Michalis Pavlidis

Orcid: 0000-0001-9135-2340

According to our database1, Michalis Pavlidis authored at least 38 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A deep learning approach for host-based cryptojacking malware detection.
Evol. Syst., February, 2024

2023
MVDroid: an android malicious VPN detector using neural networks.
Neural Comput. Appl., October, 2023

Long-Range attack detection on permissionless blockchains using Deep Learning.
Expert Syst. Appl., May, 2023

BotDroid: Permission-Based Android Botnet Detection Using Neural Networks.
Proceedings of the Engineering Applications of Neural Networks, 2023

2022
A Regulatory Readiness Assessment Framework for Blockchain Adoption in Healthcare.
Digit., January, 2022

HamDroid: permission-based harmful android anti-malware detection using neural networks.
Neural Comput. Appl., 2022

TrojanDroid: Android Malware Detection for Trojan Discovery Using Convolutional Neural Networks.
Proceedings of the Engineering Applications of Neural Networks, 2022

2021
A Data Scope Management Service to Support Privacy by Design and GDPR Compliance.
J. Data Intell., 2021

2020
Visual Privacy Management.
Proceedings of the Visual Privacy Management, 2020

A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study.
Proceedings of the Visual Privacy Management, 2020

Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach.
Softw. Syst. Model., 2020

Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020

From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks.
Evol. Syst., 2020

A Novel Dataset for Fake Android Anti-Malware Detection.
Proceedings of the WIMS 2020: The 10th International Conference on Web Intelligence, Mining and Semantics, Biarritz, France, June 30, 2020

DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

2019

Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
Cyber-attack path discovery in a dynamic supply chain maritime risk management system.
Comput. Stand. Interfaces, 2018

Towards the Definition of a Security Incident Response Modelling Language.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

2017
Selecting Security Mechanisms in Secure Tropos.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Visual Privacy Management in User Centric Open Environments.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

A Metamodel for GDPR-based Privacy Level Agreements.
Proceedings of the ER Forum 2017 and the ER 2017 Demo Track co-located with the 36th International Conference on Conceptual Modelling (ER 2017), Valencia, Spain,, 2017

Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction.
Proceedings of the Engineering Applications of Neural Networks, 2017

Privacy Level Agreements for Public Administration Information Systems.
Proceedings of the Forum and Doctoral Consortium Papers Presented at the 29th International Conference on Advanced Information Systems Engineering, 2017

Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

A Holistic Approach for Privacy Protection in E-Government.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

2015
Addressing Privacy and Trust Issues in Cultural Heritage Modelling.
Proceedings of the Risks and Security of Internet and Systems, 2015

2014
Modeling Trust Relationships for Developing Trustworthy Information Systems.
Int. J. Inf. Syst. Model. Des., 2014

2013
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

2012
Modelling Security Using Trust Based Concepts.
Int. J. Secur. Softw. Eng., 2012

Dealing with trust and control: A meta-model for trustworthy information systems development.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012

A Meta-model for Legal Compliance and Trustworthiness of Information Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

2011
A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos.
Proceedings of the IS Olympics: Information Systems in a Diverse World, 2011

SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011

Designing for Trust.
Proceedings of the CAiSE Doctoral Consortium 2011, London, United Kingdom, June 21, 2011, 2011


  Loading...