Mamadroid: Detecting android malware by building markov chains of behavioral models E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ... arXiv preprint arXiv:1612.04433, 2016 | 374 | 2016 |
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version) L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ... ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019 | 297 | 2019 |
A pilot study on the security of pattern screen-lock methods and soft side channel attacks P Andriotis, T Tryfonas, G Oikonomou, C Yildiz Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 149 | 2013 |
AI hyped? A horizon scan of discourse on artificial intelligence in education (AIED) and development S Nemorin, A Vlachidis, HM Ayerakwa, P Andriotis Learning, Media and Technology 48 (1), 38-51, 2023 | 98 | 2023 |
Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method P Andriotis, T Tryfonas, G Oikonomou Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 87 | 2014 |
Distributed consensus algorithm for events detection in cyber-physical systems S Li, S Zhao, P Yang, P Andriotis, L Xu, Q Sun IEEE Internet of Things Journal 6 (2), 2299-2308, 2019 | 70 | 2019 |
Risk assessment for mobile systems through a multilayered hierarchical Bayesian network S Li, T Tryfonas, G Russell, P Andriotis IEEE transactions on cybernetics 46 (8), 1749-1759, 2016 | 55 | 2016 |
Forensic analysis of wireless networking evidence of android smartphones P Andriotis, G Oikonomou, T Tryfonas 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 55 | 2012 |
JPEG steganography detection with Benford's Law P Andriotis, G Oikonomou, T Tryfonas Digital Investigation 9 (3-4), 246-257, 2013 | 45 | 2013 |
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model P Andriotis, MA Sasse, G Stringhini 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 44 | 2016 |
A study on usability and security features of the android pattern lock screen P Andriotis, G Oikonomou, A Mylonas, T Tryfonas Information & Computer Security 24 (1), 53-72, 2016 | 41 | 2016 |
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey A McCarthy, E Ghadafi, P Andriotis, P Legg Journal of Cybersecurity and Privacy 2 (1), 154-190, 2022 | 31 | 2022 |
Emotional bots: content-based spammer detection on social media P Andriotis, A Takasu 2018 IEEE international workshop on information forensics and security (WIFS …, 2018 | 29 | 2018 |
Smartphone message sentiment analysis P Andriotis, A Takasu, T Tryfonas Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference …, 2014 | 21 | 2014 |
A comparative study of android users’ privacy preferences under the runtime permission model P Andriotis, S Li, T Spyridopoulos, G Stringhini Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017 | 20 | 2017 |
Studying users’ adaptation to Android’s run-time fine-grained access control system P Andriotis, G Stringhini, MA Sasse Journal of information security and applications 40, 31-43, 2018 | 15 | 2018 |
Highlighting relationships of a smartphone’s social ecosystem in potentially large investigations P Andriotis, G Oikonomou, T Tryfonas, S Li IEEE transactions on cybernetics 46 (9), 1974-1985, 2015 | 15 | 2015 |
Feature vulnerability and robustness assessment against adversarial machine learning attacks A McCarthy, P Andriotis, E Ghadafi, P Legg 2021 International Conference on Cyber Situational Awareness, Data Analytics …, 2021 | 13 | 2021 |
Real-time monitoring of privacy abuses and intrusion detection in android system S Li, J Chen, T Spyridopoulos, P Andriotis, R Ludwiniak, G Russell Human Aspects of Information Security, Privacy, and Trust: Third …, 2015 | 13 | 2015 |
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification A McCarthy, E Ghadafi, P Andriotis, P Legg Journal of Information Security and Applications 72, 103398, 2023 | 12 | 2023 |