Follow
Theodoros Spyridopoulos
Theodoros Spyridopoulos
Verified email at cardiff.ac.uk
Title
Cited by
Cited by
Year
A game theoretic defence framework against DoS/DDoS cyber attacks
T Spyridopoulos, G Karanikas, T Tryfonas, G Oikonomou
Computers & Security 38, 39-50, 2013
1212013
Incident analysis & digital forensics in SCADA and industrial control systems
T Spyridopoulos, T Tryfonas, J May
IET Digital Library, 2013
542013
Efficient and interpretable real-time malware detection using random-forest
A Mills, T Spyridopoulos, P Legg
2019 International conference on cyber situational awareness, data analytics …, 2019
212019
An intrusion detection system based on deep belief networks
O Belarbi, A Khan, P Carnelli, T Spyridopoulos
International Conference on Science of Cyber Security, 377-392, 2022
202022
A comparative study of android users’ privacy preferences under the runtime permission model
P Andriotis, S Li, T Spyridopoulos, G Stringhini
Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017
182017
Requirements for a forensically ready cloud storage service
T Spyridopoulos, V Katos
International Journal of Digital Crime and Forensics (IJDCF) 3 (3), 19-36, 2011
182011
Managing cyber security risks in industrial control systems with game theory and viable system modelling
T Spyridopoulos, K Maraslis, T Tryfonas, G Oikonomou, S Li
2014 9th International Conference on System of Systems Engineering (SOSE …, 2014
152014
Game theoretic approach for cost-benefit analysis of malware proliferation prevention
T Spyridopoulos, G Oikonomou, T Tryfonas, M Ge
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
152013
Real-time monitoring of privacy abuses and intrusion detection in android system
S Li, J Chen, T Spyridopoulos, P Andriotis, R Ludwiniak, G Russell
Human Aspects of Information Security, Privacy, and Trust: Third …, 2015
132015
System dynamics approach to malicious insider cyber-threat modelling and analysis
T Fagade, T Spyridopoulos, N Albishry, T Tryfonas
Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017
122017
A game theoretical method for cost-benefit analysis of malware dissemination prevention
T Spyridopoulos, K Maraslis, A Mylonas, T Tryfonas, G Oikonomou
Information Security Journal: A Global Perspective 24 (4-6), 164-176, 2015
122015
Data recovery strategies for cloud environments
T Spyridopoulos, V Katos
Cybercrime and Cloud Forensics: Applications for Investigation Processes …, 2013
102013
A system dynamics model of cyber conflict
D Polatin-Reuben, R Craig, T Spyridopoulos, T Tryfonas
2013 IEEE International Conference on Systems, Man, and Cybernetics, 303-308, 2013
92013
Container escape detection for edge devices
J Pope, F Raimondo, V Kumar, R McConville, R Piechocki, G Oikonomou, ...
Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems …, 2021
82021
A holistic approach for cyber assurance of critical infrastructure with the viable system model
T Spyridopoulos, IA Topa, T Tryfonas, M Karyda
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
82014
Applying the ACPO guidelines to building automation systems
I Sutherland, T Spyridopoulos, H Read, A Jones, G Sutherland, ...
Human Aspects of Information Security, Privacy, and Trust: Third …, 2015
72015
Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities: A Systematic Review
V Kumar, S Gunner, T Spyridopoulos, A Vafeas, J Pope, P Yadav, ...
arXiv preprint arXiv:2302.11009, 2023
62023
LE3D: A lightweight ensemble framework of data drift detectors for resource-constrained devices
I Mavromatis, A Sanchez-Mompo, F Raimondo, J Pope, M Bullo, I Weeks, ...
2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), 611-619, 2023
62023
Application of a game theoretic approach in smart sensor data trustworthiness problems
K Maraslis, T Spyridopoulos, G Oikonomou, T Tryfonas, M Haghighi
IFIP International Information Security and Privacy Conference, 601-615, 2015
62015
Soft systems methodology in net-centric cyber defence system development
R Craig, T Spyridopoulos, T Tryfonas, J May
2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20