Publications

Publications in reversed chronological order. Generated by jekyll-scholar.

2022

  1. JCP2022
    Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
    McCarthy, Andrew, Ghadafi, Essam, Andriotis, Panagiotis, and Legg, Phil
    Journal of Cybersecurity and Privacy 2022
  2. HCII2022
    Bu-Dash: A Universal and Dynamic Graphical Password Scheme
    Andriotis, Panagiotis, Kirby, Myles, and Takasu, Atsuhiro
    In HCI for Cybersecurity, Privacy and Trust 2022
  3. CJEM2022
    AI hyped? A horizon scan of discourse in Artificial Intelligence in Education (AIED) and development
    Nemorin, Selena, Ayerakwa, Hayford Mensah, Vlachidis, Andreas, and Andriotis, Panagiotis
    Learning, Media and Technology 2022

2021

  1. CyberSA2021
    Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks
    McCarthy, Andrew, Andriotis, Panagiotis, Ghadafi, Essam, and Legg, Phil
    In 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) 2021
  2. ICWSM2021
    Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM)
    Nurse, Jason RC, Vargas, Francielle, Hassan, Naeemul, Wang, Dakuo, Andriotis, Panagiotis, Ghenai, Amira, Jaidka, Kokil, Mustafaraj, Eni, Joseph, Kenneth, and Welles, Brooke Foucault
    In 15th International AAAI Conference on Web and Social Media 2021

2020

  1. HCII2020
    To Allow, or Deny? That is the Question
    Andriotis, Panagiotis, and Takasu, Atsuhiro
    In HCI for Cybersecurity, Privacy and Trust 2020

2019

  1. TOPS
    MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
    ACM Transactions on Privacy and Security Apr 2019
  2. IOTJ
    Distributed consensus algorithm for events detection in cyber-physical systems
    Li, Shancang, Zhao, Shanshan, Yang, Po, Andriotis, Panagiotis, Xu, Lida, and Sun, Qindong
    IEEE Internet of Things Journal 2019

2018

  1. JISA
    Studying users’ adaptation to Android’s run-time fine-grained access control system
    Andriotis, Panagiotis, Stringhini, Gianluca, and Sasse, Martina Angela
    Journal of Information Security and Applications 2018
  2. WIFS’18
    Emotional Bots: Content-based Spammer Detection on Social Media
    Andriotis, Panagiotis, and Takasu, Atsuhiro
    In 2018 IEEE International Workshop on Information Forensics and Security (WIFS) Dec 2018

2017

  1. NDSS2017
    MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
    In 24th Network and Distributed System Security Symposium (NDSS 2017) 2017
  2. HCII2017
    A Comparative Study of Android Users’ Privacy Preferences Under the Runtime Permission Model
    In Human Aspects of Information Security, Privacy and Trust 2017
  3. HCII2017
    Privacy Decision-Making in the Digital Era: A Game Theoretic Review
    Anastasopoulou, Kallia, Kokolakis, Spyros, and Andriotis, Panagiotis
    In Human Aspects of Information Security, Privacy and Trust 2017

2016

  1. ICS
    A study on usability and security features of the Android pattern lock screen
    Andriotis, Panagiotis, Oikonomou, George, Mylonas, Alexios, and Tryfonas, Theo
    Information and Computer Security 2016
  2. TCYB
    Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations
    Andriotis, Panagiotis, Oikonomou, George, Tryfonas, Theo, and Li, Shancang
    IEEE Transactions on Cybernetics Sep 2016
  3. HCII2016
    Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
    Tryfonas, Theo, Carter, Michael, Crick, Tom, and Andriotis, Panagiotis
    In Human Aspects of Information Security, Privacy, and Trust 2016
  4. TCYB
    Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network
    Li, Shancang, Tryfonas, Theo, Russell, Gordon, and Andriotis, Panagiotis
    IEEE Transactions on Cybernetics Aug 2016
  5. IFIP16
    Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics
    Aboluwarin, Oluwapelumi, Andriotis, Panagiotis, Takasu, Atsuhiro, and Tryfonas, Theo
    In Advances in Digital Forensics XII 2016
  6. IFIP16
    Impact of User Data Privacy Management Controls on Mobile Device Investigations
    Andriotis, Panagiotis, and Tryfonas, Theo
    In Advances in Digital Forensics XII 2016
  7. WIFS’16
    Permissions snapshots: Assessing users’ adaptation to the Android runtime permission model
    Andriotis, Panagiotis, Sasse, Martina Angela, and Stringhini, Gianluca
    In 2016 IEEE International Workshop on Information Forensics and Security (WIFS) Dec 2016

2015

  1. HCII2015
    Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System
    Li, Shancang, Chen, Junhua, Spyridopoulos, Theodoros, Andriotis, Panagiotis, Ludwiniak, Robert, and Russell, Gordon
    In Human Aspects of Information Security, Privacy, and Trust 2015
  2. HCII2015
    Messaging Activity Reconstruction with Sentiment Polarity Identification
    Andriotis, Panagiotis, and Oikonomou, George
    In Human Aspects of Information Security, Privacy, and Trust 2015
  3. HCII2015
    An Extensible Platform for the Forensic Analysis of Social Media Data
    Read, Huw, Xynos, Konstantinos, Sutherland, Iain, Roarson, Frode, Andriotis, Panagiotis, and Oikonomou, George
    In Human Aspects of Information Security, Privacy, and Trust 2015
  4. IFIP15
    A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem
    Andriotis, Panagiotis, Tryfonas, Theo, Oikonomou, George, and King, Irwin
    In Advances in Digital Forensics XI 2015

2014

  1. HCII2014
    Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method
    Andriotis, Panagiotis, Tryfonas, Theo, and Oikonomou, George
    In Human Aspects of Information Security, Privacy, and Trust 2014
  2. IFIP14
    Smartphone Message Sentiment Analysis
    Andriotis, Panagiotis, Takasu, Atsuhiro, and Tryfonas, Theo
    In Advances in Digital Forensics X 2014
  3. TRUST2014
    On the Development of Automated Forensic Analysis Methods for Mobile Devices
    Andriotis, Panagiotis, Tryfonas, Theo, Oikonomou, George, Li, Shancang, Tzermias, Zacharias, Xynos, Konstantinos, Read, Huw, and Prevelakis, Vassilis
    In Trust and Trustworthy Computing 2014
  4. WiSec’14
    POSTER: Breaking the Android Pattern Lock Screen with Neural Networks and Smudge Attacks
    Andriotis, Panagiotis, Tryfonas, Theo, and Yu, Zhaoqian
    Jul 2014

2013

  1. WiSec’13
    A Pilot Study on the Security of Pattern Screen-lock Methods and Soft Side Channel Attacks
    Andriotis, Panagiotis, Tryfonas, Theo, Oikonomou, George, and Yildiz, Can
    In Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013
  2. FSI:DI
    JPEG steganography detection with Benford’s Law
    Andriotis, Panagiotis, Oikonomou, George, and Tryfonas, Theo
    Digital Investigation 2013
  3. IJDCF
    Multilevel visualization using enhanced social network analysis with smartphone data
    Andriotis, Panagiotis, Tzermias, Zacharias, Mparmpaki, Anthi, Ioannidis, Sotiris, and Oikonomou, George
    International Journal of Digital Crime and Forensics (IJDCF) 2013
  4. SPI2013
    On Two Different Methods for Steganography Detection in JPEG Images with Benford’s Law
    Andriotis, Panagiotis, Tryfonas, Theo, Oikonomou, George, Spyridopoulos, Theodoros, Zaharis, Alexandros, Martini, Adamantini, and Askoxylakis, Ioannis
    In Security and Protection of Information-SPI 2013 May 2013

2012

  1. WIFS’12
    Forensic analysis of wireless networking evidence of Android smartphones
    Andriotis, Panagiotis, Oikonomou, George, and Tryfonas, Theo
    In 2012 IEEE International Workshop on Information Forensics and Security (WIFS) Dec 2012