Follow
Theodoros Spyridopoulos
Title
Cited by
Cited by
Year
A game theoretic defence framework against DoS/DDoS cyber attacks
T Spyridopoulos, G Karanikas, T Tryfonas, G Oikonomou
Computers & Security 38, 39-50, 2013
1012013
Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems
T Spyridopoulos, T Tryfonas, J May
System Safety Conference incorporating the Cyber Security Conference 2013 …, 2013
432013
Requirements for a forensically ready cloud storage service
T Spyridopoulos, V Katos
International Journal of Digital Crime and Forensics (IJDCF) 3 (3), 19-36, 2011
192011
Managing cyber security risks in industrial control systems with game theory and viable system modelling
T Spyridopoulos, K Maraslis, T Tryfonas, G Oikonomou, S Li
2014 9th International Conference on System of Systems Engineering (SOSE …, 2014
142014
A comparative study of android users’ privacy preferences under the runtime permission model
P Andriotis, S Li, T Spyridopoulos, G Stringhini
International Conference on Human Aspects of Information Security, Privacy …, 2017
132017
Real-time monitoring of privacy abuses and intrusion detection in android system
S Li, J Chen, T Spyridopoulos, P Andriotis, R Ludwiniak, G Russell
International Conference on Human Aspects of Information Security, Privacy …, 2015
112015
Game theoretic approach for cost-benefit analysis of malware proliferation prevention
T Spyridopoulos, G Oikonomou, T Tryfonas, M Ge
IFIP International Information Security Conference, 28-41, 2013
112013
Efficient and interpretable real-time malware detection using random-forest
A Mills, T Spyridopoulos, P Legg
2019 International conference on cyber situational awareness, data analytics …, 2019
102019
System dynamics approach to malicious insider cyber-threat modelling and analysis
T Fagade, T Spyridopoulos, N Albishry, T Tryfonas
International Conference on Human Aspects of Information Security, Privacy …, 2017
102017
A game theoretical method for cost-benefit analysis of malware dissemination prevention
T Spyridopoulos, K Maraslis, A Mylonas, T Tryfonas, G Oikonomou
Information Security Journal: A Global Perspective 24 (4-6), 164-176, 2015
102015
Data Recovery Strategies for Cloud Environments
T Spyridopoulos, V Katos
Cybercrime and Cloud Forensics: Applications for Investigation Processes …, 2013
92013
A System Dynamics Model of Cyber Conflict
D Polatin-Reuben, R Craig, T Spyridopoulos, T Tryfonas
Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference on …, 2013
82013
Applying the ACPO guidelines to building automation systems
I Sutherland, T Spyridopoulos, H Read, A Jones, G Sutherland, ...
International conference on human aspects of information security, privacy …, 2015
72015
Application of a game theoretic approach in smart sensor data trustworthiness problems
K Maraslis, T Spyridopoulos, G Oikonomou, T Tryfonas, M Haghighi
IFIP International Information Security and Privacy Conference, 601-615, 2015
62015
A holistic approach for cyber assurance of critical infrastructure with the viable system model
T Spyridopoulos, IA Topa, T Tryfonas, M Karyda
IFIP International Information Security Conference, 438-445, 2014
62014
Soft systems methodology in net-centric cyber defence system development
R Craig, T Spyridopoulos, T Tryfonas, J May
2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2014
32014
Towards a forensically ready cloud storage service
T Spyridopoulos, V Katos
6th International Workshop on Digital Forensics and Incident Analysis (WDFIA …, 2011
32011
Container Escape Detection for Edge Devices
J Pope, F Raimondo, V Kumar, R McConville, R Piechocki, G Oikonomou, ...
Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems …, 2021
2021
A Systems Approach to Understanding Geopolitical Tensions in the Middle East in the Face of a Global Water Shortage
RA Al-Masri, T Spyridopoulos, S Karatzas, V Lazari, T Tryfonas
International Journal of System Dynamics Applications (IJSDA) 10 (4), 1-23, 2021
2021
A holistic cyber-protection approach for industrial control systems based on systems theory: cyber security in ICSs
T Spyridopoulos
University of Bristol, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20