Ioannis Agrafiotis : Publications
-
[1]
Modeling Advanced Persistent Threats to enhance anomaly detection techniques
Cheyenne Atapour‚ Ioannis Agrafiotis and Sadie Creese
In Journal of Wireless Mobile Networks‚ Ubiquitous Computing‚ and Dependable Applications (JoWUA). Vol. 9. No. 4. Pages 71–102. December, 2018.
Details about Modeling Advanced Persistent Threats to enhance anomaly detection techniques | BibTeX data for Modeling Advanced Persistent Threats to enhance anomaly detection techniques
-
[2]
A taxonomy of attacks via the speech interface
Mary K Bispham‚ Ioannis Agrafiotis and Michael Goldsmith
2018.
Details about A taxonomy of attacks via the speech interface | BibTeX data for A taxonomy of attacks via the speech interface
-
[3]
A semi−supervised approach to message stance classification
Georgios Giasemidis‚ Nikolaos Kaplis‚ Ioannis Agrafiotis and Jason Nurse
In IEEE Transactions on Knowledge and Data Engineering. 2018.
Details about A semi−supervised approach to message stance classification | BibTeX data for A semi−supervised approach to message stance classification
-
[4]
Reviewing national cybersecurity awareness in Africa: An empirical study
Maria Bada‚ Basie Von Solms and Ioannis Agrafiotis
2018.
Details about Reviewing national cybersecurity awareness in Africa: An empirical study | BibTeX data for Reviewing national cybersecurity awareness in Africa: An empirical study
-
[5]
Analysing trends and success factors of international cybersecurity capacity−building initiatives
F Hameed‚ I Agrafiotis‚ C Weisser‚ M Goldsmith and S Creese
In SECURWARE 2018‚ The Twelfth International Conference on Emerging Security Information‚ Systems and Technologies. 2018.
Details about Analysing trends and success factors of international cybersecurity capacity−building initiatives | BibTeX data for Analysing trends and success factors of international cybersecurity capacity−building initiatives
-
[6]
A state machine system for insider threat detection
H Zhang‚ I Agrafiotis‚ A Erola‚ S Creese and M Goldsmith
In The fifth International Workshop on Graphical Models for Security (GramSec)‚ in conjunction with FLoC 2018. 2018.
Details about A state machine system for insider threat detection | BibTeX data for A state machine system for insider threat detection
-
[7]
A taxonomy of cyber−harms: Defining the impacts of cyber−attacks and understanding how they propagate
Ioannis Agrafiotis‚ Jason R C Nurse‚ Michael Goldsmith‚ Sadie Creese and David Upton
In Journal of Cybersecurity. Pages tyy006. 2018.
Details about A taxonomy of cyber−harms: Defining the impacts of cyber−attacks and understanding how they propagate | BibTeX data for A taxonomy of cyber−harms: Defining the impacts of cyber−attacks and understanding how they propagate | DOI (10.1093/cybsec/tyy006) | Link to A taxonomy of cyber−harms: Defining the impacts of cyber−attacks and understanding how they propagate
-
[8]
Using semantic clustering to support situation awareness on Twitter: the case of world views
Charlie Kingston‚ Jason RC Nurse‚ Ioannis Agrafiotis and Andrew Burke Milich
In Human−centric Computing and Information Sciences. Vol. 8. No. 1. Pages 22. 2018.
Details about Using semantic clustering to support situation awareness on Twitter: the case of world views | BibTeX data for Using semantic clustering to support situation awareness on Twitter: the case of world views
-
[9]
The challenge of detecting sophisticated attacks: Insights from SOC Analysts
Olusola Akinrolabu‚ Ioannis Agrafiotis and Arnau Erola
In Proceedings of the 13th International Conference on Availability‚ Reliability and Security. Pages 55. ACM. 2018.
Details about The challenge of detecting sophisticated attacks: Insights from SOC Analysts | BibTeX data for The challenge of detecting sophisticated attacks: Insights from SOC Analysts
-
[10]
Mapping the coverage of security controls in cyber insurance proposal forms
Daniel Woods‚ Ioannis Agrafiotis‚ Jason R. C. Nurse and Sadie Creese
In Journal of Internet Services and Applications. Vol. 8. No. 1. Pages 8. July, 2017.
Details about Mapping the coverage of security controls in cyber insurance proposal forms | BibTeX data for Mapping the coverage of security controls in cyber insurance proposal forms | DOI (10.1186/s13174-017-0059-y) | Link to Mapping the coverage of security controls in cyber insurance proposal forms
-
[11]
Formalising policies for insider−threat detection: A tripwire grammar
Ioannis Agrafiotis‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Journal of Wireless Mobile Networks‚ Ubiquitous Computing‚ and Dependable Applications (JoWUA). Vol. 8. No. 1. Pages 26–43. 2017.
Details about Formalising policies for insider−threat detection: A tripwire grammar | BibTeX data for Formalising policies for insider−threat detection: A tripwire grammar
-
[12]
RicherPicture: Semi−automated cyber defence using context−aware data analytics
Arnau Erola‚ Ioannis Agrafiotis‚ Jassim Happa‚ Michael Goldsmith‚ Sadie Creese and Philip Legg
2017.
Details about RicherPicture: Semi−automated cyber defence using context−aware data analytics | BibTeX data for RicherPicture: Semi−automated cyber defence using context−aware data analytics
-
[13]
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System
Jason R.C. Nurse; Ioannis Agrafiotis; Arnau Erola; Maria Bada; Taylor Roberts; Meredydd Williams; Michael Goldsmith; Sadie Creese
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 19th International Conference on Human−Computer Interaction (HCII). Springer. 2017.
Accepted for publication
Details about An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | BibTeX data for An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | DOI (10.1007/978-3-319-58460-7_26)
-
[14]
The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance
Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith‚ Jason R.C. Nurse and David Upton
No. RR−17−01. DCS. Oxford‚ UK. 2017.
Details about The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance | BibTeX data for The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance | Download (pdf) of The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance
-
[15]
Insider threat response and recovery strategies in financial services firms
Jason R. C. Nurse Jacqueline Eggenschwiler Ioannis Agrafiotis
In Computer Fraud & Security. 2016.
Details about Insider threat response and recovery strategies in financial services firms | BibTeX data for Insider threat response and recovery strategies in financial services firms | Download (pdf) of Insider threat response and recovery strategies in financial services firms | DOI (10.1016/S1361-3723(16)30091-4)
-
[16]
Validating an insider threat detection system: A real scenario perspective
Ioannis Agrafiotis‚ Arnau Erola‚ Jassim Happa‚ Michael Goldsmith and Sadie Creese
In IEEE Symposium on Security and Privacy‚ Workshop on Research for Insider Threats (WRIT). 2016.
Details about Validating an insider threat detection system: A real scenario perspective | BibTeX data for Validating an insider threat detection system: A real scenario perspective
-
[17]
A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models
Tabish Rashid‚ Ioannis Agrafiotis and Jason RC Nurse
In Proceedings of the 2016 International Workshop on Managing Insider Security Threats. Pages 47–56. ACM. 2016.
Details about A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models | BibTeX data for A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models
-
[18]
A tripwire grammar for insider threat detection
Ioannis Agrafiotis‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats. Pages 105–108. ACM. 2016.
Details about A tripwire grammar for insider threat detection | BibTeX data for A tripwire grammar for insider threat detection
-
[19]
Determining the veracity of rumours on Twitter
Georgios Giasemidis‚ Colin Singleton‚ Ioannis Agrafiotis‚ Jason R.C. Nurse‚ Alan Pilgrim and Chris Willis
In 8th International Conference on Social Informatics (SocInfo 2016). Pages 185–205. Springer. 2016.
Details about Determining the veracity of rumours on Twitter | BibTeX data for Determining the veracity of rumours on Twitter | Download (pdf) of Determining the veracity of rumours on Twitter | DOI (10.1007/978-3-319-47880-7_12)
-
[20]
Identifying attack patterns for insider threat detection
Ioannis Agrafiotis‚ Jason R. C. Nurse‚ Oliver Buckley‚ Phil Legg‚ Sadie Creese and Michael Goldsmith
In Computer Fraud & Security. No. 7. Pages 9–17. July, 2015.
Details about Identifying attack patterns for insider threat detection | BibTeX data for Identifying attack patterns for insider threat detection | DOI (10.1016/S1361-3723(15)30066-X) | Link to Identifying attack patterns for insider threat detection
-
[21]
Information trustworthiness as a solution to the misinformation problems in social media
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese‚ Koen Lamberts‚ Darren Price and Glyn Jones
In International Conference on Cyber Security for Sustainable Society. Pages 28−35. 2015.
Details about Information trustworthiness as a solution to the misinformation problems in social media | BibTeX data for Information trustworthiness as a solution to the misinformation problems in social media | Download (pdf) of Information trustworthiness as a solution to the misinformation problems in social media
-
[22]
Towards a User and Role−based Sequential Behavioural Analysis Tool for Insider Threat Detection
Ioannis Agrafiotis‚ Philip Legg‚ Michael Goldsmith and Sadie Creese
In Journal of Internet Services and Information Security (JISIS). Vol. 4. No. 4. Pages 127–137. 2014.
Details about Towards a User and Role−based Sequential Behavioural Analysis Tool for Insider Threat Detection | BibTeX data for Towards a User and Role−based Sequential Behavioural Analysis Tool for Insider Threat Detection
-
[23]
Two sides of the coin: measuring and communicating the trustworthiness of online information
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese and Koen Lamberts
In Journal of Trust Management. Vol. 1. No. 5. 2014.
Details about Two sides of the coin: measuring and communicating the trustworthiness of online information | BibTeX data for Two sides of the coin: measuring and communicating the trustworthiness of online information | DOI (10.1186/2196-064X-1-5) | Link to Two sides of the coin: measuring and communicating the trustworthiness of online information
-
[24]
Managing the influence of social media using information trust
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese‚ Koen Lamberts‚ Darren Price and Glyn Jones
In Social Influence in the Information Age Conference. 2014.
Details about Managing the influence of social media using information trust | BibTeX data for Managing the influence of social media using information trust
-
[25]
A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches
Jason R.C. Nurse‚ Philip A. Legg‚ Oliver Buckley‚ Ioannis Agrafiotis‚ Gordon Wright‚ Monica Whitty‚ David Upton‚ Michael Goldsmith and Sadie Creese
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 16th International Conference on Human−Computer Interaction (HCI). Springer. 2014.
Details about A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | BibTeX data for A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | Download (pdf) of A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | DOI (10.1007/978-3-319-07620-1_24)
-
[26]
Supplementary document for Identifying attack patterns for insider−threat detection
Goldsmith M. Agrafiotis I. Nurse J. Buckley O. Legg P. Creese S.
2014.
Details about Supplementary document for Identifying attack patterns for insider−threat detection | BibTeX data for Supplementary document for Identifying attack patterns for insider−threat detection | Download (pdf) of Supplementary document for Identifying attack patterns for insider−threat detection
-
[27]
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
Sadie Creese Philip A. Legg Nick Moffat Jason R.C. Nurse Jassim Happa Ioannis Agrafiotis Michael Goldsmith
In Journal of Wireless Mobile Networks‚ Ubiquitous Computing‚ and Dependable Applications. Vol. 4. No. 4. Pages 20−37. 2013.
Details about Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection | BibTeX data for Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection | Download (pdf) of Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
-
[28]
CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise
Sadie Creese‚ Michael Goldsmith‚ Nick Moffat‚ Jassim Happa and Ioannis Agrafiotis
In Proceedings of the 13th annual IEEE Conference on Technologies for Homeland Security. 2013.
Details about CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise | BibTeX data for CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise
-
[29]
Communicating Trustworthiness using Radar Graphs: A Detailed Look
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 11th International Conference on Privacy‚ Security and Trust (PST). IEEE. 2013.
Details about Communicating Trustworthiness using Radar Graphs: A Detailed Look | BibTeX data for Communicating Trustworthiness using Radar Graphs: A Detailed Look | Download (pdf) of Communicating Trustworthiness using Radar Graphs: A Detailed Look | DOI (10.1109/PST.2013.6596085)
-
[30]
Building Confidence in Information−Trustworthiness Metrics for Decision Support
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 12th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−13). IEEE. 2013.
Details about Building Confidence in Information−Trustworthiness Metrics for Decision Support | BibTeX data for Building Confidence in Information−Trustworthiness Metrics for Decision Support | Download of Building Confidence in Information−Trustworthiness Metrics for Decision Support | DOI (10.1109/TrustCom.2013.6)
-
[31]
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation
Ioannis Agrafiotis‚ Sadie Creese and Michael Goldsmith
In Privacy and Identity Management for Life. Pages 232–244. Springer Boston. 2012.
Details about Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation | BibTeX data for Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation
-
[32]
Developing a Strategy for Automated Privacy Testing Suites
Ioannis Agrafiotis‚ Sadie Creese and Michael Goldsmith
In Privacy and Identity Management for Life. Pages 32–44. Springer Boston. 2012.
Details about Developing a Strategy for Automated Privacy Testing Suites | BibTeX data for Developing a Strategy for Automated Privacy Testing Suites
-
[33]
Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation
M. Goldsmith I. Agrafiotis S. Creese
In Proceedings of the IFIP Summer School 2011. September, 2011.
Details about Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation | BibTeX data for Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation
-
[34]
Developing a Strategy for Automated Privacy Testing Suites
M. Goldsmith I. Agrafiotis S. Creese
In Proceedings of the IFIP Summer School. September, 2011.
Details about Developing a Strategy for Automated Privacy Testing Suites | BibTeX data for Developing a Strategy for Automated Privacy Testing Suites
-
[35]
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements
Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Nick Papanikolaou
In Privacy and Identity Management for Life. Vol. 352. Pages 271–282. Springer IFIP AICT. 2011.
Details about Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements | BibTeX data for Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements
-
[36]
Applying formal methods to describe the privacy−control requirements in real case−study scenario: emerging ambiguities and proposed solutions
N. Papanikolaou I. Agrafiotis S. Creese M. Goldsmith
In Proceedings of 2010 IFIP/PrimeLife Summer School. 2010.
Details about Applying formal methods to describe the privacy−control requirements in real case−study scenario: emerging ambiguities and proposed solutions | BibTeX data for Applying formal methods to describe the privacy−control requirements in real case−study scenario: emerging ambiguities and proposed solutions
-
[37]
Defining Consent and Revocation Policies
S. Pearson I. Agrafiotis S. Creese M. Goldsmith N. Papanikolaou M Casassa Mont
In Proceedings of 2010 IFIP/PrimeLife Summer School. 2010.
Details about Defining Consent and Revocation Policies | BibTeX data for Defining Consent and Revocation Policies
-
[38]
Reaching for informed revocation: shutting off the tap on personal data
Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Nick Papanikolaou
In Privacy and Identity Management for Life. Vol. 320. Pages 246–258. Springer IFIP AICT. 2010.
Details about Reaching for informed revocation: shutting off the tap on personal data | BibTeX data for Reaching for informed revocation: shutting off the tap on personal data
-
[39]
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data
N. Papanikolaou I. Agrafiotis S. Creese M. Goldsmith
In Privacy and Identity Management for Life‚ Proceedings of 5th PrimeLife/IFIP International Summer School. Springer IFIP AICT 320. 2009.
Details about Reaching for Informed Revocation: Shutting Off the Tap on Personal Data | BibTeX data for Reaching for Informed Revocation: Shutting Off the Tap on Personal Data