default search action
Panagiotis Andriotis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Panagiotis Andriotis, Myles Kirby, Atsuhiro Takasu:
Bu-Dash: a universal and dynamic graphical password scheme (extended version). Int. J. Inf. Sec. 22(2): 381-401 (2023) - [j10]Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, Phil Legg:
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification. J. Inf. Secur. Appl. 72: 103398 (2023) - 2022
- [j9]Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, Phil Legg:
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey. J. Cybersecur. Priv. 2(1): 154-190 (2022) - [c21]Panagiotis Andriotis, Myles Kirby, Atsuhiro Takasu:
Bu-Dash: A Universal and Dynamic Graphical Password Scheme. HCI (32) 2022: 209-227 - 2021
- [c20]Andrew McCarthy, Panagiotis Andriotis, Essam Ghadafi, Phil Legg:
Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks. CyberSA 2021: 1-8 - [c19]Jason R. C. Nurse, Francielle Vargas, Naeemul Hassan, Dakuo Wang, Panagiotis Andriotis, Amira Ghenai, Kokil Jaidka, Eni Mustafaraj, Kenneth Joseph, Brooke Foucault Welles:
Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM). ICWSM Workshops 2021 - 2020
- [c18]Panagiotis Andriotis, Atsuhiro Takasu:
To Allow, or Deny? That is the Question. HCI (30) 2020: 287-304
2010 – 2019
- 2019
- [j8]Shancang Li, Shanshan Zhao, Po Yang, Panagiotis Andriotis, Lida Xu, Qindong Sun:
Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems. IEEE Internet Things J. 6(2): 2299-2308 (2019) - [j7]Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon J. Ross, Gianluca Stringhini:
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). ACM Trans. Priv. Secur. 22(2): 14:1-14:34 (2019) - 2018
- [j6]Panagiotis Andriotis, Gianluca Stringhini, Martina Angela Sasse:
Studying users' adaptation to Android's run-time fine-grained access control system. J. Inf. Secur. Appl. 40: 31-43 (2018) - [c17]Panagiotis Andriotis, Atsuhiro Takasu:
Emotional Bots: Content-based Spammer Detection on Social Media. WIFS 2018: 1-8 - 2017
- [c16]Kallia Anastasopoulou, Spyros Kokolakis, Panagiotis Andriotis:
Privacy Decision-Making in the Digital Era: A Game Theoretic Review. HCI (22) 2017: 589-603 - [c15]Panagiotis Andriotis, Shancang Li, Theodoros Spyridopoulos, Gianluca Stringhini:
A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model. HCI (22) 2017: 604-622 - [c14]Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon J. Ross, Gianluca Stringhini:
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. NDSS 2017 - [i2]Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon J. Ross, Gianluca Stringhini:
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). CoRR abs/1711.07477 (2017) - 2016
- [j5]Panagiotis Andriotis, George C. Oikonomou, Alexios Mylonas, Theo Tryfonas:
A study on usability and security features of the Android pattern lock screen. Inf. Comput. Secur. 24(1): 53-72 (2016) - [j4]Shancang Li, Theo Tryfonas, Gordon Russell, Panagiotis Andriotis:
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network. IEEE Trans. Cybern. 46(8): 1749-1759 (2016) - [j3]Panagiotis Andriotis, George C. Oikonomou, Theo Tryfonas, Shancang Li:
Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations. IEEE Trans. Cybern. 46(9): 1974-1985 (2016) - [c13]Theo Tryfonas, Michael Carter, Tom Crick, Panagiotis Andriotis:
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks. HCI (20) 2016: 174-185 - [c12]Oluwapelumi Aboluwarin, Panagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas:
Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics. IFIP Int. Conf. Digital Forensics 2016: 69-87 - [c11]Panagiotis Andriotis, Theo Tryfonas:
Impact of User Data Privacy Management Controls on Mobile Device Investigations. IFIP Int. Conf. Digital Forensics 2016: 89-105 - [c10]Panagiotis Andriotis, Martina Angela Sasse, Gianluca Stringhini:
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. WIFS 2016: 1-6 - [i1]Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon J. Ross, Gianluca Stringhini:
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. CoRR abs/1612.04433 (2016) - 2015
- [c9]Shancang Li, Junhua Chen, Theodoros Spyridopoulos, Panagiotis Andriotis, Robert Ludwiniak, Gordon Russell:
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System. HCI (22) 2015: 379-390 - [c8]Huw Read, Konstantinos Xynos, Iain Sutherland, Frode Roarson, Panagiotis Andriotis, George C. Oikonomou:
An Extensible Platform for the Forensic Analysis of Social Media Data. HCI (22) 2015: 404-414 - [c7]Panagiotis Andriotis, George C. Oikonomou:
Messaging Activity Reconstruction with Sentiment Polarity Identification. HCI (22) 2015: 475-486 - [c6]Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Irwin King:
A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem. IFIP Int. Conf. Digital Forensics 2015: 251-267 - 2014
- [c5]Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou:
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method. HCI (24) 2014: 115-126 - [c4]Panagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas:
Smartphone Message Sentiment Analysis. IFIP Int. Conf. Digital Forensics 2014: 253-265 - [c3]Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Shancang Li, Zacharias Tzermias, Konstantinos Xynos, Huw Read, Vassilis Prevelakis:
On the Development of Automated Forensic Analysis Methods for Mobile Devices. TRUST 2014: 212-213 - 2013
- [j2]Panagiotis Andriotis, George C. Oikonomou, Theo Tryfonas:
JPEG steganography detection with Benford's Law. Digit. Investig. 9(3-4): 246-257 (2013) - [j1]Panagiotis Andriotis, Zacharias Tzermias, Anthi Mparmpaki, Sotiris Ioannidis, George C. Oikonomou:
Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data. Int. J. Digit. Crime Forensics 5(4): 34-54 (2013) - [c2]Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Can Yildiz:
A pilot study on the security of pattern screen-lock methods and soft side channel attacks. WISEC 2013: 1-6 - 2012
- [c1]Panagiotis Andriotis, George C. Oikonomou, Theo Tryfonas:
Forensic analysis of wireless networking evidence of Android smartphones. WIFS 2012: 109-114
Coauthor Index
aka: Theo Tryfonas
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint