Ioannis Agrafiotis

According to our database1, Ioannis Agrafiotis authored at least 42 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Ransomware as a Predator: Modelling the Systemic Risk to Prey.
DTRAP, 2023

2022
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations.
J. Inf. Secur. Appl., 2022

A system to calculate Cyber Value-at-Risk.
Comput. Secur., 2022

2021
A Bayesian approach to insider threat detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Guest Editorial: Special Issue on Advances in Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Assessing a Decision Support Tool for SOC Analysts.
DTRAP, 2021

Control Effectiveness: a Capture-the-Flag Study.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
A Semi-Supervised Approach to Message Stance Classification.
IEEE Trans. Knowl. Data Eng., 2020

The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

2019
Reviewing National Cybersecurity Awareness for Users and Executives in Africa.
CoRR, 2019

Anomaly Detection Using Pattern-of-Life Visual Metaphors.
IEEE Access, 2019

Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs).
Proceedings of the Information Security Applications - 20th International Conference, 2019

Black-Box Attacks via the Speech Interface Using Linguistically Crafted Input.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Attack and Defence Modelling for Attacks via the Speech Interface.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Analysing cyber-insurance claims to design harm-propagation trees.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

2018
Modeling Advanced Persistent Threats to enhance anomaly detection techniques.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Using semantic clustering to support situation awareness on Twitter: the case of world views.
Hum. centric Comput. Inf. Sci., 2018

A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate.
J. Cybersecur., 2018

Nonsense Attacks on Google Assistant.
CoRR, 2018

A State Machine System for Insider Threat Detection.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018

The challenge of detecting sophisticated attacks: Insights from SOC Analysts.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Formalising Policies for Insider-threat Detection: A Tripwire Grammar.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Mapping the coverage of security controls in cyber insurance proposal forms.
J. Internet Serv. Appl., 2017

An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

RicherPicture: Semi-automated cyber defence using context-aware data analytics.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
Validating an Insider Threat Detection System: A Real Scenario Perspective.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Determining the Veracity of Rumours on Twitter.
Proceedings of the Social Informatics - 8th International Conference, 2016

A Pragmatic System-failure Assessment and Response Model.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

A Tripwire Grammar for Insider Threat Detection.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

2014
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.
J. Internet Serv. Inf. Secur., 2014

A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Building Confidence in Information-Trustworthiness Metrics for Decision Support.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Communicating trustworthiness using radar graphs: A detailed look.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2011
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation.
Proceedings of the Privacy and Identity Management for Life, 2011

Developing a Strategy for Automated Privacy Testing Suites.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements.
Proceedings of the Privacy and Identity Management for Life, 2010

2009
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data.
Proceedings of the Privacy and Identity Management for Life, 2009


  Loading...