Theo Tryfonas
Cited by
Cited by
The Internet of Things: a security point of view
S Li, T Tryfonas, H Li
Internet Research 26 (2), 337-359, 2016
Living labs, innovation districts and information marketplaces: A systems approach for smart cities
E Cosgrave, K Arbuthnot, T Tryfonas
Procedia Computer Science 16, 668-677, 2013
A pilot study on the security of pattern screen-lock methods and soft side channel attacks
P Andriotis, T Tryfonas, G Oikonomou, C Yildiz
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
A distributed consensus algorithm for decision-making in service-oriented Internet of Things
S Li, G Oikonomou, T Tryfonas, T Chen, L Xu
IEEE Transactions on Industrial Informatics 10 (2), 1461 - 1468, 2014
A Game Theoretic Defence Framework Against DoS/DDoS Cyber Attacks
T Spyridopoulos, G Karanikas, T Tryfonas, G Oikonomou
Computers & Security, 2013
Embedding security practices in contemporary information systems development approaches
T Tryfonas, E Kiountouzis, A Poulymenakou
Information Management & Computer Security, 2001
Tidal stream power technology-state of the art
J King, T Tryfonas
Oceans 2009-Europe, 1-8, 2009
Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method
P Andriotis, T Tryfonas, G Oikonomou
International conference on human aspects of information security, privacy …, 2014
IPv6 multicast forwarding in RPL-based wireless sensor networks
G Oikonomou, I Phillips, T Tryfonas
Wireless personal communications 73 (3), 1089-1116, 2013
Acquiring volatile operating system data tools and techniques
I Sutherland, J Evans, T Tryfonas, A Blyth
ACM SIGOPS Operating Systems Review 42 (3), 65-73, 2008
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage
V Mee, T Tryfonas, I Sutherland
Digital Investigation 3 (3), 166-173, 2006
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network
S Li, T Tryfonas, G Russell, P Andriotis
Cybernetics, IEEE Transactions on, 2016
Forensic analysis of wireless networking evidence of android smartphones
P Andriotis, G Oikonomou, T Tryfonas
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
JPEG steganography detection with Benford's Law
P Andriotis, G Oikonomou, T Tryfonas
Digital Investigation 9 (3-4), 246-257, 2013
Migrating to the cloud: lessons and limitations of ‘traditional’IS success models
IK Azeemi, M Lewis, T Tryfonas
Procedia Computer Science 16, 737-746, 2013
Exploring the relationship between smart city policy and implementation
E Cosgrave, T Tryfonas
Proceedings of The First International Conference on Smart Systems, Devices …, 2012
Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems
T Spyridopoulos, T Tryfonas, J May
System Safety Conference incorporating the Cyber Security Conference 2013 …, 2013
Life-logging in smart environments: Challenges and security threats
NE Petroulakis, IG Askoxylakis, T Tryfonas
2012 IEEE International Conference on Communications (ICC), 5680-5684, 2012
The Smart City from a Public Value Perspective.
E Cosgrave, T Tryfonas, T Crick
ICT4S, 2014
Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype
AG Fragkiadakis, EZ Tragos, T Tryfonas, IG Askoxylakis
EURASIP Journal on Wireless Communications and Networking 2012 (1), 1-18, 2012
The system can't perform the operation now. Try again later.
Articles 1–20