Impact

Outreach and Media. References to our work from media outlets.


References in the Media


  • 25/02/2021: “To Allow, or Deny?”,
    Article in Faculti about our work on Android permissions.
  • 10/04/2018: “The endless game of cat and mouse with spammers”,
    Eureka, Kyocera, now archived. A discussion about bots on social media.
  • 09/03/2017: “MaMaDroid: Detecting Android malware by building Markov chains of behavorial models”,
    the morning paper. A presentation of our Android malware detection system.


Influence and Impact


Mariconti, E. et al. 2017. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. 24th Network and Distributed System Security Symposium (NDSS 2017) (2017), 1–15.




Andriotis, P. et al. 2017. A Comparative Study of Android Users’ Privacy Preferences Under the Runtime Permission Model. Human Aspects of Information Security, Privacy and Trust (Cham, 2017), 604–622.




Andriotis, P. et al. 2014. Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method. Human Aspects of Information Security, Privacy, and Trust (Cham, 2014), 115–126.




Onwuzurike, L. et al. 2019. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). ACM Transactions on Privacy and Security. 22, 2 (Apr. 2019). DOI:https://doi.org/10.1145/3313391.




Andriotis, P. et al. 2014. Smartphone Message Sentiment Analysis. Advances in Digital Forensics X (Berlin, Heidelberg, 2014), 253–265.




Andriotis, P. et al. 2016. A study on usability and security features of the Android pattern lock screen. Information and Computer Security. 24, 1 (2016), 53–72. DOI:https://doi.org/10.1108/ICS-01-2015-0001.




Andriotis, P. et al. 2013. JPEG steganography detection with Benford’s Law. Digital Investigation. 9, 3 (2013), 246–257. DOI:https://doi.org/10.1016/j.diin.2013.01.005.




Tryfonas, T. et al. 2016. Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret. Human Aspects of Information Security, Privacy, and Trust (Cham, 2016), 174–185.




Andriotis, P. et al. 2016. Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations. IEEE Transactions on Cybernetics. 46, 9 (Sep. 2016), 1974–1985. DOI:https://doi.org/10.1109/TCYB.2015.2454733.




Andriotis, P. and Tryfonas, T. 2016. Impact of User Data Privacy Management Controls on Mobile Device Investigations. Advances in Digital Forensics XII (Cham, 2016), 89–105.




Andriotis, P. et al. 2016. Permissions snapshots: Assessing users’ adaptation to the Android runtime permission model. 2016 IEEE International Workshop on Information Forensics and Security (WIFS) (Dec. 2016), 1–6.




Andriotis, P. et al. 2018. Studying users’ adaptation to Android’s run-time fine-grained access control system. Journal of Information Security and Applications. 40, (2018), 31–43. DOI:https://doi.org/10.1016/j.jisa.2018.02.004.




Anastasopoulou, K. et al. 2017. Privacy Decision-Making in the Digital Era: A Game Theoretic Review. Human Aspects of Information Security, Privacy and Trust (Cham, 2017), 589–603.



Andriotis, P. et al. 2013. A Pilot Study on the Security of Pattern Screen-lock Methods and Soft Side Channel Attacks. Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (New York, NY, USA, 2013), 1–6.



Andriotis, P. et al. 2012. Forensic analysis of wireless networking evidence of Android smartphones. 2012 IEEE International Workshop on Information Forensics and Security (WIFS) (Dec. 2012), 109–114.



Andriotis, P. et al. 2013. Multilevel visualization using enhanced social network analysis with smartphone data. International Journal of Digital Crime and Forensics (IJDCF). 5, 4 (2013), 34–54. DOI:https://doi.org/10.4018/ijdcf.2013100103.



Li, S. et al. 2016. Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network. IEEE Transactions on Cybernetics. 46, 8 (Aug. 2016), 1749–1759. DOI:https://doi.org/10.1109/TCYB.2016.2537649.



Li, S. et al. 2015. Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System. Human Aspects of Information Security, Privacy, and Trust (Cham, 2015), 379–390.



Andriotis, P. and Oikonomou, G. 2015. Messaging Activity Reconstruction with Sentiment Polarity Identification. Human Aspects of Information Security, Privacy, and Trust (Cham, 2015), 475–486.



Andriotis, P. et al. 2015. A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem. Advances in Digital Forensics XI (Cham, 2015), 251–267.



Aboluwarin, O. et al. 2016. Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics. Advances in Digital Forensics XII (Cham, 2016), 69–87.



Li, S. et al. 2019. Distributed consensus algorithm for events detection in cyber-physical systems. IEEE Internet of Things Journal. 6, 2 (2019), 2299–2308. DOI:https://doi.org/10.1109/JIOT.2019.2906157.



Andriotis, P. and Takasu, A. 2018. Emotional Bots: Content-based Spammer Detection on Social Media. 2018 IEEE International Workshop on Information Forensics and Security (WIFS) (Dec. 2018), 1–8.



Andriotis, P. et al. 2014. On the Development of Automated Forensic Analysis Methods for Mobile Devices. Trust and Trustworthy Computing (Cham, 2014), 212–213.



McCarthy, A. et al. 2021. Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks. 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (2021), 1–8.


Read, H. et al. 2015. An Extensible Platform for the Forensic Analysis of Social Media Data. Human Aspects of Information Security, Privacy, and Trust (Cham, 2015), 404–414.


Andriotis, P. and Takasu, A. 2020. To Allow, or Deny? That is the Question. HCI for Cybersecurity, Privacy and Trust (Cham, 2020), 287–304.


Andriotis, P. et al. 2022. Bu-Dash: A Universal and Dynamic Graphical Password Scheme. HCI for Cybersecurity, Privacy and Trust (Cham, 2022), 209–227.


McCarthy, A. et al. 2022. Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey. Journal of Cybersecurity and Privacy. 2, 1 (2022), 154–190. DOI:https://doi.org/10.3390/jcp2010010.