default search action
Theodoros Spyridopoulos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Melanie Po-Leen Ooi, Shaleeza Sohail, Victoria Guiying Huang, Nathaniel Hudson, Matt Baughman, Omer F. Rana, Annika Hinze, Kyle Chard, Ryan Chard, Ian T. Foster, Theodoros Spyridopoulos, Harshaan Nagra:
Measurement and Applications: Exploring the Challenges and Opportunities of Hierarchical Federated Learning in Sensor Applications. IEEE Instrum. Meas. Mag. 26(9): 21-31 (2023) - [c17]Ioannis Mavromatis, Adrián Sánchez-Mompó, Francesco Raimondo, James Pope, Marcello Bullo, Ingram Weeks, Vijay Kumar, Pietro Edoardo Carnelli, George Oikonomou, Theodoros Spyridopoulos, Aftab Khan:
LE3D: A Lightweight Ensemble Framework of Data Drift Detectors for Resource-Constrained Devices. CCNC 2023: 611-619 - [c16]Ufuk Erol, Francesco Raimondo, James Pope, Samuel Gunner, Vijay Kumar, Ioannis Mavromatis, Pietro Edoardo Carnelli, Theodoros Spyridopoulos, Aftab Khan, George Oikonomou:
Evaluating Concept Drift Detectors on Real-World Data. EWSN 2023: 397-402 - [c15]Othmane Belarbi, Theodoros Spyridopoulos, Eirini Anthi, Ioannis Mavromatis, Pietro Edoardo Carnelli, Aftab Khan:
Federated Deep Learning for Intrusion Detection in IoT Networks. GLOBECOM 2023: 237-242 - [i7]Vijay Kumar, Sam Gunner, Theodoros Spyridopoulos, Antonis Vafeas, James Pope, Poonam Yadav, George Oikonomou, Theo Tryfonas:
Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities: A Systematic Review. CoRR abs/2302.11009 (2023) - [i6]Omer F. Rana, Theodoros Spyridopoulos, Nathaniel Hudson, Matt Baughman, Kyle Chard, Ian T. Foster, Aftab Khan:
Hierarchical and Decentralised Federated Learning. CoRR abs/2304.14982 (2023) - [i5]Othmane Belarbi, Theodoros Spyridopoulos, Eirini Anthi, Ioannis Mavromatis, Pietro Edoardo Carnelli, Aftab Khan:
Federated Deep Learning for Intrusion Detection in IoT Networks. CoRR abs/2306.02715 (2023) - [i4]Ioannis Mavromatis, Theodoros Spyridopoulos, Pietro Edoardo Carnelli, Woon Hau Chin, Ahmed Khalil, Jennifer Chakravarty, Lucia Cipolina Kun, Robert J. Piechocki, Colin Robbins, Daniel Cunnington, Leigh Chase, Lamogha Chiazor, Chris Preston, Rahul, Aftab Khan:
Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs. CoRR abs/2312.14687 (2023) - 2022
- [c14]Othmane Belarbi, Aftab Khan, Pietro Edoardo Carnelli, Theodoros Spyridopoulos:
An Intrusion Detection System Based on Deep Belief Networks. SciSec 2022: 377-392 - [i3]Othmane Belarbi, Aftab Khan, Pietro Edoardo Carnelli, Theodoros Spyridopoulos:
An Intrusion Detection System based on Deep Belief Networks. CoRR abs/2207.02117 (2022) - [i2]Ioannis Mavromatis, Adrián Sánchez-Mompó, Francesco Raimondo, James Pope, Marcello Bullo, Ingram Weeks, Vijay Kumar, Pietro Edoardo Carnelli, George Oikonomou, Theodoros Spyridopoulos, Aftab Khan:
LE3D: A Lightweight Ensemble Framework of Data Drift Detectors for Resource-Constrained Devices. CoRR abs/2211.01840 (2022) - [i1]James Pope, Jinyuan Liang, Vijay Kumar, Francesco Raimondo, Xinyi Sun, Ryan McConville, Thomas Pasquier, Robert J. Piechocki, George Oikonomou, Bo Luo, Dan Howarth, Ioannis Mavromatis, Adrián Sánchez-Mompó, Pietro Edoardo Carnelli, Theodoros Spyridopoulos, Aftab Khan:
Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection. CoRR abs/2212.08525 (2022) - 2021
- [j4]Raya A. Al-Masri, Theodoros Spyridopoulos, Stylianos Karatzas, Vasiliki Lazari, Theo Tryfonas:
A Systems Approach to Understanding Geopolitical Tensions in the Middle East in the Face of a Global Water Shortage. Int. J. Syst. Dyn. Appl. 10(4): 1-23 (2021) - [c13]James Pope, Francesco Raimondo, Vijay Kumar, Ryan McConville, Robert J. Piechocki, George Oikonomou, Thomas Pasquier, Bo Luo, Dan Howarth, Ioannis Mavromatis, Pietro Edoardo Carnelli, Adrián Sánchez-Mompó, Theodoros Spyridopoulos, Aftab Khan:
Container Escape Detection for Edge Devices. SenSys 2021: 532-536
2010 – 2019
- 2019
- [c12]Alan Mills, Theodoros Spyridopoulos, Phil Legg:
Efficient and Interpretable Real-Time Malware Detection Using Random-Forest. CyberSA 2019: 1-8 - 2017
- [c11]Tesleem Fagade, Theodoros Spyridopoulos, Nabeel Albishry, Theodore Tryfonas:
System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis. HCI (22) 2017: 309-321 - [c10]Panagiotis Andriotis, Shancang Li, Theodoros Spyridopoulos, Gianluca Stringhini:
A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model. HCI (22) 2017: 604-622 - 2015
- [j3]Theodoros Spyridopoulos, Konstantinos Maraslis, Alexios Mylonas, Theo Tryfonas, George C. Oikonomou:
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention. Inf. Secur. J. A Glob. Perspect. 24(4-6): 164-176 (2015) - [c9]Shancang Li, Junhua Chen, Theodoros Spyridopoulos, Panagiotis Andriotis, Robert Ludwiniak, Gordon Russell:
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System. HCI (22) 2015: 379-390 - [c8]Iain Sutherland, Theodoros Spyridopoulos, Huw Read, Andy Jones, Graeme Sutherland, Mikhailia Burgess:
Applying the ACPO Guidelines to Building Automation Systems. HCI (22) 2015: 684-692 - [c7]Konstantinos Maraslis, Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mo Haghighi:
Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems. SEC 2015: 601-615 - 2014
- [c6]Theodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda:
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model. SEC 2014: 438-445 - [c5]Richard Craig, Theodoros Spyridopoulos, Theo Tryfonas, John May:
Soft systems methodology in net-centric cyber defence system development. SMC 2014: 672-677 - [c4]Theodoros Spyridopoulos, Konstantinos Maraslis, Theo Tryfonas, George C. Oikonomou, Shancang Li:
Managing cyber security risks in industrial control systems with game theory and viable system modelling. SoSE 2014: 266-271 - 2013
- [j2]Theodoros Spyridopoulos, G. Karanikas, Theodore Tryfonas, Georgios Oikonomou:
A game theoretic defence framework against DoS/DDoS cyber attacks. Comput. Secur. 38: 39-50 (2013) - [c3]Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mengmeng Ge:
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention. SEC 2013: 28-41 - [c2]Dana Polatin-Reuben, Richard Craig, Theodoros Spyridopoulos, Theo Tryfonas:
A System Dynamics Model of Cyber Conflict. SMC 2013: 303-308 - 2011
- [j1]Theodoros Spyridopoulos, Vasilios Katos:
Requirements for a Forensically Ready Cloud Storage Service. Int. J. Digit. Crime Forensics 3(3): 19-36 (2011) - [c1]Theodoros Spyridopoulos, Vasilios Katos:
Towards a forensically ready cloud storage service. WDFIA 2011: 93-107
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint