Theodoros Spyridopoulos

Orcid: 0000-0001-7575-9909

According to our database1, Theodoros Spyridopoulos authored at least 25 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Measurement and Applications: Exploring the Challenges and Opportunities of Hierarchical Federated Learning in Sensor Applications.
IEEE Instrum. Meas. Mag., December, 2023

Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs.
CoRR, 2023

Hierarchical and Decentralised Federated Learning.
CoRR, 2023

Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities: A Systematic Review.
CoRR, 2023

Federated Deep Learning for Intrusion Detection in IoT Networks.
Proceedings of the IEEE Global Communications Conference, 2023

LE3D: A Lightweight Ensemble Framework of Data Drift Detectors for Resource-Constrained Devices.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection.
CoRR, 2022

An Intrusion Detection System Based on Deep Belief Networks.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

2021
A Systems Approach to Understanding Geopolitical Tensions in the Middle East in the Face of a Global Water Shortage.
Int. J. Syst. Dyn. Appl., October, 2021

Container Escape Detection for Edge Devices.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

2019
Efficient and Interpretable Real-Time Malware Detection Using Random-Forest.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

2017
System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2015
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.
Inf. Secur. J. A Glob. Perspect., 2015

Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Applying the ACPO Guidelines to Building Automation Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Managing cyber security risks in industrial control systems with game theory and viable system modelling.
Proceedings of the 9th International Conference on System of Systems Engineering, 2014

Soft systems methodology in net-centric cyber defence system development.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2013
A game theoretic defence framework against DoS/DDoS cyber attacks.
Comput. Secur., 2013

A System Dynamics Model of Cyber Conflict.
Proceedings of the IEEE International Conference on Systems, 2013

Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2011
Requirements for a Forensically Ready Cloud Storage Service.
Int. J. Digit. Crime Forensics, 2011

Towards a forensically ready cloud storage service.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011


  Loading...