Panagiotis Andriotis
Panagiotis Andriotis
Verified email at uwe.ac.uk - Homepage
Title
Cited by
Cited by
Year
Mamadroid: Detecting android malware by building markov chains of behavioral models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
arXiv preprint arXiv:1612.04433, 2016
1432016
A pilot study on the security of pattern screen-lock methods and soft side channel attacks
P Andriotis, T Tryfonas, G Oikonomou, C Yildiz
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
1052013
Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method
P Andriotis, T Tryfonas, G Oikonomou
International Conference on Human Aspects of Information Security, Privacy …, 2014
512014
Forensic analysis of wireless networking evidence of android smartphones
P Andriotis, G Oikonomou, T Tryfonas
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
392012
JPEG steganography detection with Benford's Law
P Andriotis, G Oikonomou, T Tryfonas
Digital Investigation 9 (3-4), 246-257, 2013
342013
Risk assessment for mobile systems through a multilayered hierarchical Bayesian network
S Li, T Tryfonas, G Russell, P Andriotis
IEEE transactions on cybernetics 46 (8), 1749-1759, 2016
302016
MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version)
L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019
292019
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model
P Andriotis, MA Sasse, G Stringhini
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
252016
Distributed consensus algorithm for events detection in cyber-physical systems
S Li, S Zhao, P Yang, P Andriotis, L Xu, Q Sun
IEEE Internet of Things Journal 6 (2), 2299-2308, 2019
202019
A study on usability and security features of the android pattern lock screen
P Andriotis, G Oikonomou, A Mylonas, T Tryfonas
Information & Computer Security, 2016
102016
Real-time monitoring of privacy abuses and intrusion detection in android system
S Li, J Chen, T Spyridopoulos, P Andriotis, R Ludwiniak, G Russell
International Conference on Human Aspects of Information Security, Privacy …, 2015
92015
Highlighting relationships of a smartphone’s social ecosystem in potentially large investigations
P Andriotis, G Oikonomou, T Tryfonas, S Li
IEEE transactions on cybernetics 46 (9), 1974-1985, 2015
82015
Smartphone message sentiment analysis
P Andriotis, A Takasu, T Tryfonas
IFIP International Conference on Digital Forensics, 253-265, 2014
82014
A comparative study of android users’ privacy preferences under the runtime permission model
P Andriotis, S Li, T Spyridopoulos, G Stringhini
International Conference on Human Aspects of Information Security, Privacy …, 2017
72017
Impact of user data privacy management controls on mobile device investigations
P Andriotis, T Tryfonas
IFIP International Conference on Digital Forensics, 89-105, 2016
72016
Multilevel visualization using enhanced social network analysis with smartphone data
P Andriotis, Z Tzermias, A Mparmpaki, S Ioannidis, G Oikonomou
International Journal of Digital Crime and Forensics (IJDCF) 5 (4), 34-54, 2013
62013
Mass surveillance in cyberspace and the lost art of keeping a secret
T Tryfonas, M Carter, T Crick, P Andriotis
International Conference on Human Aspects of Information Security, Privacy …, 2016
52016
POSTER: Breaking the Android Pattern Lock Screen with Neural Networks and Smudge Attacks
P Andriotis, T Tryfonas, Z Yu
Proc. of the sixth ACM conference on Security and privacy in wireless and …, 2014
52014
Privacy decision-making in the digital era: A game theoretic review
K Anastasopoulou, S Kokolakis, P Andriotis
International Conference on Human Aspects of Information Security, Privacy …, 2017
42017
Emotional bots: Content-based spammer detection on social media
P Andriotis, A Takasu
2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20