Theodore Tryfonas
Orcid: 0000-0003-4024-8003Affiliations:
- University of Bristol, UK
According to our database1,
Theodore Tryfonas
authored at least 121 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
IEEE Trans. Syst. Man Cybern. Syst., February, 2024
FlexBoT: A Scalable Architecture for Multi-Application Supporting BoT Environments with Application Shifting at Runtime.
Proceedings of the IFIP Networking Conference, 2024
Proceedings of the IEEE International Conference on Industrial Technology, 2024
2023
ACM Trans. Internet Techn., August, 2023
Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities: A Systematic Review.
CoRR, 2023
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023
E-scooter Sharing Platforms: Understanding Their Architecture and Cybersecurity Threats.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023
A Conceptual Architecture for Scalable Multi-Application Support in Blockchain-based IoT Environments.
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023
2022
Causal Loop Mapping of Emerging Energy Systems in Project TwinERGY: Towards Consumer Engagement with Group Model Building.
Proceedings of the PETRA '22: The 15th International Conference on PErvasive Technologies Related to Assistive Environments, Corfu, Greece, 29 June 2022, 2022
2021
A Systems Approach to Understanding Geopolitical Tensions in the Middle East in the Face of a Global Water Shortage.
Int. J. Syst. Dyn. Appl., October, 2021
IEEE Trans. Syst. Man Cybern. Syst., 2021
ERCIM News, 2021
IEEE Access, 2021
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021
Proceedings of the IEEE International Systems Conference, 2021
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021
2020
J. Syst. Softw., 2020
2019
Securing mHealth Applications Using IoTsecM Security Modelling: Dentify.Me mApp Case Study for Urgent Care Management.
Computación y Sistemas, 2019
Ad Hoc Networks, 2019
Ad Hoc Networks, 2019
Proceedings of the Wired/Wireless Internet Communications, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019
Proceedings of the International Symposium on Systems Engineering, 2019
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019
2018
An Evaluation of Performance and Competition in Customer Services on Twitter: A UK Telecoms Case Study.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018
Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, 2018
A review of air quality sensing technologies and their potential interfaces with IoT for asthma management.
Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, 2018
Proceedings of the Computational Collective Intelligence - 10th International Conference, 2018
Proceedings of the 1st International Conference on Digital Tools & Uses Congress, 2018
2017
IEEE Signal Process. Lett., 2017
Towards effective cybersecurity resource allocation: the Monte Carlo predictive modelling approach.
Int. J. Crit. Infrastructures, 2017
Towards Secure SPARQL Queries in Semantic Web Applications using PHP (Extended Version).
CoRR, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 11th IEEE International Conference on Semantic Computing, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
"Come Together!": Interactions of Language Networks and Multilingual Communities on Twitter.
Proceedings of the Computational Collective Intelligence - 9th International Conference, 2017
Physical layer secret-key generation with discreet cosine transform for the Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
An Intelligent Hot-Desking Model Based on Occupancy Sensor Data and Its Potential for Social Impact.
Trans. Large Scale Data Knowl. Centered Syst., 2016
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
IEEE Trans. Cybern., 2016
Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations.
IEEE Trans. Cybern., 2016
Inf. Comput. Secur., 2016
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016
Traffic forensics for IPv6-based Wireless Sensor Networks and the Internet of Things.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Proceedings of the Interoperability, Safety and Security in IoT, 2016
Proceedings of the Interoperability, Safety and Security in IoT, 2016
Proceedings of the Advances in Digital Forensics XII, 2016
Proceedings of the Advances in Digital Forensics XII, 2016
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Smart Attacks on the Integrity of the Internet of Things: Avoiding Detection by Employing Game Theory.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.
Inf. Secur. J. A Glob. Perspect., 2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
Proceedings of the 10th System of Systems Engineering Conference, SoSE 2015, 2015
Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the Design, User Experience, and Usability: Interactive Experience Design, 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
2014
A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things.
IEEE Trans. Ind. Informatics, 2014
Introduction to the Special Theme - Future Cities and Smart Technologies: A Landscape of Ambition and Caution.
ERCIM News, 2014
Digit. Investig., 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Managing cyber security risks in industrial control systems with game theory and viable system modelling.
Proceedings of the 9th International Conference on System of Systems Engineering, 2014
Proceedings of the IEEE International Systems Conference, 2014
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the ICT for Sustainability 2014 (ICT4S-14), 2014
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
Wirel. Pers. Commun., 2013
Living Labs, Innovation Districts and Information Marketplaces: A Systems Approach for Smart Cities.
Proceedings of the Conference on Systems Engineering Research, 2013
Proceedings of the Conference on Systems Engineering Research, 2013
Comput. Secur., 2013
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013
A pilot study on the security of pattern screen-lock methods and soft side channel attacks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the IEEE International Conference on Systems, 2013
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
2012
Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype.
EURASIP J. Wirel. Commun. Netw., 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the 7th International Conference on System of Systems Engineering, 2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis.
Int. J. Digit. Crime Forensics, 2011
A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking.
EURASIP J. Wirel. Commun. Netw., 2011
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
2010
Proceedings of the 5th International Conference on System of Systems Engineering, 2010
Proceedings of the Mobile Lightweight Wireless Systems, 2010
2009
A lightweight web-based vulnerability scanner for small-scale computer network security assessment.
J. Netw. Comput. Appl., 2009
Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users.
Inf. Manag. Comput. Secur., 2009
Proceedings of the Mobile Lightweight Wireless Systems, 2009
2008
Inf. Secur. J. A Glob. Perspect., 2008
Standardising business application security assessments with pattern-driven audit automations.
Comput. Stand. Interfaces, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
Cultivating an Atmosphere of Proactive Computer Security to Mitigate Limited End-User Awareness.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
Proceedings of the Databases and Information Systems V, 2008
2007
Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples.
Internet Res., 2007
Int. J. Electron. Secur. Digit. Forensics, 2007
Proceedings of the New Approaches for Security, 2007
2006
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage.
Digit. Investig., 2006
2005
Distribution of Offensive Material Over Computer Networks: A Research Agenda.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
2004
Inf. Manag. Comput. Secur., 2004
2003
Η συμβολή οργανωσιακών εικόνων ασφαλείας πληροφοριακού συστήματος στην υλοποίηση ασφαλών πληροφοριακών συστημάτων
PhD thesis, 2003
Perceptions of Security Contributing to the Implementation of Secure IS.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2002
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
Embedding security practices in contemporary information systems development approaches.
Inf. Manag. Comput. Secur., 2001
Proceedings of the Trusted Information: The New Decade Challenge, 2001
2000
A Qualitative Approach to Information Availability.
Proceedings of the Information Security for Global Information Infrastructures, 2000