Ioannis Agrafiotis
Ioannis Agrafiotis
Computer Science Department, University of Oxford
Verified email at - Homepage
TitleCited byYear
Towards a conceptual model and reasoning structure for insider threat detection
P Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks ‚Ubiquitous Computing ‚and Dependable …, 2013
A new take on detecting insider threats: exploring the use of hidden markov models
T Rashid, I Agrafiotis, JRC Nurse
Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
Smart insiders: exploring the threat from insiders using the internet-of-things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015
Determining the veracity of rumours on Twitter
G Giasemidis, C Singleton, I Agrafiotis, JRC Nurse, A Pilgrim, C Willis, ...
International Conference on Social Informatics, 185-205, 2016
Two sides of the coin: measuring and communicating the trustworthiness of online information
JRC Nurse, I Agrafiotis, M Goldsmith, S Creese, K Lamberts
Journal of Trust Management 1 (1), 5, 2014
Two-Gap Superconductivity in with Nonunitary Triplet Pairing and Even Parity Gap Symmetry
ZF Weng, JL Zhang, M Smidman, T Shang, J Quintanilla, JF Annett, ...
Physical review letters 117 (2), 027001, 2016
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
International Conference on Human Aspects of Information Security, Privacy …, 2014
The SOM family: virtual machines for teaching and research
M Haupt, R Hirschfeld, T Pape, G Gabrysiak, S Marr, A Bergmann, ...
Proceedings of the fifteenth annual conference on Innovation and technology …, 2010
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
I Agrafiotis, JRC Nurse, M Goldsmith, S Creese, D Upton
Journal of Cybersecurity 4 (1), tyy006, 2018
Reaching for informed revocation: Shutting off the tap on personal data
I Agrafiotis, S Creese, M Goldsmith, N Papanikolaou
IFIP PrimeLife International Summer School on Privacy and Identity …, 2009
Cybervis: visualizing the potential impact of cyber attacks on the wider enterprise
S Creese, M Goldsmith, N Moffat, J Happa, I Agrafiotis
2013 IEEE International Conference on Technologies for Homeland Security …, 2013
Insider threat response and recovery strategies in financial services firms
J Eggenschwiler, I Agrafiotis, JRC Nurse
Computer Fraud & Security 2016 (11), 12-19, 2016
Building confidence in information-trustworthiness metrics for decision support
JRC Nurse, I Agrafiotis, S Creese, M Goldsmith, K Lamberts
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
Cyber harm: concepts, taxonomy and measurement
I Agrafiotis, M Bada, P Cornish, S Creese, M Goldsmith, ...
Saïd Business School WP 23, 2016
Validating an insider threat detection system: A real scenario perspective
I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese
2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.
I Agrafiotis, PA Legg, M Goldsmith, S Creese
J. Internet Serv. Inf. Secur. 4 (4), 127-137, 2014
Applying formal methods to detect and resolve ambiguities in privacy requirements
I Agrafiotis, S Creese, M Goldsmith, N Papanikolaou
IFIP PrimeLife International Summer School on Privacy and Identity …, 2010
Formalising Policies for Insider-threat Detection: A Tripwire Grammar.
I Agrafiotis, A Erola, M Goldsmith, S Creese
JoWUA 8 (1), 26-43, 2017
Communicating trustworthiness using radar graphs: A detailed look
JRC Nurse, I Agrafiotis, S Creese, M Goldsmith, K Lamberts
2013 Eleventh Annual Conference on Privacy, Security and Trust, 333-339, 2013
The system can't perform the operation now. Try again later.
Articles 1–20