The Internet of Things: a security point of view S Li, T Tryfonas, H Li Internet Research 26 (2), 337-359, 2016 | 359 | 2016 |
Living labs, innovation districts and information marketplaces: A systems approach for smart cities E Cosgrave, K Arbuthnot, T Tryfonas Procedia Computer Science 16, 668-677, 2013 | 296 | 2013 |
A pilot study on the security of pattern screen-lock methods and soft side channel attacks P Andriotis, T Tryfonas, G Oikonomou, C Yildiz Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 149 | 2013 |
A Game Theoretic Defence Framework Against DoS/DDoS Cyber Attacks T Spyridopoulos, G Karanikas, T Tryfonas, G Oikonomou Computers & Security, 2013 | 125 | 2013 |
A distributed consensus algorithm for decision-making in service-oriented Internet of Things S Li, G Oikonomou, T Tryfonas, T Chen, L Xu IEEE Transactions on Industrial Informatics 10 (2), 1461 - 1468, 2014 | 119 | 2014 |
Towards Civil Engineering 4.0: Concept, workflow and application of Digital Twins for existing infrastructure M Pregnolato, S Gunner, E Voyagaki, R De Risi, N Carhart, G Gavriel, ... Automation in Construction 141, 104421, 2022 | 105 | 2022 |
Embedding security practices in contemporary information systems development approaches T Tryfonas, E Kiountouzis, A Poulymenakou Information Management & Computer Security 9 (4), 183-197, 2001 | 97 | 2001 |
Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method P Andriotis, T Tryfonas, G Oikonomou Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 87 | 2014 |
Tidal stream power technology-state of the art J King, T Tryfonas Oceans 2009-Europe, 1-8, 2009 | 85 | 2009 |
Acquiring volatile operating system data tools and techniques I Sutherland, J Evans, T Tryfonas, A Blyth ACM SIGOPS Operating Systems Review 42 (3), 65-73, 2008 | 72 | 2008 |
IPv6 multicast forwarding in RPL-based wireless sensor networks G Oikonomou, I Phillips, T Tryfonas Wireless personal communications 73, 1089-1116, 2013 | 70 | 2013 |
The long and winding road: MBSE adoption for functional avionics of spacecraft J Gregory, L Berthoud, T Tryfonas, A Rossignol, L Faure Journal of Systems and Software 160, 110453, 2020 | 65 | 2020 |
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage V Mee, T Tryfonas, I Sutherland Digital Investigation 3 (3), 166-173, 2006 | 56 | 2006 |
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network S Li, T Tryfonas, G Russell, P Andriotis Cybernetics, IEEE Transactions on, 2016 | 55 | 2016 |
Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems T Spyridopoulos, T Tryfonas, J May System Safety Conference incorporating the Cyber Security Conference 2013 …, 2013 | 55 | 2013 |
Forensic analysis of wireless networking evidence of android smartphones P Andriotis, G Oikonomou, T Tryfonas 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 55 | 2012 |
Migrating to the cloud: lessons and limitations of ‘traditional’IS success models I Khan, M Lewis, T Tryfonas Procedia Computer Science 16, 737-746, 2013 | 49 | 2013 |
Exploring the relationship between smart city policy and implementation E Cosgrave, T Tryfonas The First International Conference on Smart Systems, Devices and …, 2012 | 49 | 2012 |
The Smart City from a Public Value Perspective E Cosgrave, T Tryfonas, T Crick 2nd International Conference on ICT for Sustainability, ICT4S 2014, 369-377, 2014 | 45 | 2014 |
JPEG steganography detection with Benford's Law P Andriotis, G Oikonomou, T Tryfonas Digital Investigation 9 (3-4), 246-257, 2013 | 45 | 2013 |