Eliana Stavrou

Orcid: 0000-0003-4040-4942

According to our database1, Eliana Stavrou authored at least 34 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Maritime Cybersecurity through Operational Technology Sensor Data Fusion: A Comprehensive Survey and Analysis.
Sensors, June, 2024

The Potential of Generative AI Chatbots as Career Advisors in Cybersecurity: Professionals' Perspectives.
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024

Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Revolutionizing Social Engineering Awareness Raising, Education and Training: Generative AI-Powered Investigations in the Maritime Domain.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024

Empowering Professionals: A Generative AI Approach to Personalized Cybersecurity Learning.
Proceedings of the IEEE Global Engineering Education Conference, 2024

Assessing the Consistency of Cyber Security Education.
Proceedings of the IEEE Global Engineering Education Conference, 2024

2023
Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS).
Inf. Secur. J. A Glob. Perspect., March, 2023

Privacy Concerns in Smart Indoor Environments in the Internet of Everything Era: A Smart University Campus Case Study.
Proceedings of the Internet of Everything - Second EAI International Conference, 2023

Free Guy or Bad Guy: Safety, Privacy, and Security Risks for Minors in the Metaverse and Prominent Educational Considerations.
Proceedings of the HCI International 2023 - Late Breaking Papers, 2023

Planning for Professional Development in Cybersecurity: A New Curriculum Design.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
Cyber-threat landscape of border control infrastructures.
Int. J. Crit. Infrastructure Prot., 2022

Guidelines to Develop Consumers Cyber Resilience Capabilities in the IoE Ecosystem.
Proceedings of the Internet of Everything - The First EAI International Conference, 2022

Maritime Cyber Threats Detection Framework: Building Capabilities.
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022

Building Maritime Cybersecurity Capacity Against Ransomware Attacks.
Proceedings of the International Conference on Cybersecurity, 2022

2021
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

2019
Towards Designing Advanced Password Cracking Toolkits: Optimizing the Password Cracking Process.
Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, 2019

Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

2018
Global perspectives on cybersecurity education.
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Global perspectives on cybersecurity education for 2030: a case for a meta-discipline.
Proceedings of the Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

A password generator tool to increase users' awareness on bad password construction strategies.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2017
Transparent password policies: A case study of investigating end-user situational awareness.
Int. J. Cyber Situational Aware., 2017

A Classification Platform for Security Protocols in WSNs.
Proceedings of the Information Systems Development: Advances in Methods, Tools and Management, 2017

Intrusion recovery in NLOS WSNs with a varying network density.
Proceedings of the 24th International Conference on Telecommunications, 2017

A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architecture.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
WSN operability during persistent attack execution.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Situation aware intrusion recovery policy in WSNs.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

2014
Recovering from the selective forwarding attack in WSNs - enhancing the recovery benefits of blacklisting and rerouting using directional antennas.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

2012
Security evaluation methodology for intrusion recovery protocols in wireless sensor networks.
Proceedings of the 15th ACM International Conference on Modeling, 2012

2011
Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Combating persistent adversaries in wireless sensor networks using directional antennas.
Proceedings of the 18th International Conference on Telecommunications, 2011

2010
A survey on secure multipath routing protocols in WSNs.
Comput. Networks, 2010

Security in Future Mobile Sensor Networks - Issues and Challenges.
Proceedings of the SECRYPT 2010, 2010

2006
Securing Mobile Healthcare Systems Based on Information Classification: DITIS Case Study.
Proceedings of the Security in Information Systems, 2006


  Loading...