Skip to main content

Research Repository

Advanced Search

All Outputs (6)

System dynamics approach to malicious insider cyber-threat modelling and analysis (2017)
Journal Article
Fagade, T., Spyridopoulos, T., Albishry, N., & Tryfonas, T. (2017). System dynamics approach to malicious insider cyber-threat modelling and analysis. Lecture Notes in Artificial Intelligence, 10292 LNCS, 309-321. https://doi.org/10.1007/978-3-319-58460-7_21

© Springer International Publishing AG 2017. Enforcing cybersecurity controls against malicious insiders touches upon complex issues like people, process and technology. In large and complex systems, addressing the problem of insider cyber threat inv... Read More about System dynamics approach to malicious insider cyber-threat modelling and analysis.

A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention (2015)
Journal Article
Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T., & Oikonomou, G. (2015). A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention. Information Security Journal: A Global Perspective, 24(4-6), 164-176. https://doi.org/10.1080/19393555.2015.1092186

Copyright © Taylor & Francis Group, LLC. Literature in malware proliferation focuses on modeling and analyzing its spread dynamics. Epidemiology models, which are inspired by the characteristics of biological disease spread in human populations, ha... Read More about A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Journal Article
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘norm... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

Application of a game theoretic approach in smart sensor data trustworthiness problems (2015)
Journal Article
Maraslis, K., Spyridopoulos, T., Oikonomou, G., Tryfonas, T., & Haghighi, M. (2015). Application of a game theoretic approach in smart sensor data trustworthiness problems. IFIP Advances in Information and Communication Technology, 455, 601-615. https://doi.org/10.1007/978-3-319-18467-8_40

© IFIP International Federation for Information Processing 2015. In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for Wireless Sensor Networks (WSNs). The attacker’s goal is to compromise the deployment by ca... Read More about Application of a game theoretic approach in smart sensor data trustworthiness problems.

Applying the ACPO guidelines to building automation systems (2015)
Journal Article
Sutherland, I., Spyridopoulos, T., Read, H., Jones, A., Sutherland, G., & Burgess, M. (2015). Applying the ACPO guidelines to building automation systems. Lecture Notes in Artificial Intelligence, 9190, 684-692. https://doi.org/10.1007/978-3-319-20376-8_61

© Springer International Publishing Switzerland 2015. The increasing variety of Internet enabled hardware devices is creating a world of semi-autonomous, interconnected systems capable of control, automation and monitoring of a built environment. Man... Read More about Applying the ACPO guidelines to building automation systems.

Soft systems methodology in net-centric cyber defence system development (2014)
Journal Article
Craig, R., Spyridopoulos, T., Tryfonas, T., & May, J. (2014). Soft systems methodology in net-centric cyber defence system development. IEEE International Conference on Systems Man and Cybernetics, 2014-January(January), 672-677. https://doi.org/10.1109/SMC.2014.6973986

© 2014 IEEE. Complexity is ever increasing within our information environment and organisations, as interdependent dynamic relationships within sociotechnical systems result in high variety and uncertainty from a lack of information or control. A net... Read More about Soft systems methodology in net-centric cyber defence system development.