Skip to main content

Research Repository

Advanced Search

All Outputs (10)

Efficient and interpretable real-time malware detection using random-forest (2019)
Conference Proceeding
Mills, A., Spyridopoulos, T., & Legg, P. (2019). Efficient and interpretable real-time malware detection using random-forest. . https://doi.org/10.1109/CyberSA.2019.8899533

© 2019 IEEE. Malicious software, often described as malware, is one of the greatest threats to modern computer systems, and attackers continue to develop more sophisticated methods to access and compromise data and resources. Machine learning methods... Read More about Efficient and interpretable real-time malware detection using random-forest.

Critical infrastructure cyber-security risk management (2017)
Book Chapter
Spyridopoulos, T., Maraslis, K., Tryfonas, T., & Oikonomou, G. (2017). Critical infrastructure cyber-security risk management. In M. Conway, L. Jarvis, O. Lehane, S. Macdonald, & L. Nouri (Eds.), Terrorists' Use of the Internet (59-76). IOS Press. https://doi.org/10.3233/978-1-61499-765-8-59

Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience an... Read More about Critical infrastructure cyber-security risk management.

System dynamics approach to malicious insider cyber-threat modelling and analysis (2017)
Journal Article
Fagade, T., Spyridopoulos, T., Albishry, N., & Tryfonas, T. (2017). System dynamics approach to malicious insider cyber-threat modelling and analysis. Lecture Notes in Artificial Intelligence, 10292 LNCS, 309-321. https://doi.org/10.1007/978-3-319-58460-7_21

© Springer International Publishing AG 2017. Enforcing cybersecurity controls against malicious insiders touches upon complex issues like people, process and technology. In large and complex systems, addressing the problem of insider cyber threat inv... Read More about System dynamics approach to malicious insider cyber-threat modelling and analysis.

A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention (2015)
Journal Article
Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T., & Oikonomou, G. (2015). A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention. Information Security Journal: A Global Perspective, 24(4-6), 164-176. https://doi.org/10.1080/19393555.2015.1092186

Copyright © Taylor & Francis Group, LLC. Literature in malware proliferation focuses on modeling and analyzing its spread dynamics. Epidemiology models, which are inspired by the characteristics of biological disease spread in human populations, ha... Read More about A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Journal Article
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘norm... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

Application of a game theoretic approach in smart sensor data trustworthiness problems (2015)
Journal Article
Maraslis, K., Spyridopoulos, T., Oikonomou, G., Tryfonas, T., & Haghighi, M. (2015). Application of a game theoretic approach in smart sensor data trustworthiness problems. IFIP Advances in Information and Communication Technology, 455, 601-615. https://doi.org/10.1007/978-3-319-18467-8_40

© IFIP International Federation for Information Processing 2015. In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for Wireless Sensor Networks (WSNs). The attacker’s goal is to compromise the deployment by ca... Read More about Application of a game theoretic approach in smart sensor data trustworthiness problems.

Applying the ACPO guidelines to building automation systems (2015)
Journal Article
Sutherland, I., Spyridopoulos, T., Read, H., Jones, A., Sutherland, G., & Burgess, M. (2015). Applying the ACPO guidelines to building automation systems. Lecture Notes in Artificial Intelligence, 9190, 684-692. https://doi.org/10.1007/978-3-319-20376-8_61

© Springer International Publishing Switzerland 2015. The increasing variety of Internet enabled hardware devices is creating a world of semi-autonomous, interconnected systems capable of control, automation and monitoring of a built environment. Man... Read More about Applying the ACPO guidelines to building automation systems.

Managing cyber security risks in industrial control systems with game theory and viable system modelling (2014)
Conference Proceeding
Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G., & Li, S. (2014). Managing cyber security risks in industrial control systems with game theory and viable system modelling. In 2014 9th International Conference on System of Systems Engineering (SOSE) (266-271). https://doi.org/10.1109/SYSOSE.2014.6892499

© 2014 IEEE. Cyber security risk management in Industrial Control Systems has been a challenging problem for both practitioners and the research community. Their proprietary nature along with the complexity of those systems renders traditional approa... Read More about Managing cyber security risks in industrial control systems with game theory and viable system modelling.

Soft systems methodology in net-centric cyber defence system development (2014)
Journal Article
Craig, R., Spyridopoulos, T., Tryfonas, T., & May, J. (2014). Soft systems methodology in net-centric cyber defence system development. IEEE International Conference on Systems Man and Cybernetics, 2014-January(January), 672-677. https://doi.org/10.1109/SMC.2014.6973986

© 2014 IEEE. Complexity is ever increasing within our information environment and organisations, as interdependent dynamic relationships within sociotechnical systems result in high variety and uncertainty from a lack of information or control. A net... Read More about Soft systems methodology in net-centric cyber defence system development.

A holistic approach for cyber assurance of critical infrastructure with the viable system model (2014)
Conference Proceeding
Spyridopoulos, T., Topa, I. A., Tryfonas, T., & Karyda, M. (2014). A holistic approach for cyber assurance of critical infrastructure with the viable system model. In ICT Systems Security and Privacy Protection (438-445). https://doi.org/10.1007/978-3-642-55415-5_37

© IFIP International Federation for Information Processing 2014. Industrial Control Systems (ICSs) are of the most important components of National Critical Infrastructure. They can provide control capabilities in complex systems of critical importan... Read More about A holistic approach for cyber assurance of critical infrastructure with the viable system model.