Maria Papadaki
Orcid: 0000-0003-0817-2651
According to our database1,
Maria Papadaki
authored at least 66 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
1
5
1
1
1
2
3
1
1
2
3
1
1
1
2
1
3
2
3
3
1
3
2
2
1
2
2
2
5
1
3
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
The Influence of Human Factors on Adaptive Social Media Cybersecurity Training and Education.
Proceedings of the Human Aspects of Information Security and Assurance, 2024
2023
Towards cross-border CBDC interoperability: insights from a multivocal literature review.
J. Enterp. Inf. Manag., 2023
Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats.
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Integrating LLMs in Higher Education, Through Interactive Problem Solving and Tutoring: Algorithmic Approach and Use Cases.
Proceedings of the Information Systems, 2023
2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Information Systems, 2022
Bibliometric Analysis of Publications on the Evacuation of Hazards Using GIS as a Decision Support Tool from the Scopus Database.
Proceedings of the Information Systems, 2022
2021
J. Enterp. Inf. Manag., 2021
Inf. Technol. Dev., 2021
Inf. Comput. Secur., 2021
Inf. Comput. Secur., 2021
Comput. Secur., 2021
Proceedings of the Web3D '21: The 26th International Conference on 3D Web Technology, Pisa, Italy, November 8, 2021
Proceedings of the Modern Management based on Big Data II and Machine Learning and Intelligent Systems III, 2021
Proceedings of the International Conference on Artificial Intelligence and Computer Vision, 2021
2020
Inf. Comput. Secur., 2020
Proceedings of the Information Systems, 2020
2019
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019
Proceedings of the Information Systems, 2019
Proceedings of the 5th Collaborative European Research Conference (CERC 2019), 2019
2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018
2017
The impact of security and its antecedents in behaviour intention of using e-government services.
Behav. Inf. Technol., 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
A comperhansive framework for cultivating and assessing Information Security Culture .
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
2016
Inf. Secur. J. A Glob. Perspect., 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
2015
Inf. Secur. J. A Glob. Perspect., 2015
2014
A response selection model for intrusion response systems: Response Strategy Model (RSM).
Secur. Commun. Networks, 2014
Int. J. Inf. Sec., 2014
Vulnerability of opportunistic parking assistance systems to vehicular node selfishness.
Comput. Commun., 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
2013
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM).
Secur. Commun. Networks, 2013
Opportunistically-assisted parking search: A story of free riders, selfish liars and bona fide mules.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013
IT Application Outsourcing in Europe: Long-Term Outcomes, Success Factors and Implications for ITO Maturity.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Secur. Commun. Networks, 2012
Proceedings of the Information Security and Privacy Research, 2012
Education in the 'Virtual' Community: Can beating Malware Man teach users about Social Networking Security?.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012
2011
Int. J. Digit. Crime Forensics, 2011
Int. J. Cyber Warf. Terror., 2011
2010
Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments.
J. Multim. Process. Technol., 2010
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm.
Comput. Secur., 2010
Proceedings of the Trust, 2010
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010
An investigation and survey of response options for Intrusion Response Systems (IRSs).
Proceedings of the Information Security South Africa Conference 2010, 2010
ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success.
Proceedings of the Eighth International Network Conference (INC 2010), 2010
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010
2009
Inf. Manag. Comput. Secur., 2009
Proceedings of the Information Assurance and Security Education and Training, 2009
2008
Proceedings of the Trust, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
2007
J. Comput. Virol., 2007
2006
Inf. Manag. Comput. Secur., 2006
2005
Inf. Secur. Tech. Rep., 2005
2004
2003
Proceedings of the Communications and Multimedia Security, 2003
2002
Inf. Manag. Comput. Secur., 2002
Keystroke Analysis as a Method of Advanced User Authentication and Response.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001