Theodore Tryfonas

Orcid: 0000-0003-4024-8003

Affiliations:
  • University of Bristol, UK


According to our database1, Theodore Tryfonas authored at least 118 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Unweaving the Definitions of Complexity.
IEEE Trans. Syst. Man Cybern. Syst., February, 2024

2023
Blockchain-based Zero Trust Cybersecurity in the Internet of Things.
ACM Trans. Internet Techn., August, 2023

Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities: A Systematic Review.
CoRR, 2023

E-scooter Sharing Platforms: Understanding Their Architecture and Cybersecurity Threats.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

A Conceptual Architecture for Scalable Multi-Application Support in Blockchain-based IoT Environments.
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023

2022
Causal Loop Mapping of Emerging Energy Systems in Project TwinERGY: Towards Consumer Engagement with Group Model Building.
Proceedings of the PETRA '22: The 15th International Conference on PErvasive Technologies Related to Assistive Environments, Corfu, Greece, 29 June 2022, 2022

2021
A Systems Approach to Understanding Geopolitical Tensions in the Middle East in the Face of a Global Water Shortage.
Int. J. Syst. Dyn. Appl., October, 2021

Investigating the Flexibility of the MBSE Approach to the Biomass Mission.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Using Telematics to Gather User Behaviour Data from a Fleet of Electric Bicycles.
ERCIM News, 2021

IoTsecM: A UML/SysML Extension for Internet of Things Security Modeling.
IEEE Access, 2021

An urban sensing architecture as essential infrastructure for future cities.
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021

An Initial Set of Heuristics for Handling Organizational Complexity.
Proceedings of the IEEE International Systems Conference, 2021

A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

2020
The long and winding road: MBSE adoption for functional avionics of spacecraft.
J. Syst. Softw., 2020

2019
Securing mHealth Applications Using IoTsecM Security Modelling: Dentify.Me mApp Case Study for Urgent Care Management.
Computación y Sistemas, 2019

Efficient DCT-based secret key generation for the Internet of Things.
Ad Hoc Networks, 2019

Special issue on security of IoT-enabled infrastructures in smart cities.
Ad Hoc Networks, 2019

Adaptive Guard Time for Energy-Efficient IEEE 802.15.4 TSCH Networks.
Proceedings of the Wired/Wireless Internet Communications, 2019

Dynamic Cloud Service Management for Scalable Internet of Things Applications.
Proceedings of the 2019 IEEE SmartWorld, 2019

A Proactive Genotype for Cybernetic Systems.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

Assessing and Developing Complexity Categorization Frameworks.
Proceedings of the International Symposium on Systems Engineering, 2019

Towards Asthma Self-Management: An Integrated Ontology Model for Asthma Action Plan.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

2018
An Evaluation of Performance and Competition in Customer Services on Twitter: A UK Telecoms Case Study.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018

Public Policy and Skills for Smart Cities: The UK Outlook.
Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, 2018

A review of air quality sensing technologies and their potential interfaces with IoT for asthma management.
Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, 2018

Popularity and Geospatial Spread of Trends on Twitter: A Middle Eastern Case Study.
Proceedings of the Computational Collective Intelligence - 10th International Conference, 2018

Sensor-Based Smart Hot-Desking for Improvement of Office Well-Being.
Proceedings of the 1st International Conference on Digital Tools & Uses Congress, 2018

2017
Privacy Leakage of Physical Activity Levels in Wireless Embedded Wearable Systems.
IEEE Signal Process. Lett., 2017

Towards effective cybersecurity resource allocation: the Monte Carlo predictive modelling approach.
Int. J. Crit. Infrastructures, 2017

Exploring Potential 6LoWPAN Traffic Side Channels.
IACR Cryptol. ePrint Arch., 2017

Towards Secure SPARQL Queries in Semantic Web Applications using PHP (Extended Version).
CoRR, 2017

Optimized Certificate Revocation List Distribution for Secure V2X Communications.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Towards Secure SPARQL Queries in Semantic Web Applications Using PHP.
Proceedings of the 11th IEEE International Conference on Semantic Computing, 2017

Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

"Come Together!": Interactions of Language Networks and Multilingual Communities on Twitter.
Proceedings of the Computational Collective Intelligence - 9th International Conference, 2017

Physical layer secret-key generation with discreet cosine transform for the Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2017

System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
An Intelligent Hot-Desking Model Based on Occupancy Sensor Data and Its Potential for Social Impact.
Trans. Large Scale Data Knowl. Centered Syst., 2016

Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
IEEE Trans. Cybern., 2016

Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations.
IEEE Trans. Cybern., 2016

The Internet of Things: a security point of view.
Internet Res., 2016

A study on usability and security features of the Android pattern lock screen.
Inf. Comput. Secur., 2016

Cryptographic Randomness on a CC2538: a Case Study.
IACR Cryptol. ePrint Arch., 2016

Guard time optimisation and adaptation for energy efficient multi-hop TSCH networks.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Practical limits of the secret key-capacity for IoT physical layer security.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Traffic forensics for IPv6-based Wireless Sensor Networks and the Internet of Things.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Impact of Guard Time Length on IEEE 802.15.4e TSCH Energy Consumption.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links.
Proceedings of the Interoperability, Safety and Security in IoT, 2016

BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs.
Proceedings of the Interoperability, Safety and Security in IoT, 2016

Impact of User Data Privacy Management Controls on Mobile Device Investigations.
Proceedings of the Advances in Digital Forensics XII, 2016

Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics.
Proceedings of the Advances in Digital Forensics XII, 2016

Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

A Mobility-Supporting MAC Scheme for Bursty Traffic in IoT and WSNs.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Smart Attacks on the Integrity of the Internet of Things: Avoiding Detection by Employing Game Theory.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.
Inf. Secur. J. A Glob. Perspect., 2015

Game theoretic approach towards optimal multi-tasking and data-distribution in IoT.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Class Based Overall Priority Scheduling for M2M Communications over LTE Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Smart data-harnessing for financial value in short-term hire electric car schemes.
Proceedings of the 10th System of Systems Engineering Conference, SoSE 2015, 2015

Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem.
Proceedings of the Advances in Digital Forensics XI, 2015

Hidden Presence: Sensing Occupancy and Extracting Value from Occupancy Data.
Proceedings of the Design, User Experience, and Usability: Interactive Experience Design, 2015

Whole-Life Environmental Impacts of ICT Use.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things.
IEEE Trans. Ind. Informatics, 2014

Introduction to the Special Theme - Future Cities and Smart Technologies: A Landscape of Ambition and Caution.
ERCIM News, 2014

Digital investigations for IPv6-based Wireless Sensor Networks.
Digit. Investig., 2014

On the Development of Automated Forensic Analysis Methods for Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Managing cyber security risks in industrial control systems with game theory and viable system modelling.
Proceedings of the 9th International Conference on System of Systems Engineering, 2014

Modelling effective Product Development systems as Network-of-Networks.
Proceedings of the IEEE International Systems Conference, 2014

A viable systems approach towards cyber situational awareness.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Soft systems methodology in net-centric cyber defence system development.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Smartphone Message Sentiment Analysis.
Proceedings of the Advances in Digital Forensics X, 2014

The Smart City from a Public Value Perspective.
Proceedings of the ICT for Sustainability 2014 (ICT4S-14), 2014

Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
IPv6 Multicast Forwarding in RPL-Based Wireless Sensor Networks.
Wirel. Pers. Commun., 2013

Living Labs, Innovation Districts and Information Marketplaces: A Systems Approach for Smart Cities.
Proceedings of the Conference on Systems Engineering Research, 2013

Migrating To The Cloud: Lessons And Limitations Of 'Traditional' IS Success Models.
Proceedings of the Conference on Systems Engineering Research, 2013

JPEG steganography detection with Benford's Law.
Digit. Investig., 2013

A game theoretic defence framework against DoS/DDoS cyber attacks.
Comput. Secur., 2013

Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

A pilot study on the security of pattern screen-lock methods and soft side channel attacks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

A System Dynamics Model of Cyber Conflict.
Proceedings of the IEEE International Conference on Systems, 2013

Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

2012
Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype.
EURASIP J. Wirel. Commun. Netw., 2012

Forensic analysis of wireless networking evidence of Android smartphones.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Developing an ICT-enabled, anti-prophetic approach to sustainable cities.
Proceedings of the 7th International Conference on System of Systems Engineering, 2012

Life-logging in smart environments: Challenges and security threats.
Proceedings of IEEE International Conference on Communications, 2012

2011
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis.
Int. J. Digit. Crime Forensics, 2011

A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking.
EURASIP J. Wirel. Commun. Netw., 2011

Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

Application of Systems Thinking to energy demand reduction.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Design of a sustainable forward operating base.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

2010
Engineering secure systems with ISO 26702 and 27001.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

A Dynamic Key Agreement Mechanism for Mission Critical Mobile Ad Hoc Networking.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

2009
A lightweight web-based vulnerability scanner for small-scale computer network security assessment.
J. Netw. Comput. Appl., 2009

Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users.
Inf. Manag. Comput. Secur., 2009

A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Mobile Lightweight Wireless Systems, 2009

2008
Security Patterns for Automated Continuous Auditing.
Inf. Secur. J. A Glob. Perspect., 2008

Standardising business application security assessments with pattern-driven audit automations.
Comput. Stand. Interfaces, 2008

A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks.
Proceedings of the Second International Conference on Emerging Security Information, 2008

A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

Cultivating an Atmosphere of Proactive Computer Security to Mitigate Limited End-User Awareness.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

Audit Log Unification and Review with Log Management Information Bases.
Proceedings of the Databases and Information Systems V, 2008

2007
Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples.
Internet Res., 2007

Online ID theft techniques, investigation and response.
Int. J. Electron. Secur. Digit. Forensics, 2007

Hard-drive Disposal and Identity Fraud.
Proceedings of the New Approaches for Security, 2007

2006
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage.
Digit. Investig., 2006

2005
Distribution of Offensive Material Over Computer Networks: A Research Agenda.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

2004
From risk analysis to effective security management: towards an automated approach.
Inf. Manag. Comput. Secur., 2004

2003
Η συμβολή οργανωσιακών εικόνων ασφαλείας πληροφοριακού συστήματος στην υλοποίηση ασφαλών πληροφοριακών συστημάτων
PhD thesis, 2003

Perceptions of Security Contributing to the Implementation of Secure IS.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Embedding security practices in contemporary information systems development approaches.
Inf. Manag. Comput. Secur., 2001

Security Concerns for Contemporary Development Practices: A Case Study.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

2000
A Qualitative Approach to Information Availability.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...