Maria Papadaki

Orcid: 0000-0003-0817-2651

According to our database1, Maria Papadaki authored at least 65 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cybersecurity Incident Response Readiness in Organisations.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Introduction to the Minitrack on Blockchain Cases and Innovations.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Towards cross-border CBDC interoperability: insights from a multivocal literature review.
J. Enterp. Inf. Manag., 2023

Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Integrating LLMs in Higher Education, Through Interactive Problem Solving and Tutoring: Algorithmic Approach and Use Cases.
Proceedings of the Information Systems, 2023

2022
The Importance of the Job Role in Social Media Cybersecurity Training.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

A Bibliometric Analysis of Digital Transformation for a Resilient Organization.
Proceedings of the Information Systems, 2022

Bibliometric Analysis of Publications on the Evacuation of Hazards Using GIS as a Decision Support Tool from the Scopus Database.
Proceedings of the Information Systems, 2022

2021
ViewpointCovid-19 digital test certificates and blockchain.
J. Enterp. Inf. Manag., 2021

Blockchain technology in the Middle East and North Africa region.
Inf. Technol. Dev., 2021

A collaborative approach for national cybersecurity incident management.
Inf. Comput. Secur., 2021

Towards a cross-cultural education framework for online safety awareness.
Inf. Comput. Secur., 2021

An empirical analysis of the information security culture key factors framework.
Comput. Secur., 2021

X3D Audio Graph for the consistent declarative representation of the W3C Audio API.
Proceedings of the Web3D '21: The 26th International Conference on 3D Web Technology, Pisa, Italy, November 8, 2021

Blockchain Digital Test Certificates for COVID-19.
Proceedings of the Modern Management based on Big Data II and Machine Learning and Intelligent Systems III, 2021

A Survey of Software Development Projects.
Proceedings of the International Conference on Artificial Intelligence and Computer Vision, 2021

2020
Towards a maturity model for health-care cloud security (M2HCS).
Inf. Comput. Secur., 2020

Blockchain in Smart Energy Grids: A Market Analysis.
Proceedings of the Information Systems, 2020

2019
A Comprehensive Framework for Understanding Security Culture in Organizations.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

An Online Platform for 'Black Swan' Event Management in the Hospitality Industry.
Proceedings of the Information Systems, 2019

Current Cybersecurity Maturity Models: How Effective in Healthcare Cloud?
Proceedings of the 5th Collaborative European Research Conference (CERC 2019), 2019

2018
Designing an Anti-Cyberbullying Programme in Thailand.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

2017
The impact of security and its antecedents in behaviour intention of using e-government services.
Behav. Inf. Technol., 2017

Enhancing cyber security awareness with mobile games.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

A comperhansive framework for cultivating and assessing Information Security Culture .
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

2016
Graphical One-Time Password (GOTPass): A usability evaluation.
Inf. Secur. J. A Glob. Perspect., 2016

A survey of cyber-security awareness in Saudi Arabia.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

2015
Secure Graphical One Time Password (GOTPass): An Empirical Study.
Inf. Secur. J. A Glob. Perspect., 2015

FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks.
Comput. J., 2015

2014
A response selection model for intrusion response systems: Response Strategy Model (RSM).
Secur. Commun. Networks, 2014

Active authentication for mobile devices utilising behaviour profiling.
Int. J. Inf. Sec., 2014

Vulnerability of opportunistic parking assistance systems to vehicular node selfishness.
Comput. Commun., 2014

Security challenges of E-government adoption based on end users' perspective.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Alternative Graphical Authentication for Online Banking Environments.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM).
Secur. Commun. Networks, 2013

Opportunistically-assisted parking search: A story of free riders, selfish liars and bona fide mules.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

IT Application Outsourcing in Europe: Long-Term Outcomes, Success Factors and Implications for ITO Maturity.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Secur. Commun. Networks, 2012

A Response Strategy Model for Intrusion Response Systems.
Proceedings of the Information Security and Privacy Research, 2012

Education in the 'Virtual' Community: Can beating Malware Man teach users about Social Networking Security?.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

2011
LUARM: An Audit Engine for Insider Misuse Detection.
Int. J. Digit. Crime Forensics, 2011

Misuse Detection for Mobile Devices Using Behaviour Profiling.
Int. J. Cyber Warf. Terror., 2011

2010
Vulnerability management: an attitude of mind?
Netw. Secur., 2010

Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments.
J. Multim. Process. Technol., 2010

A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm.
Comput. Secur., 2010

Assessing the Usability of End-User Security Software.
Proceedings of the Trust, 2010

Online addiction: privacy risks in online gaming environments.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

An investigation and survey of response options for Intrusion Response Systems (IRSs).
Proceedings of the Information Security South Africa Conference 2010, 2010

ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Behaviour Profiling on Mobile Devices.
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010

2009
Social engineering: assessing vulnerabilities in practice.
Inf. Manag. Comput. Secur., 2009

Improving Awareness of Social Engineering Attacks.
Proceedings of the Information Assurance and Security Education and Training, 2009

2008
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.
Proceedings of the Trust, 2008

Investigating the problem of IDS false alarms: An experimental study using Snort.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A Practical Assessment of Social Engineering Vulnerabilities.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

2007
Considering the potential of criminal profiling to combat hacking.
J. Comput. Virol., 2007

2006
Achieving automated intrusion response: a prototype implementation.
Inf. Manag. Comput. Secur., 2006

2005
Informing the decision process in an automated intrusion response system.
Inf. Secur. Tech. Rep., 2005

Kinetic models of complex reaction systems.
Comput. Chem. Eng., 2005

2004
Classifying and responding to network intrusions.
PhD thesis, 2004

2003
Operational Characteristics of an Automated Intrusion Response System.
Proceedings of the Communications and Multimedia Security, 2003

2002
An experimental comparison of secret-based user authentication technologies.
Inf. Manag. Comput. Secur., 2002

Keystroke Analysis as a Method of Advanced User Authentication and Response.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001


  Loading...