Follow
Maria Papadaki
Maria Papadaki
Associate Professor in Cyber Security, University of Derby
Verified email at derby.ac.uk
Title
Cited by
Cited by
Year
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
1132012
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
GC Tjhai, SM Furnell, M Papadaki, NL Clarke
Computers & Security 29 (6), 712-723, 2010
1102010
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13 (3), 229-244, 2014
1012014
Apoptotic Circulating Tumor Cells in Early and Metastatic Breast Cancer PatientsApoptotic CTCs in Breast Cancer
G Kallergi, G Konstantinidis, H Markomanolaki, MA Papadaki, ...
Molecular cancer therapeutics 12 (9), 1886-1895, 2013
872013
Assessing end-user awareness of social engineering and phishing
A Karakasiliotis, SM Furnell, M Papadaki
School of Computer and Information Science, Edith Cowan University, Perth …, 2006
782006
Keystroke analysis as a method of advanced user authentication and response
PS Dowland, SM Furnell, M Papadaki
Security in the Information Society, 215-226, 2002
782002
A review of using gaming technology for cyber-security awareness
F Alotaibi, S Furnell, I Stengel, M Papadaki
Int. J. Inf. Secur. Res.(IJISR) 6 (2), 660-666, 2016
742016
Investigating the problem of IDS false alarms: An experimental study using Snort
GC Tjhai, M Papadaki, SM Furnell, NL Clarke
IFIP International Information Security Conference, 253-267, 2008
732008
Social engineering: assessing vulnerabilities in practice
T Bakhshi, M Papadaki, S Furnell
Information Management & Computer Security, 2009
622009
Behaviour profiling for transparent authentication for mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Academic Publishing Ltd, UK, 2011
612011
Behaviour profiling on mobile devices
F Li, N Clarke, M Papadaki, P Dowland
2010 International conference on emerging security technologies, 77-82, 2010
582010
Threats and impacts in maritime cyber security
KD Jones, K Tam, M Papadaki
IET, 2016
542016
An investigation and survey of response options for Intrusion Response Systems (IRSs)
NB Anuar, M Papadaki, S Furnell, N Clarke
2010 Information Security for South Africa, 1-8, 2010
512010
The impact of security and its antecedents in behaviour intention of using e-government services
N Alharbi, M Papadaki, P Dowland
Behaviour & Information Technology 36 (6), 620-636, 2017
502017
The problem of false alarms: Evaluation with snort and DARPA 1999 dataset
GC Tjhai, M Papadaki, SM Furnell, NL Clarke
International Conference on Trust, Privacy and Security in Digital Business …, 2008
442008
A survey of cyber-security awareness in Saudi Arabia
F Alotaibi, S Furnell, I Stengel, M Papadaki
2016 11th International Conference for Internet Technology and Secured …, 2016
432016
An experimental comparison of secret‐based user authentication technologies
I Irakleous, SM Furnell, PS Dowland, M Papadaki
Information Management & Computer Security, 2002
422002
The challenge of measuring cyber-dependent crimes
S Furnell, D Emm, M Papadaki
Computer Fraud & Security 2015 (10), 5-12, 2015
412015
A Practical Assessment of Social Engineering Vulnerabilities.
T Bakhshi, M Papadaki, S Furnell
HAISA, 12-23, 2008
372008
Assessing the usability of end-user security software
T Ibrahim, SM Furnell, M Papadaki, NL Clarke
International conference on trust, privacy and security in digital business …, 2010
362010
The system can't perform the operation now. Try again later.
Articles 1–20