Follow
Ioannis Agrafiotis
Ioannis Agrafiotis
Computer Science Department, University of Oxford
Verified email at cs.ox.ac.uk - Homepage
Title
Cited by
Cited by
Year
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
I Agrafiotis, JRC Nurse, M Goldsmith, S Creese, D Upton
Journal of Cybersecurity 4 (1), tyy006, 2018
3132018
A new take on detecting insider threats: exploring the use of hidden markov models
T Rashid, I Agrafiotis, JRC Nurse
Proceedings of the 8th ACM CCS International workshop on managing insider …, 2016
1782016
Towards a conceptual model and reasoning structure for insider threat detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
1142013
Mapping the coverage of security controls in cyber insurance proposal forms
D Woods, I Agrafiotis, JRC Nurse, S Creese
Journal of Internet Services and Applications 8, 1-13, 2017
872017
Determining the veracity of rumours on Twitter
G Giasemidis, C Singleton, I Agrafiotis, JRC Nurse, A Pilgrim, C Willis, ...
Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA …, 2016
752016
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
732015
Smart insiders: exploring the threat from insiders using the internet-of-things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015
602015
The data that drives cyber insurance: A study into the underwriting and claims processes
JRC Nurse, L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese
2020 International conference on cyber situational awareness, data analytics …, 2020
442020
Cyber harm: concepts, taxonomy and measurement
I Agrafiotis, M Bada, P Cornish, S Creese, M Goldsmith, ...
Saïd Business School WP 23, 2016
442016
Two sides of the coin: measuring and communicating the trustworthiness of online information
JRC Nurse, I Agrafiotis, M Goldsmith, S Creese, K Lamberts
Journal of Trust Management 1, 1-20, 2014
442014
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)
JRCN Lukas Halgas, Ioannis Agrafiotis
20th World Conference on Information Security Applications (WISA 2019), 2020
42*2020
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
392014
Reviewing national cybersecurity awareness in Africa: An empirical study
M Bada, B Von Solms, I Agrafiotis
362019
A semi-supervised approach to message stance classification
G Giasemidis, N Kaplis, I Agrafiotis, JRC Nurse
IEEE Transactions on Knowledge and Data Engineering 32 (1), 1-11, 2018
352018
The challenge of detecting sophisticated attacks: Insights from SOC Analysts
O Akinrolabu, I Agrafiotis, A Erola
Proceedings of the 13th international conference on availability …, 2018
302018
Insider threat response and recovery strategies in financial services firms
J Eggenschwiler, I Agrafiotis, JRC Nurse
Computer Fraud & Security 2016 (11), 12-19, 2016
302016
A system to calculate Cyber Value-at-Risk
A Erola, I Agrafiotis, JRC Nurse, L Axon, M Goldsmith, S Creese
Computers & Security 113, 102545, 2022
232022
Nonsense attacks on google assistant and missense attacks on amazon alexa
M Bispham, I Agrafiotis, M Goldsmith
5th International Conference on Information Systems Security and Privacy 1, 2019
222019
Validating an insider threat detection system: A real scenario perspective
I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese
2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016
222016
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.
I Agrafiotis, PA Legg, M Goldsmith, S Creese
J. Internet Serv. Inf. Secur. 4 (4), 127-137, 2014
192014
The system can't perform the operation now. Try again later.
Articles 1–20