2015. In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for Wireless Sensor Networks (WSNs). The attacker’s goal is to compromise the deployment by ca... Read More about Application of a game theoretic approach in smart sensor data trustworthiness problems.

Applying the ACPO guidelines to building automation systems (2015)
Journal Article
Sutherland, I., Spyridopoulos, T., Read, H., Jones, A., Sutherland, G., & Burgess, M. (2015). Applying the ACPO guidelines to building automation systems. Lecture Notes in Artificial Intelligence, 9190, 684-692. https://doi.org/10.1007/978-3-319-20376-8_61

© Springer International Publishing Switzerland 2015. The increasing variety of Internet enabled hardware devices is creating a world of semi-autonomous, interconnected systems capable of control, automation and monitoring of a built environment. Man... Read More about Applying the ACPO guidelines to building automation systems.

Soft systems methodology in net-centric cyber defence system development (2014)
Journal Article
Craig, R., Spyridopoulos, T., Tryfonas, T., & May, J. (2014). Soft systems methodology in net-centric cyber defence system development. IEEE International Conference on Systems Man and Cybernetics, 2014-January(January), 672-677. https://doi.org/10.1109/SMC.2014.6973986

© 2014 IEEE. Complexity is ever increasing within our information environment and organisations, as interdependent dynamic relationships within sociotechnical systems result in high variety and uncertainty from a lack of information or control. A net... Read More about Soft systems methodology in net-centric cyber defence system development.