Skip to main content

Research Repository

Advanced Search

All Outputs (5)

Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network (2016)
Journal Article
Li, S., Tryfonas, T., Russell, G., & Andriotis, P. (2016). Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network. IEEE Transactions on Cybernetics, 46(8), 1749-1759. https://doi.org/10.1109/TCYB.2016.2537649

© 2015 IEEE. Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess... Read More about Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.

A study on usability and security features of the Android pattern lock screen (2016)
Journal Article
Andriotis, P., Oikonomou, G., Mylonas, A., & Tryfonas, T. (2016). A study on usability and security features of the Android pattern lock screen. Information and Computer Security, 24(1), 53-72. https://doi.org/10.1108/ICS-01-2015-0001

© Emerald Group Publishing Limited. Purpose: - The Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by the visual representation of a password, which enhance its memora... Read More about A study on usability and security features of the Android pattern lock screen.

Impact of user data privacy management controls on mobile device investigations (2016)
Journal Article
Andriotis, P., & Tryfonas, T. (2016). Impact of user data privacy management controls on mobile device investigations. IFIP Advances in Information and Communication Technology, 484, 89-105. https://doi.org/10.1007/978-3-319-46279-0_5

© IFIP International Federation for Information Processing 2016. There are many different types of mobile device users, but most of them do not seek to expand the functionality of their smartphones and prefer to interact with them using predefined us... Read More about Impact of user data privacy management controls on mobile device investigations.

Optimizing short message text sentiment analysis for mobile device forensics (2016)
Journal Article
Aboluwarin, O., Andriotis, P., Takasu, A., & Tryfonas, T. (2016). Optimizing short message text sentiment analysis for mobile device forensics. IFIP Advances in Information and Communication Technology, 484, 69-87. https://doi.org/10.1007/978-3-319-46279-0_4

© IFIP International Federation for Information Processing 2016. Mobile devices are now the dominant medium for communications. Humans express various emotions when communicating with others and these communications can be analyzed to deduce their em... Read More about Optimizing short message text sentiment analysis for mobile device forensics.

Mass surveillance in cyberspace and the lost art of keeping a secret: Policy lessons for government after the snowden leaks (2016)
Journal Article
Tryfonas, T., Carter, M., Crick, T., & Andriotis, P. (2016). Mass surveillance in cyberspace and the lost art of keeping a secret: Policy lessons for government after the snowden leaks. Lecture Notes in Artificial Intelligence, 9750, 174-185. https://doi.org/10.1007/978-3-319-39381-0_16

© Springer International Publishing Switzerland 2016. Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which w... Read More about Mass surveillance in cyberspace and the lost art of keeping a secret: Policy lessons for government after the snowden leaks.