Marianthi Theoharidou

According to our database1, Marianthi Theoharidou authored at least 32 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Who cares what it means? Practical reasons for using the word resilience with critical infrastructure operators.
Reliab. Eng. Syst. Saf., 2020

2017
A process-based dependency risk analysis methodology for critical infrastructures.
Int. J. Crit. Infrastructures, 2017

2016
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures.
Int. J. Crit. Infrastructure Prot., 2016

Human Vulnerability Mapping Facing Critical Service Disruptions for Crisis Managers.
Proceedings of the Critical Information Infrastructures Security, 2016

2015
Advanced services for critical infrastructures protection.
J. Ambient Intell. Humaniz. Comput., 2015

Risk mitigation strategies for critical infrastructures based on graph centrality analysis.
Int. J. Crit. Infrastructure Prot., 2015

Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation.
Proceedings of the Critical Infrastructure Protection IX, 2015

Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Knowledge-Driven Scenario Development for Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2015

2013
Assessing n-order dependencies between critical infrastructures.
Int. J. Crit. Infrastructures, 2013

Assessing Privacy Risks in Android: A User-Centric Approach.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

S-Port: Collaborative security management of Port Information systems.
Proceedings of the 4th International Conference on Information, 2013

In Cloud We Trust: Risk-Assessment-as-a-Service.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Cascading Effects of Common-Cause Failures in Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection VII, 2013

Return on Security Investment for Cloud Platforms.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Privacy Risk, Security, Accountability in the Cloud.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
A Risk Assessment Method for Smartphones.
Proceedings of the Information Security and Privacy Research, 2012

2011
Exploitation of auctions for outsourcing security-critical projects.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Securing Transportation-Critical Infrastructures: Trends and Perspectives.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects.
Proceedings of the Critical Information Infrastructure Security, 2011

2010
Insider Threat and Information Security Management.
Proceedings of the Insider Threats in Cyber Security, 2010

A multi-layer Criticality Assessment methodology based on interdependencies.
Comput. Secur., 2010

An Insider Threat Prediction Model.
Proceedings of the Trust, 2010

2009
Risk-Based Criticality Analysis.
Proceedings of the Critical Infrastructure Protection III, 2009

2008
A CBK for Information Security and Critical Information and Communication Infrastructure Protection.
Int. J. Crit. Infrastructure Prot., 2008

SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2007
Common Body of Knowledge for Information Security.
IEEE Secur. Priv., 2007

Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.
Proceedings of the Trust, 2007

Threat Analysis of the Session Initiation Protocol Regarding Spam.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

A CBK for Information Security and Critical Infrastructure Protection.
Proceedings of the Fifth World Conference on Information Security Education, 2007

SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

2005
The insider threat to information systems and the effectiveness of ISO17799.
Comput. Secur., 2005


  Loading...