Panagiotis Andriotis
Orcid: 0000-0002-3490-3123
According to our database1,
Panagiotis Andriotis
authored at least 32 papers
between 2012 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Int. J. Inf. Sec., April, 2023
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification.
J. Inf. Secur. Appl., 2023
2022
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey.
J. Cybersecur. Priv., March, 2022
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
2021
Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM).
Proceedings of the Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media, 2021
Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks.
Proceedings of the International Conference on Cyber Situational Awareness, 2021
2020
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020
2019
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).
ACM Trans. Priv. Secur., 2019
IEEE Internet Things J., 2019
2018
J. Inf. Secur. Appl., 2018
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
IEEE Trans. Cybern., 2016
Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations.
IEEE Trans. Cybern., 2016
Inf. Comput. Secur., 2016
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the Advances in Digital Forensics XII, 2016
Proceedings of the Advances in Digital Forensics XII, 2016
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data.
Int. J. Digit. Crime Forensics, 2013
A pilot study on the security of pattern screen-lock methods and soft side channel attacks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012