Panagiotis Andriotis

PhD, SFHEA, GCFE, GASF | Assistant Professor in Computer Science | Digital Forensics Examiner | University of Birmingham

University of Birmingham, Office 227,

College of Engineering and Physical Sciences,

School of Computer Science,

Birmingham, U.K.

I am an Assistant Professor in Computer Science at the University of Birmingham, a Senior Fellow of the Higher Education Academy (SFHEA), and a GIAC Certified Forensic Examiner (GIAC GCFE, GIAC GASF). I carry out interdisciplinary research into Cyber Security, Human Factors, and Mobile and Ubiquitous Computing. I teach Computer Science, Cyber Security and Digital Forensics topics.

Previously I was a Senior Lecturer in Computer Security and Forensics at UWE Bristol and a JSPS Fellow at the National Institute of Informatics, Tokyo, Japan. In the past I worked as a Research Associate at the University College London on the project Inferring the Purpose of Network Activities managed by Dr. Gianluca Stringhini and as a Research Assistant at the University of Bristol on the projects ForToo and NIFTy under the guidance of Prof. Theo Tryfonas. I also briefly participated as a Cyber Security Research Expert at an enhanced Knowledge Transfer Partnership between the De Montfort University and Airbus aiming to research new ways of protecting critical infrastructure.

news

Oct 1, 2023 I joined the Editorial Board of Elsevier’s Journal of Responsible Technology :open_book:
Sep 2, 2023 I will be the Toshiba Fellow 2023-2024! Back to Tokyo! :airplane:
Mar 22, 2023 I will be a “Visiting Lecturer” at the National Institute of Informatics in Tokyo for a year (2023-2024) :airplane:
Dec 17, 2022 We have a new article titled “Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification” at Elsevier’s “Journal of Information Security and Applications” available open access :scroll:
Nov 13, 2022 The extended version of our latest paper titled “Bu-Dash: A Universal and Dynamic Graphical Password Scheme (Extended Version)” was accepted for publication at Springer’s “International Journal of Information Security” available open access :scroll:
Aug 30, 2022 I am raising funds for Cancer Research UK as a motivation to finish the Athens Marathon 2022. Please contribute here :runner:
Jul 13, 2022 I am now a Senior Fellow of the Higher Education Academy (U.K.) :medal_sports:
Jul 1, 2022 I enjoyed learning the fundamentals about Security in the Azure Cloud! I am now Microsoft Certified: Security, Compliance, and Identity Fundamentals :sparkles:
Jun 23, 2022 We will soon have an article published at the journal Learning, Media and Technology, titled “AI Hyped? A horizon scan of discourse in Artificial Intelligence in Education (AIED) and development” :newspaper:
Jun 7, 2022 Participating in outreach activities with the Fukushima High School students discussing about “Human Aspects of Cyber Security” for the JSPS Science Dialogue Programme :crossed_flags: (20th June)
May 20, 2022 I joined the Editorial Board of the ACM journal Digital Threats: Research and Practice as an Associate Editor :open_book:
Mar 18, 2022 Check out our new Open Access article titled “Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey”, work led by our PhD student Andrew McCarthy :open_book:
Feb 6, 2022 We have a new paper titled “Bu-Dash: A Universal and Dynamic Graphical Password Scheme” preprint, blog post, to appear in HCI International 2022 :lock:
Oct 22, 2021 I am on sabbatical leave, working at the National Institute of Informatics in Tokyo as a JSPS Fellow :jp:
Oct 18, 2021 I was appointed as an External Examiner at Cardiff Metropolitan University :classical_building:
Aug 15, 2021 I have a fully funded PhD studentship available at UWE Bristol for a candidate to work on fuzzing and software security :mortar_board:
Apr 29, 2021 I received the “Impact Award” from UWE Bristol’s Student Union during this year’s “Student Experience Awards” :trophy:
Apr 15, 2021 I am now certified as a mobile device examiner: GIAC Advanced Smartphone Forensics (GASF) :sparkles:
Jan 23, 2021 I was awarded the FOR585 SANS Lethal Forensicator Coin :muscle:
Jul 19, 2020 We received the Best Paper Award at the HCI International 2020 conference for our paper: “To Allow, or Deny? That is the Question.” preprint, video :1st_place_medal:
Feb 9, 2020 I am now certified as a GIAC Certified Forensic Examiner (GCFE) :sparkles:

selected publications

  1. CJEM
    AI hyped? A horizon scan of discourse on Artificial Intelligence in Education (AIED) and development
    Nemorin, Selena, Ayerakwa, Hayford Mensah, Vlachidis, Andreas, and Andriotis, Panagiotis
    Learning, Media and Technology 2023
  2. IJIS
    Bu-Dash: a universal and dynamic graphical password scheme (extended version)
    Andriotis, Panagiotis, Kirby, Myles, and Takasu, Atsuhiro
    International Journal of Information Security 2023
  3. JISA
    Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification
    McCarthy, Andrew, Ghadafi, Essam, Andriotis, Panagiotis, and Legg, Phil
    Journal of Information Security and Applications 2023
  4. HCII20
    To Allow, or Deny? That is the Question
    Andriotis, Panagiotis, and Takasu, Atsuhiro
    In HCI for Cybersecurity, Privacy and Trust 2020
  5. TCYB
    Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations
    Andriotis, Panagiotis, Oikonomou, George, Tryfonas, Theo, and Li, Shancang
    IEEE Transactions on Cybernetics Sep 2016
  6. TCYB16
    Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network
    Li, Shancang, Tryfonas, Theo, Russell, Gordon, and Andriotis, Panagiotis
    IEEE Transactions on Cybernetics Aug 2016
  7. JISA
    Studying users’ adaptation to Android’s run-time fine-grained access control system
    Andriotis, Panagiotis, Stringhini, Gianluca, and Sasse, Martina Angela
    Journal of Information Security and Applications 2018
  8. TOPS
    MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
    ACM Transactions on Privacy and Security Apr 2019
  9. IOTJ
    Distributed consensus algorithm for events detection in cyber-physical systems
    Li, Shancang, Zhao, Shanshan, Yang, Po, Andriotis, Panagiotis, Xu, Lida, and Sun, Qindong
    IEEE Internet of Things Journal 2019