Follow
Panagiotis Andriotis
Panagiotis Andriotis
Verified email at bham.ac.uk - Homepage
Title
Cited by
Cited by
Year
Mamadroid: Detecting android malware by building markov chains of behavioral models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
arXiv preprint arXiv:1612.04433, 2016
3892016
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019
3122019
A pilot study on the security of pattern screen-lock methods and soft side channel attacks
P Andriotis, T Tryfonas, G Oikonomou, C Yildiz
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
1532013
AI hyped? A horizon scan of discourse on artificial intelligence in education (AIED) and development
S Nemorin, A Vlachidis, HM Ayerakwa, P Andriotis
Learning, Media and Technology 48 (1), 38-51, 2023
1252023
Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method
P Andriotis, T Tryfonas, G Oikonomou
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
912014
Distributed consensus algorithm for events detection in cyber-physical systems
S Li, S Zhao, P Yang, P Andriotis, L Xu, Q Sun
IEEE Internet of Things Journal 6 (2), 2299-2308, 2019
732019
Risk assessment for mobile systems through a multilayered hierarchical Bayesian network
S Li, T Tryfonas, G Russell, P Andriotis
IEEE transactions on cybernetics 46 (8), 1749-1759, 2016
582016
Forensic analysis of wireless networking evidence of android smartphones
P Andriotis, G Oikonomou, T Tryfonas
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
552012
JPEG steganography detection with Benford's Law
P Andriotis, G Oikonomou, T Tryfonas
Digital Investigation 9 (3-4), 246-257, 2013
462013
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model
P Andriotis, MA Sasse, G Stringhini
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
442016
A study on usability and security features of the android pattern lock screen
P Andriotis, G Oikonomou, A Mylonas, T Tryfonas
Information & Computer Security 24 (1), 53-72, 2016
442016
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
A McCarthy, E Ghadafi, P Andriotis, P Legg
Journal of Cybersecurity and Privacy 2 (1), 154-190, 2022
362022
Emotional bots: content-based spammer detection on social media
P Andriotis, A Takasu
2018 IEEE international workshop on information forensics and security (WIFS …, 2018
332018
Smartphone message sentiment analysis
P Andriotis, A Takasu, T Tryfonas
Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference …, 2014
212014
A comparative study of android users’ privacy preferences under the runtime permission model
P Andriotis, S Li, T Spyridopoulos, G Stringhini
Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017
202017
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification
A McCarthy, E Ghadafi, P Andriotis, P Legg
Journal of Information Security and Applications 72, 103398, 2023
162023
Studying users’ adaptation to Android’s run-time fine-grained access control system
P Andriotis, G Stringhini, MA Sasse
Journal of information security and applications 40, 31-43, 2018
152018
Highlighting relationships of a smartphone’s social ecosystem in potentially large investigations
P Andriotis, G Oikonomou, T Tryfonas, S Li
IEEE transactions on cybernetics 46 (9), 1974-1985, 2015
152015
Feature vulnerability and robustness assessment against adversarial machine learning attacks
A McCarthy, P Andriotis, E Ghadafi, P Legg
2021 International Conference on Cyber Situational Awareness, Data Analytics …, 2021
132021
Real-time monitoring of privacy abuses and intrusion detection in android system
S Li, J Chen, T Spyridopoulos, P Andriotis, R Ludwiniak, G Russell
Human Aspects of Information Security, Privacy, and Trust: Third …, 2015
132015
The system can't perform the operation now. Try again later.
Articles 1–20