@article{selena2022,abbr={CJEM},bibtex_show={true},author={Nemorin, Selena and Ayerakwa, Hayford Mensah and Vlachidis, Andreas and Andriotis, Panagiotis},title={AI hyped? A horizon scan of discourse on Artificial Intelligence in Education (AIED) and development},journal={Learning, Media and Technology},volume={48},year={2023},number={1},pages={38--51},publisher={Taylor \& Francis},url={https://doi.org/10.1080/17439884.2022.2095568},html={https://doi.org/10.1080/17439884.2022.2095568},doi={10.1080/17439884.2022.2095568},pdf={cjem22.pdf},selected={true}}
IJIS
Bu-Dash: a universal and dynamic graphical password scheme (extended version)
@article{bdext2022,abbr={IJIS},bibtex_show={true},author={Andriotis, Panagiotis and Kirby, Myles and Takasu, Atsuhiro},title={Bu-Dash: a universal and dynamic graphical password scheme (extended version)},journal={International Journal of Information Security},volume={22},year={2023},number={2},pages={381--401},url={https://doi.org/10.1007/s10207-022-00642-2},html={https://rdcu.be/c1XZv},doi={10.1007/s10207-022-00642-2},pdf={bdextend.pdf},selected={true}}
JISA
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification
@article{andy2023,abbr={JISA},bibtex_show={true},author={McCarthy, Andrew and Ghadafi, Essam and Andriotis, Panagiotis and Legg, Phil},title={Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification},journal={Journal of Information Security and Applications},volume={72},year={2023},number={},pages={103398},url={https://doi.org/10.1016/j.jisa.2022.103398},html={https://www.sciencedirect.com/science/article/pii/S2214212622002423},doi={10.1016/j.jisa.2022.103398},pdf={andy2023.pdf},selected={true}}
2022
JCP
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
@article{andy2022,abbr={JCP},bibtex_show={true},author={McCarthy, Andrew and Ghadafi, Essam and Andriotis, Panagiotis and Legg, Phil},title={Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey},journal={Journal of Cybersecurity and Privacy},volume={2},year={2022},number={1},pages={154--190},publisher={MDPI},url={https://www.mdpi.com/2624-800X/2/1/10},html={https://www.mdpi.com/2624-800X/2/1/10},doi={10.3390/jcp2010010},pdf={andy2022m.pdf}}
HCII22
Bu-Dash: A Universal and Dynamic Graphical Password Scheme
@inproceedings{Andriotis2022has,abbr={HCII22},bibtex_show={true},author={Andriotis, Panagiotis and Kirby, Myles and Takasu, Atsuhiro},editor={Moallem, Abbas},title={Bu-Dash: A Universal and Dynamic Graphical Password Scheme},booktitle={HCI for Cybersecurity, Privacy and Trust},year={2022},publisher={Springer International Publishing},address={Cham},pages={209--227},isbn={978-3-031-05563-8},doi={10.1007/978-3-031-05563-8\_14},url={https://doi.org/10.1007/978-3-031-05563-8\_14},html={https://doi.org/10.1007/978-3-031-05563-8\_14},pdf={hcii22andrio.pdf}}
2021
CyberSA21
Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks
@inproceedings{Andrew2021,abbr={CyberSA21},bibtex_show={true},author={McCarthy, Andrew and Andriotis, Panagiotis and Ghadafi, Essam and Legg, Phil},booktitle={2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)},title={Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks},year={2021},volume={},number={},pages={1-8},doi={10.1109/CyberSA52016.2021.9478199},url={https://doi.org/10.1109/CyberSA52016.2021.9478199},html={https://doi.org/10.1109/CyberSA52016.2021.9478199},pdf={2021andy.pdf}}
ICWSM21
Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM)
@inproceedings{icwsm2021,abbr={ICWSM21},bibtex_show={true},author={Nurse, Jason RC and Vargas, Francielle and Hassan, Naeemul and Wang, Dakuo and Andriotis, Panagiotis and Ghenai, Amira and Jaidka, Kokil and Mustafaraj, Eni and Joseph, Kenneth and Welles, Brooke Foucault},booktitle={15th International AAAI Conference on Web and Social Media},title={Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM)},year={2021},volume={},number={},pages={1-12},doi={10.36190/2021.00},url={https://doi.org/10.36190/2021.00},html={https://doi.org/10.36190/2021.00},pdf={icwsm2021p.pdf}}
@inproceedings{Andriotis2020hci,abbr={HCII20},bibtex_show={true},author={Andriotis, Panagiotis and Takasu, Atsuhiro},editor={Moallem, Abbas},title={To Allow, or Deny? That is the Question},booktitle={HCI for Cybersecurity, Privacy and Trust},year={2020},publisher={Springer International Publishing},address={Cham},pages={287--304},isbn={978-3-030-50309-3},doi={10.1007/978-3-030-50309-3\_20},url={https://doi.org/10.1007/978-3-030-50309-3\_20},html={https://doi.org/10.1007/978-3-030-50309-3\_20},pdf={hcii20andrio.pdf},selected={true}}
2019
TOPS
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
@article{Andriotis2019tops,abbr={TOPS},bibtex_show={true},author={Onwuzurike, Lucky and Mariconti, Enrico and Andriotis, Panagiotis and Cristofaro, Emiliano De and Ross, Gordon and Stringhini, Gianluca},title={MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)},year={2019},publisher={Association for Computing Machinery},address={New York, NY, USA},volume={22},number={2},issn={2471-2566},url={https://doi.org/10.1145/3313391},doi={10.1145/3313391},journal={ACM Transactions on Privacy and Security},month=apr,numpages={34},html={https://doi.org/10.1145/3313391},pdf={topsmama.pdf},selected={true}}
IOTJ
Distributed consensus algorithm for events detection in cyber-physical systems
@article{Andriotis2019iotj,abbr={IOTJ},bibtex_show={true},html={https://doi.org/10.1109/JIOT.2019.2906157},pdf={iotj19andrio.pdf},title={Distributed consensus algorithm for events detection in cyber-physical systems},author={Li, Shancang and Zhao, Shanshan and Yang, Po and Andriotis, Panagiotis and Xu, Lida and Sun, Qindong},journal={IEEE Internet of Things Journal},volume={6},number={2},pages={2299--2308},year={2019},publisher={IEEE},doi={10.1109/JIOT.2019.2906157},url={https://doi.org/10.1109/JIOT.2019.2906157},selected={true}}
2018
JISA
Studying usersâ adaptation to Androidâs run-time fine-grained access control system
@article{Andriotis2018jisa,abbr={JISA},bibtex_show={true},title={Studying usersâ adaptation to Androidâs run-time fine-grained access control system},journal={Journal of Information Security and Applications},volume={40},pages={31-43},year={2018},issn={2214-2126},doi={10.1016/j.jisa.2018.02.004},url={https://doi.org/10.1016/j.jisa.2018.02.004},author={Andriotis, Panagiotis and Stringhini, Gianluca and Sasse, Martina Angela},html={https://doi.org/10.1016/j.jisa.2018.02.004},pdf={jisa18andrio.pdf},selected={true}}
WIFSâ18
Emotional Bots: Content-based Spammer Detection on Social Media
@inproceedings{Andriotis2018wifs,abbr={WIFS'18},bibtex_show={true},author={Andriotis, Panagiotis and Takasu, Atsuhiro},booktitle={2018 IEEE International Workshop on Information Forensics and Security (WIFS)},title={{Emotional Bots: Content-based Spammer Detection on Social Media}},year={2018},pages={1--8},month=dec,doi={10.1109/WIFS.2018.8630760},url={https://doi.org/10.1109/WIFS.2018.8630760},html={https://doi.org/10.1109/WIFS.2018.8630760},pdf={wifs18andrio.pdf}}
2017
NDSS17
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
@inproceedings{Mariconti2017,abbr={NDSS17},bibtex_show={true},author={Mariconti, Enrico and Onwuzurike, Lucky and Andriotis, Panagiotis and Cristofaro, Emiliano De and Ross, Gordon J. and Stringhini, Gianluca},title={{MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models}},booktitle={24th Network and Distributed System Security Symposium (NDSS 2017)},year={2017},pages={1--15},doi={10.14722/ndss.2017.23353},url={https://doi.org/10.14722/ndss.2017.23353},html={https://www.ndss-symposium.org/wp-content/uploads/2017/09/ndss2017\_03B-3\_Mariconti\_paper.pdf},pdf={ndss17mama.pdf}}
HCII17
A Comparative Study of Android Usersâ Privacy Preferences Under the Runtime Permission Model
@inproceedings{Andriotis2017has,abbr={HCII17},bibtex_show={true},author={Andriotis, Panagiotis and Li, Shancang and Spyridopoulos, Theodoros and Stringhini, Gianluca},editor={Tryfonas, Theo},title={A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model},booktitle={Human Aspects of Information Security, Privacy and Trust},year={2017},publisher={Springer International Publishing},address={Cham},pages={604--622},doi={10.1007/978-3-319-58460-7\_42},url={https://doi.org/10.1007/978-3-319-58460-7\_42},html={https://doi.org/10.1007/978-3-319-58460-7\_42},pdf={has2017.pdf}}
HCII17
Privacy Decision-Making in the Digital Era: A Game Theoretic Review
Anastasopoulou, Kallia,
Kokolakis, Spyros,
and Andriotis, Panagiotis
In Human Aspects of Information Security, Privacy and Trust
2017
@inproceedings{Anastasopoulou2017has,abbr={HCII17},bibtex_show={true},author={Anastasopoulou, Kallia and Kokolakis, Spyros and Andriotis, Panagiotis},editor={Tryfonas, Theo},title={Privacy Decision-Making in the Digital Era: A Game Theoretic Review},booktitle={Human Aspects of Information Security, Privacy and Trust},year={2017},publisher={Springer International Publishing},address={Cham},pages={589--603},doi={10.1007/978-3-319-58460-7\_41},url={https://doi.org/10.1007/978-3-319-58460-7\_41},html={https://doi.org/10.1007/978-3-319-58460-7\_41},pdf={has2017k.pdf}}
2016
ICS
A study on usability and security features of the Android pattern lock screen
@article{Andriotis2016ics,abbr={ICS},bibtex_show={true},author={Andriotis, Panagiotis and Oikonomou, George and Mylonas, Alexios and Tryfonas, Theo},title={{A study on usability and security features of the Android pattern lock screen}},journal={Information and Computer Security},volume={24},number={1},pages={53-72},year={2016},doi={10.1108/ICS-01-2015-0001},url={https://doi.org/10.1108/ICS-01-2015-0001},publisher={Emerald Publishing},html={https://doi.org/10.1108/ICS-01-2015-0001},pdf={ics16andrio.pdf}}
TCYB
Highlighting Relationships of a Smartphoneâs Social Ecosystem in Potentially Large Investigations
@article{Andriotis2016tcyb,abbr={TCYB},bibtex_show={true},author={Andriotis, Panagiotis and Oikonomou, George and Tryfonas, Theo and Li, Shancang},journal={IEEE Transactions on Cybernetics},title={{Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations}},year={2016},volume={46},number={9},pages={1974-1985},doi={10.1109/TCYB.2015.2454733},url={https://doi.org/10.1109/TCYB.2015.2454733},issn={2168-2267},month=sep,publisher={IEEE},html={https://doi.org/10.1109/TCYB.2015.2454733},pdf={tcyb16andrio.pdf},selected={true}}
HCII16
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
@inproceedings{Tryfonas2016has,abbr={HCII16},bibtex_show={true},author={Tryfonas, Theo and Carter, Michael and Crick, Tom and Andriotis, Panagiotis},editor={Tryfonas, Theo},title={Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret},booktitle={Human Aspects of Information Security, Privacy, and Trust},year={2016},publisher={Springer International Publishing},address={Cham},pages={174--185},isbn={978-3-319-39381-0},doi={10.1007/978-3-319-39381-0\_16},url={https://doi.org/10.1007/978-3-319-39381-0\_16},html={https://doi.org/10.1007/978-3-319-39381-0\_16},pdf={has16theo.pdf}}
TCYB16
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network
@article{Li2016tcyb,abbr={TCYB16},bibtex_show={true},author={Li, Shancang and Tryfonas, Theo and Russell, Gordon and Andriotis, Panagiotis},journal={IEEE Transactions on Cybernetics},title={{Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network}},year={2016},volume={46},number={8},pages={1749-1759},doi={10.1109/TCYB.2016.2537649},url={https://doi.org/10.1109/TCYB.2016.2537649},issn={2168-2267},month=aug,html={https://doi.org/10.1109/TCYB.2016.2537649},pdf={tcyb16li.pdf},selected={true}}
IFIP16
Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics
@inproceedings{Aboluwarin2016,abbr={IFIP16},bibtex_show={true},author={Aboluwarin, Oluwapelumi and Andriotis, Panagiotis and Takasu, Atsuhiro and Tryfonas, Theo},editor={Peterson, Gilbert and Shenoi, Sujeet},title={Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics},booktitle={Advances in Digital Forensics XII},year={2016},publisher={Springer International Publishing},address={Cham},pages={69--87},isbn={978-3-319-46279-0},doi={10.1007/978-3-319-46279-0\_4},url={https://doi.org/10.1007/978-3-319-46279-0\_4},html={https://doi.org/10.1007/978-3-319-46279-0\_4},pdf={ifip16pelumi.pdf}}
IFIP16
Impact of User Data Privacy Management Controls on Mobile Device Investigations
@inproceedings{Andriotis2016ifip,abbr={IFIP16},bibtex_show={true},author={Andriotis, Panagiotis and Tryfonas, Theo},editor={Peterson, Gilbert and Shenoi, Sujeet},title={Impact of User Data Privacy Management Controls on Mobile Device Investigations},booktitle={Advances in Digital Forensics XII},address={Cham},year={2016},publisher={Springer International Publishing},pages={89--105},isbn={978-3-319-46279-0},doi={10.1007/978-3-319-46279-0\_5},url={https://doi.org/10.1007/978-3-319-46279-0\_5},html={https://doi.org/10.1007/978-3-319-46279-0\_5},pdf={ifip16andrio.pdf}}
WIFS16
Permissions snapshots: Assessing usersâ adaptation to the Android runtime permission model
@inproceedings{Andriotis2016wifs,abbr={WIFS16},bibtex_show={true},author={Andriotis, Panagiotis and Sasse, Martina Angela and Stringhini, Gianluca},booktitle={2016 IEEE International Workshop on Information Forensics and Security (WIFS)},title={{Permissions snapshots: Assessing users' adaptation to the Android runtime permission model}},year={2016},pages={1-6},doi={10.1109/WIFS.2016.7823922},url={https://doi.org/10.1109/WIFS.2016.7823922},month=dec,html={https://doi.org/10.1109/WIFS.2016.7823922},pdf={wifs16andrio.pdf}}
2015
HCII15
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System
@inproceedings{Li2015has,abbr={HCII15},bibtex_show={true},author={Li, Shancang and Chen, Junhua and Spyridopoulos, Theodoros and Andriotis, Panagiotis and Ludwiniak, Robert and Russell, Gordon},editor={Tryfonas, Theo and Askoxylakis, Ioannis},title={Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System},booktitle={Human Aspects of Information Security, Privacy, and Trust},year={2015},publisher={Springer International Publishing},address={Cham},pages={379--390},isbn={978-3-319-20376-8},doi={10.1007/978-3-319-20376-8\_34},url={https://doi.org/10.1007/978-3-319-20376-8\_34},html={https://doi.org/10.1007/978-3-319-20376-8\_34},pdf={has2015li.pdf}}
HCII15
Messaging Activity Reconstruction with Sentiment Polarity Identification
@inproceedings{Andriotis2015has,abbr={HCII15},bibtex_show={true},author={Andriotis, Panagiotis and Oikonomou, George},editor={Tryfonas, Theo and Askoxylakis, Ioannis},title={Messaging Activity Reconstruction with Sentiment Polarity Identification},booktitle={Human Aspects of Information Security, Privacy, and Trust},year={2015},publisher={Springer International Publishing},address={Cham},pages={475--486},isbn={978-3-319-20376-8},doi={10.1007/978-3-319-20376-8\_42},url={https://doi.org/10.1007/978-3-319-20376-8\_42},html={https://doi.org/10.1007/978-3-319-20376-8\_42},pdf={has15andrio.pdf}}
HCII15
An Extensible Platform for the Forensic Analysis of Social Media Data
@inproceedings{Read2015has,abbr={HCII15},bibtex_show={true},author={Read, Huw and Xynos, Konstantinos and Sutherland, Iain and Roarson, Frode and Andriotis, Panagiotis and Oikonomou, George},editor={Tryfonas, Theo and Askoxylakis, Ioannis},title={An Extensible Platform for the Forensic Analysis of Social Media Data},booktitle={Human Aspects of Information Security, Privacy, and Trust},year={2015},publisher={Springer International Publishing},address={Cham},pages={404--414},isbn={978-3-319-20376-8},doi={10.1007/978-3-319-20376-8\_36},url={https://doi.org/10.1007/978-3-319-20376-8\_36},html={https://doi.org/10.1007/978-3-319-20376-8\_36},pdf={has15huw.pdf}}
IFIP15
A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem
@inproceedings{Andriotis2015ifip,abbr={IFIP15},bibtex_show={true},author={Andriotis, Panagiotis and Tryfonas, Theo and Oikonomou, George and King, Irwin},editor={Peterson, Gilbert and Shenoi, Sujeet},title={A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem},booktitle={Advances in Digital Forensics XI},year={2015},publisher={Springer International Publishing},address={Cham},pages={251--267},isbn={978-3-319-24123-4},doi={10.1007/978-3-319-24123-4\_15},url={https://doi.org/10.1007/978-3-319-24123-4\_15},html={https://doi.org/10.1007/978-3-319-24123-4\_15},pdf={ifip15andrio.pdf}}
2014
HCII14
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method
@inproceedings{Andriotis2014has,abbr={HCII14},bibtex_show={true},author={Andriotis, Panagiotis and Tryfonas, Theo and Oikonomou, George},editor={Tryfonas, Theo and Askoxylakis, Ioannis},title={Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method},booktitle={Human Aspects of Information Security, Privacy, and Trust},year={2014},publisher={Springer International Publishing},address={Cham},pages={115--126},isbn={978-3-319-07620-1},doi={10.1007/978-3-319-07620-1\_11},url={https://doi.org/10.1007/978-3-319-07620-1\_11},html={https://doi.org/10.1007/978-3-319-07620-1\_11},pdf={has14andrio.pdf}}
@inproceedings{Andriotis2014ifip,abbr={IFIP14},bibtex_show={true},author={Andriotis, Panagiotis and Takasu, Atsuhiro and Tryfonas, Theo},editor={Peterson, Gilbert and Shenoi, Sujeet},title={Smartphone Message Sentiment Analysis},booktitle={Advances in Digital Forensics X},year={2014},publisher={Springer Berlin Heidelberg},address={Berlin, Heidelberg},pages={253--265},isbn={978-3-662-44952-3},doi={10.1007/978-3-662-44952-3\_17},url={https://doi.org/10.1007/978-3-662-44952-3\_17},html={https://doi.org/10.1007/978-3-662-44952-3\_17},pdf={ifip14andrio.pdf}}
TRUST14
On the Development of Automated Forensic Analysis Methods for Mobile Devices
@inproceedings{Andriotis2014trust,abbr={TRUST14},bibtex_show={true},author={Andriotis, Panagiotis and Tryfonas, Theo and Oikonomou, George and Li, Shancang and Tzermias, Zacharias and Xynos, Konstantinos and Read, Huw and Prevelakis, Vassilis},editor={Holz, Thorsten and Ioannidis, Sotiris},title={On the Development of Automated Forensic Analysis Methods for Mobile Devices},booktitle={Trust and Trustworthy Computing},year={2014},publisher={Springer International Publishing},address={Cham},pages={212--213},isbn={978-3-319-08593-7},url={https://doi.org/10.1007/978-3-319-08593-7\_17},doi={10.1007/978-3-319-08593-7\_17},html={https://doi.org/10.1007/978-3-319-08593-7\_17},pdf={trust14andrio.pdf}}
WiSecâ14
POSTER: Breaking the Android Pattern Lock Screen with Neural Networks and Smudge Attacks
@misc{andriotisposter,abbr={WiSec'14},bibtex_show={true},title={{POSTER: Breaking the Android Pattern Lock Screen with Neural Networks and Smudge Attacks}},author={Andriotis, Panagiotis and Tryfonas, Theo and Yu, Zhaoqian},howpublished={presented at the 7th ACM Conference on Security \& Privacy in Wireless and Mobile Networks (WiSec'14)},address={Oxford, United Kingdom},year={2014},month=jul,url={https://research-information.bris.ac.uk/ws/portalfiles/portal/32445786/poster3.pdf},html={https://research-information.bris.ac.uk/ws/portalfiles/portal/32445786/poster3.pdf},pdf={wisec14andrio.pdf}}
2013
WiSec13
A Pilot Study on the Security of Pattern Screen-lock Methods and Soft Side Channel Attacks
@inproceedings{Andriotis2013wisec,abbr={WiSec13},bibtex_show={true},author={Andriotis, Panagiotis and Tryfonas, Theo and Oikonomou, George and Yildiz, Can},title={{A Pilot Study on the Security of Pattern Screen-lock Methods and Soft Side Channel Attacks}},booktitle={Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks},series={WiSec '13},year={2013},isbn={978-1-4503-1998-0},location={Budapest, Hungary},pages={1--6},numpages={6},doi={10.1145/2462096.2462098},url={https://doi.org/10.1145/2462096.2462098},publisher={ACM},address={New York, NY, USA},html={https://doi.org/10.1145/2462096.2462098},pdf={wisec13andrio.pdf}}
@article{Andriotis2013di,abbr={FSI:DI},bibtex_show={true},title={JPEG steganography detection with Benford's Law},journal={Digital Investigation},volume={9},number={3},pages={246-257},year={2013},issn={1742-2876},doi={10.1016/j.diin.2013.01.005},url={https://doi.org/10.1016/j.diin.2013.01.005},author={Andriotis, Panagiotis and Oikonomou, George and Tryfonas, Theo},html={https://doi.org/10.1016/j.diin.2013.01.005},pdf={di13andrio.pdf}}
IJDCF
Multilevel visualization using enhanced social network analysis with smartphone data
@article{Andriotis2013multilevel,abbr={IJDCF},bibtex_show={true},title={{Multilevel visualization using enhanced social network analysis with smartphone data}},author={Andriotis, Panagiotis and Tzermias, Zacharias and Mparmpaki, Anthi and Ioannidis, Sotiris and Oikonomou, George},journal={International Journal of Digital Crime and Forensics (IJDCF)},volume={5},number={4},pages={34--54},year={2013},publisher={IGI Global},doi={10.4018/ijdcf.2013100103},url={https://doi.org/10.4018/ijdcf.2013100103},html={https://doi.org/10.4018/ijdcf.2013100103},pdf={ijdcf13andrio.pdf}}
SPI
On Two Different Methods for Steganography Detection in JPEG Images with Benfordâs Law
@inproceedings{andriotis2013two,abbr={SPI},bibtex_show={true},title={On Two Different Methods for Steganography Detection in JPEG Images with Benfordâs Law},author={Andriotis, Panagiotis and Tryfonas, Theo and Oikonomou, George and Spyridopoulos, Theodoros and Zaharis, Alexandros and Martini, Adamantini and Askoxylakis, Ioannis},booktitle={Security and Protection of Information-SPI 2013},pages={3--14},year={2013},volume={7},month=may,issn={2336-5587},organization={Brno University of Defence},url={http://spi.unob.cz/papers/2013/2013-01.pdf},html={http://spi.unob.cz/papers/2013/2013-01.pdf},pdf={spi13andrio.pdf}}
2012
WIFS12
Forensic analysis of wireless networking evidence of Android smartphones
@inproceedings{Andriotis2012wifs,abbr={WIFS12},bibtex_show={true},author={Andriotis, Panagiotis and Oikonomou, George and Tryfonas, Theo},booktitle={2012 IEEE International Workshop on Information Forensics and Security (WIFS)},title={{Forensic analysis of wireless networking evidence of Android smartphones}},year={2012},pages={109-114},doi={10.1109/WIFS.2012.6412634},url={https://doi.org/10.1109/WIFS.2012.6412634},issn={2157-4766},month=dec,html={https://doi.org/10.1109/WIFS.2012.6412634},pdf={wifs12andrio.pdf}}