Skip to main content

Research Repository

Advanced Search

All Outputs (4)

A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention (2015)
Journal Article
Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T., & Oikonomou, G. (2015). A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention. Information Security Journal: A Global Perspective, 24(4-6), 164-176. https://doi.org/10.1080/19393555.2015.1092186

Copyright © Taylor & Francis Group, LLC. Literature in malware proliferation focuses on modeling and analyzing its spread dynamics. Epidemiology models, which are inspired by the characteristics of biological disease spread in human populations, ha... Read More about A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Journal Article
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘norm... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

Application of a game theoretic approach in smart sensor data trustworthiness problems (2015)
Journal Article
Maraslis, K., Spyridopoulos, T., Oikonomou, G., Tryfonas, T., & Haghighi, M. (2015). Application of a game theoretic approach in smart sensor data trustworthiness problems. IFIP Advances in Information and Communication Technology, 455, 601-615. https://doi.org/10.1007/978-3-319-18467-8_40

© IFIP International Federation for Information Processing 2015. In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for Wireless Sensor Networks (WSNs). The attacker’s goal is to compromise the deployment by ca... Read More about Application of a game theoretic approach in smart sensor data trustworthiness problems.

Applying the ACPO guidelines to building automation systems (2015)
Journal Article
Sutherland, I., Spyridopoulos, T., Read, H., Jones, A., Sutherland, G., & Burgess, M. (2015). Applying the ACPO guidelines to building automation systems. Lecture Notes in Artificial Intelligence, 9190, 684-692. https://doi.org/10.1007/978-3-319-20376-8_61

© Springer International Publishing Switzerland 2015. The increasing variety of Internet enabled hardware devices is creating a world of semi-autonomous, interconnected systems capable of control, automation and monitoring of a built environment. Man... Read More about Applying the ACPO guidelines to building automation systems.