Panagiotis Andriotis

Orcid: 0000-0002-3490-3123

According to our database1, Panagiotis Andriotis authored at least 32 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Bu-Dash: a universal and dynamic graphical password scheme (extended version).
Int. J. Inf. Sec., April, 2023

Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification.
J. Inf. Secur. Appl., 2023

2022
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey.
J. Cybersecur. Priv., March, 2022

Bu-Dash: A Universal and Dynamic Graphical Password Scheme.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

2021
Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM).
Proceedings of the Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media, 2021

Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2020
To Allow, or Deny? That is the Question.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

2019
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).
ACM Trans. Priv. Secur., 2019

Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems.
IEEE Internet Things J., 2019

2018
Studying users' adaptation to Android's run-time fine-grained access control system.
J. Inf. Secur. Appl., 2018

Emotional Bots: Content-based Spammer Detection on Social Media.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

2017
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Privacy Decision-Making in the Digital Era: A Game Theoretic Review.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
IEEE Trans. Cybern., 2016

Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations.
IEEE Trans. Cybern., 2016

A study on usability and security features of the Android pattern lock screen.
Inf. Comput. Secur., 2016

Permissions snapshots: Assessing users' adaptation to the Android runtime permission model.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Impact of User Data Privacy Management Controls on Mobile Device Investigations.
Proceedings of the Advances in Digital Forensics XII, 2016

Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics.
Proceedings of the Advances in Digital Forensics XII, 2016

Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

2015
A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem.
Proceedings of the Advances in Digital Forensics XI, 2015

An Extensible Platform for the Forensic Analysis of Social Media Data.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Messaging Activity Reconstruction with Sentiment Polarity Identification.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
On the Development of Automated Forensic Analysis Methods for Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Smartphone Message Sentiment Analysis.
Proceedings of the Advances in Digital Forensics X, 2014

Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data.
Int. J. Digit. Crime Forensics, 2013

JPEG steganography detection with Benford's Law.
Digit. Investig., 2013

A pilot study on the security of pattern screen-lock methods and soft side channel attacks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

2012
Forensic analysis of wireless networking evidence of Android smartphones.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012


  Loading...