Theodoros Spyridopoulos
Title
Cited by
Cited by
Year
A game theoretic defence framework against DoS/DDoS cyber attacks
T Spyridopoulos, G Karanikas, T Tryfonas, G Oikonomou
Computers & Security 38, 39-50, 2013
762013
Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems
T Spyridopoulos, T Tryfonas, J May
System Safety Conference incorporating the Cyber Security Conference 2013 …, 2013
262013
Requirements for a forensically ready cloud storage service
T Spyridopoulos, V Katos
International Journal of Digital Crime and Forensics (IJDCF) 3 (3), 19-36, 2011
172011
Managing cyber security risks in industrial control systems with game theory and viable system modelling
T Spyridopoulos, K Maraslis, T Tryfonas, G Oikonomou, S Li
2014 9th International Conference on System of Systems Engineering (SOSE …, 2014
122014
Real-time monitoring of privacy abuses and intrusion detection in android system
S Li, J Chen, T Spyridopoulos, P Andriotis, R Ludwiniak, G Russell
International Conference on Human Aspects of Information Security, Privacy …, 2015
92015
Game theoretic approach for cost-benefit analysis of malware proliferation prevention
T Spyridopoulos, G Oikonomou, T Tryfonas, M Ge
IFIP International Information Security Conference, 28-41, 2013
82013
Data Recovery Strategies for Cloud Environments
T Spyridopoulos, V Katos
Cybercrime and Cloud Forensics: Applications for Investigation Processes …, 2013
82013
A comparative study of android users’ privacy preferences under the runtime permission model
P Andriotis, S Li, T Spyridopoulos, G Stringhini
International Conference on Human Aspects of Information Security, Privacy …, 2017
72017
System dynamics approach to malicious insider cyber-threat modelling and analysis
T Fagade, T Spyridopoulos, N Albishry, T Tryfonas
International Conference on Human Aspects of Information Security, Privacy …, 2017
62017
A game theoretical method for cost-benefit analysis of malware dissemination prevention
T Spyridopoulos, K Maraslis, A Mylonas, T Tryfonas, G Oikonomou
Information Security Journal: A Global Perspective 24 (4-6), 164-176, 2015
52015
Applying the ACPO guidelines to building automation systems
I Sutherland, T Spyridopoulos, H Read, A Jones, G Sutherland, ...
International conference on human aspects of information security, privacy …, 2015
52015
A holistic approach for cyber assurance of critical infrastructure with the viable system model
T Spyridopoulos, IA Topa, T Tryfonas, M Karyda
IFIP International Information Security Conference, 438-445, 2014
42014
A System Dynamics Model of Cyber Conflict
D Polatin-Reuben, R Craig, T Spyridopoulos, T Tryfonas
Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference on …, 2013
42013
Application of a game theoretic approach in smart sensor data trustworthiness problems
K Maraslis, T Spyridopoulos, G Oikonomou, T Tryfonas, M Haghighi
IFIP International Information Security and Privacy Conference, 601-615, 2015
32015
Soft systems methodology in net-centric cyber defence system development
R Craig, T Spyridopoulos, T Tryfonas, J May
2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2014
22014
Towards a forensically ready cloud storage service
T Spyridopoulos, V Katos
6th International Workshop on Digital Forensics and Incident Analysis (WDFIA …, 2011
22011
Efficient and interpretable real-time malware detection using random-forest
A Mills, T Spyridopoulos, P Legg
2019 International Conference on Cyber Situational Awareness, Data Analytics …, 2019
2019
A holistic cyber-protection approach for industrial control systems based on systems theory: cyber security in ICSs
T Spyridopoulos
University of Bristol, 2016
2016
On two different methods for steganography detection in JPEG images with Benford's law
I Askoxylakis
2014
Managing Cyber Security in Industrial Control Systems using the Viable System Model
T Spyridopoulos
The system can't perform the operation now. Try again later.
Articles 1–20