default search action
Theodore Tryfonas
Person information
- affiliation: University of Bristol, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Dean Beale, Francesco Dazzi, Theo Tryfonas:
Unweaving the Definitions of Complexity. IEEE Trans. Syst. Man Cybern. Syst. 54(2): 682-692 (2024) - [c82]Winston Ellis, Sana Belguith, Theo Tryfonas:
Machine Learning Security of Connected Autonomous Vehicles: A Systems Perspective. ICIT 2024: 1-8 - [c81]Akin Eker, Theo Tryfonas, George Oikonomou:
FlexBoT: A Scalable Architecture for Multi-Application Supporting BoT Environments with Application Shifting at Runtime. IFIP Networking 2024: 186-194 - 2023
- [j33]Shancang Li, Surya Nepal, Theo Tryfonas, Hongwei Li:
Blockchain-based Zero Trust Cybersecurity in the Internet of Things. ACM Trans. Internet Techn. 23(3): 36:1-36:3 (2023) - [c80]Akin Eker, Theo Tryfonas, George Oikonomou:
A Conceptual Architecture for Scalable Multi-Application Support in Blockchain-based IoT Environments. INDIN 2023: 1-6 - [c79]Gizay Kisa Isik, Theo Tryfonas, George Oikonomou:
E-scooter Sharing Platforms: Understanding Their Architecture and Cybersecurity Threats. ITSC 2023: 5909-5916 - [c78]Akin Eker, Theo Tryfonas, George Oikonomou:
Public Blockchain in Support of Transactive Energy Markets. WF-IoT 2023: 1-6 - [i7]Vijay Kumar, Sam Gunner, Theodoros Spyridopoulos, Antonis Vafeas, James Pope, Poonam Yadav, George Oikonomou, Theo Tryfonas:
Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities: A Systematic Review. CoRR abs/2302.11009 (2023) - 2022
- [c77]Theo Tryfonas, Sam Gunner, Ulas Baloglu, Patrick Tully, Stylianos Karatzas, Catherine Tryfona:
Causal Loop Mapping of Emerging Energy Systems in Project TwinERGY: Towards Consumer Engagement with Group Model Building. PETRA 2022: 254-259 - 2021
- [j32]Ponciano Jorge Escamilla-Ambrosio, David Alejandro Robles-Ramírez, Theo Tryfonas, Abraham Rodriguez-Mota, Gina Gallegos-García, Moisés Salinas-Rosales:
IoTsecM: A UML/SysML Extension for Internet of Things Security Modeling. IEEE Access 9: 154112-154135 (2021) - [j31]Raya A. Al-Masri, Theodoros Spyridopoulos, Stylianos Karatzas, Vasiliki Lazari, Theo Tryfonas:
A Systems Approach to Understanding Geopolitical Tensions in the Middle East in the Face of a Global Water Shortage. Int. J. Syst. Dyn. Appl. 10(4): 1-23 (2021) - [j30]Joe Gregory, Lucy Berthoud, Theo Tryfonas, Antonio Prezzavento, Ludovic Faure:
Investigating the Flexibility of the MBSE Approach to the Biomass Mission. IEEE Trans. Syst. Man Cybern. Syst. 51(11): 6946-6961 (2021) - [c76]Faya Algahtani, Theo Tryfonas, George Oikonomou:
A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA. DCOSS 2021: 280-286 - [c75]Dean Beale, Theo Tryfonas:
An Initial Set of Heuristics for Handling Organizational Complexity. SysCon 2021: 1-8 - [c74]Vijay Kumar, George Oikonomou, Theo Tryfonas:
An urban sensing architecture as essential infrastructure for future cities. UCC Companion 2021: 37:1-37:3 - [e9]Thomas Groß, Theo Tryfonas:
Socio-Technical Aspects in Security and Trust - 9th International Workshop, STAST 2019, Luxembourg City, Luxembourg, September 26, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11739, Springer 2021, ISBN 978-3-030-55957-1 [contents] - [i6]Sam Gunner, Eddie Wilson, Theo Tryfonas:
Using Telematics to Gather User Behaviour Data from a Fleet of Electric Bicycles. ERCIM News 2021(126): 0 (2021) - 2020
- [j29]Joe Gregory, Lucy Berthoud, Theo Tryfonas, Alain Rossignol, Ludovic Faure:
The long and winding road: MBSE adoption for functional avionics of spacecraft. J. Syst. Softw. 160 (2020)
2010 – 2019
- 2019
- [j28]Ali Ismail Awad, Steven Furnell, Abbas M. Hassan, Theo Tryfonas:
Special issue on security of IoT-enabled infrastructures in smart cities. Ad Hoc Networks 92 (2019) - [j27]George Margelis, Xenofon Fafoutis, George Oikonomou, Robert J. Piechocki, Theo Tryfonas, Paul Thomas:
Efficient DCT-based secret key generation for the Internet of Things. Ad Hoc Networks 92 (2019) - [j26]Ponciano Jorge Escamilla-Ambrosio, David Alejandro Robles-Ramírez, Shada Alsalamah, Theo Tryfonas, Sandra Orantes-Jiménez, Abraham Rodriguez-Mota, Sakher Alqahtani, Thamer Nouh, Hessah A. Alsalamah, Shahad Almutawaa, Hend Alkabani, Mshael Alsmari, Nouf Alashgar, Abeer Alrajeh, Heba A. Kurdi:
Securing mHealth Applications Using IoTsecM Security Modelling: Dentify.Me mApp Case Study for Urgent Care Management. Computación y Sistemas 23(4) (2019) - [c73]Fatmah Bamashmoos, Theo Tryfonas:
Towards Asthma Self-Management: An Integrated Ontology Model for Asthma Action Plan. BIBM 2019: 1737-1741 - [c72]Dean Beale, Theo Tryfonas:
Assessing and Developing Complexity Categorization Frameworks. ISSE 2019: 1-8 - [c71]Richard Craig, Theo Tryfonas, John May:
A Proactive Genotype for Cybernetic Systems. SMC 2019: 4231-4238 - [c70]Alexandros Mavromatis, Sam Gunner, Theo Tryfonas, Dimitra Simeonidou:
Dynamic Cloud Service Management for Scalable Internet of Things Applications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1978-1982 - [c69]Alexandros Mavromatis, Georgios Z. Papadopoulos, Atis Elsts, Nicolas Montavont, Robert J. Piechocki, Theo Tryfonas, George Oikonomou, Xenofon Fafoutis:
Adaptive Guard Time for Energy-Efficient IEEE 802.15.4 TSCH Networks. WWIC 2019: 15-26 - 2018
- [c68]Keren Berelson, Filippo Simini, Theo Tryfonas, Peter Cooper:
Sensor-Based Smart Hot-Desking for Improvement of Office Well-Being. DTUC 2018: 10:1-10:9 - [c67]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Exploring Potential 6LoWPAN Traffic Side Channels. EWSN 2018: 270-275 - [c66]Nabeel Albishry, Tom Crick, Tesleem Fagade, Theo Tryfonas:
Popularity and Geospatial Spread of Trends on Twitter: A Middle Eastern Case Study. ICCCI (1) 2018: 167-177 - [c65]Theo Tryfonas, Tom Crick:
Public Policy and Skills for Smart Cities: The UK Outlook. PETRA 2018: 116-117 - [c64]Fatmah Bamashmoos, Pete Woznowski, Theo Tryfonas:
A review of air quality sensing technologies and their potential interfaces with IoT for asthma management. PETRA 2018: 470-475 - [c63]Kalliopi Anastasopoulou, Emma J. Williams, Carolyn Whitnall, Theo Tryfonas, Elisabeth Oswald, Phillip L. Morgan, Alexandra Voinescu, Robert J. Piechocki, Andrea Tassi:
Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use. STAST 2018: 5:1-5:6 - [c62]Nabeel Albishry, Tom Crick, Theo Tryfonas, Tesleem Fagade:
An Evaluation of Performance and Competition in Customer Services on Twitter: A UK Telecoms Case Study. WWW (Companion Volume) 2018: 1713-1720 - [e8]Giampaolo Bella, Gabriele Lenzini, Theo Tryfonas, Debi Ashenden:
STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, San Juan, Puerto Rico, USA, December, 2018. ACM 2018, ISBN 978-1-4503-7285-5 [contents] - 2017
- [j25]Tesleem Fagade, Konstantinos Maraslis, Theo Tryfonas:
Towards effective cybersecurity resource allocation: the Monte Carlo predictive modelling approach. Int. J. Crit. Infrastructures 13(2/3): 152-167 (2017) - [j24]Xenofon Fafoutis, Letizia Marchegiani, Georgios Z. Papadopoulos, Robert J. Piechocki, Theo Tryfonas, George C. Oikonomou:
Privacy Leakage of Physical Activity Levels in Wireless Embedded Wearable Systems. IEEE Signal Process. Lett. 24(2): 136-140 (2017) - [c61]Tesleem Fagade, Theodoros Spyridopoulos, Nabeel Albishry, Theodore Tryfonas:
System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis. HCI (22) 2017: 309-321 - [c60]George Margelis, Xenofon Fafoutis, George C. Oikonomou, Robert J. Piechocki, Theo Tryfonas, Paul Thomas:
Physical layer secret-key generation with discreet cosine transform for the Internet of Things. ICC 2017: 1-6 - [c59]Nabeel Albishry, Tom Crick, Theo Tryfonas:
"Come Together!": Interactions of Language Networks and Multilingual Communities on Twitter. ICCCI (2) 2017: 469-478 - [c58]Alexandros Mavromatis, Georgios Z. Papadopoulos, Xenofon Fafoutis, Angelos A. Goulianos, George C. Oikonomou, Periklis Chatzimisios, Theo Tryfonas:
Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networks. ISCC 2017: 798-803 - [c57]Fatmah Bamashmoos, Ian Holyer, Theodore Tryfonas, Przemyslaw Woznowski:
Towards Secure SPARQL Queries in Semantic Web Applications Using PHP. ICSC 2017: 276-277 - [c56]Giovanni Rigazzi, Andrea Tassi, Robert J. Piechocki, Theo Tryfonas, Andrew R. Nix:
Optimized Certificate Revocation List Distribution for Secure V2X Communications. VTC Fall 2017: 1-7 - [e7]Theo Tryfonas:
Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science 10292, Springer 2017, ISBN 978-3-319-58459-1 [contents] - [i5]Fatmah Bamashmoos, Ian Holyer, Theo Tryfonas, Przemyslaw Woznowski:
Towards Secure SPARQL Queries in Semantic Web Applications using PHP (Extended Version). CoRR abs/1701.07671 (2017) - [i4]Giovanni Rigazzi, Andrea Tassi, Robert J. Piechocki, Theo Tryfonas, Andrew R. Nix:
Optimized Certificate Revocation List Distribution for Secure V2X Communications. CoRR abs/1705.06903 (2017) - [i3]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Exploring Potential 6LoWPAN Traffic Side Channels. IACR Cryptol. ePrint Arch. 2017: 316 (2017) - 2016
- [j23]Panagiotis Andriotis, George C. Oikonomou, Alexios Mylonas, Theo Tryfonas:
A study on usability and security features of the Android pattern lock screen. Inf. Comput. Secur. 24(1): 53-72 (2016) - [j22]Shancang Li, Theo Tryfonas, Honglei Li:
The Internet of Things: a security point of view. Internet Res. 26(2): 337-359 (2016) - [j21]Shancang Li, Theo Tryfonas, Gordon Russell, Panagiotis Andriotis:
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network. IEEE Trans. Cybern. 46(8): 1749-1759 (2016) - [j20]Panagiotis Andriotis, George C. Oikonomou, Theo Tryfonas, Shancang Li:
Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations. IEEE Trans. Cybern. 46(9): 1974-1985 (2016) - [j19]Konstantinos Maraslis, Peter Cooper, Theo Tryfonas, George C. Oikonomou:
An Intelligent Hot-Desking Model Based on Occupancy Sensor Data and Its Potential for Social Impact. Trans. Large Scale Data Knowl. Centered Syst. 27: 142-158 (2016) - [c55]George Margelis, Robert J. Piechocki, Theo Tryfonas, Paul Thomas:
Smart Attacks on the Integrity of the Internet of Things: Avoiding Detection by Employing Game Theory. GLOBECOM 2016: 1-6 - [c54]Georgios Z. Papadopoulos, Vasileios Kotsiou, Antoine Gallais, George C. Oikonomou, Periklis Chatzimisios, Theo Tryfonas, Thomas Noël:
A Mobility-Supporting MAC Scheme for Bursty Traffic in IoT and WSNs. GLOBECOM 2016: 1-6 - [c53]Tesleem Fagade, Theo Tryfonas:
Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks. HCI (20) 2016: 128-139 - [c52]Theo Tryfonas, Michael Carter, Tom Crick, Panagiotis Andriotis:
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks. HCI (20) 2016: 174-185 - [c51]Oluwapelumi Aboluwarin, Panagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas:
Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics. IFIP Int. Conf. Digital Forensics 2016: 69-87 - [c50]Panagiotis Andriotis, Theo Tryfonas:
Impact of User Data Privacy Management Controls on Mobile Device Investigations. IFIP Int. Conf. Digital Forensics 2016: 89-105 - [c49]Georgios Z. Papadopoulos, Andreas Georgallides, Theo Tryfonas, George Oikonomou:
BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs. InterIoT/SaSeIoT 2016: 18-25 - [c48]Georgios Z. Papadopoulos, Alexandros Mavromatis, Xenofon Fafoutis, Robert J. Piechocki, Theo Tryfonas, George Oikonomou:
Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links. InterIoT/SaSeIoT 2016: 56-63 - [c47]Alexandros Mavromatis, Georgios Z. Papadopoulos, Xenofon Fafoutis, Atis Elsts, George C. Oikonomou, Theo Tryfonas:
Impact of Guard Time Length on IEEE 802.15.4e TSCH Energy Consumption. SECON 2016: 1-3 - [c46]Georgios Z. Papadopoulos, Alexandros Mavromatis, Xenofon Fafoutis, Nicolas Montavont, Robert J. Piechocki, Theo Tryfonas, George C. Oikonomou:
Guard time optimisation and adaptation for energy efficient multi-hop TSCH networks. WF-IoT 2016: 301-306 - [c45]George Margelis, Xenofon Fafoutis, Robert J. Piechocki, George C. Oikonomou, Theo Tryfonas, Paul Thomas:
Practical limits of the secret key-capacity for IoT physical layer security. WF-IoT 2016: 311-316 - [c44]Vijay Kumar, George C. Oikonomou, Theo Tryfonas:
Traffic forensics for IPv6-based Wireless Sensor Networks and the Internet of Things. WF-IoT 2016: 633-638 - [c43]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Cryptographic randomness on a CC2538: A case study. WIFS 2016: 1-6 - [e6]Theo Tryfonas:
Human Aspects of Information Security, Privacy, and Trust - 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. Lecture Notes in Computer Science 9750, Springer 2016, ISBN 978-3-319-39380-3 [contents] - [i2]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Cryptographic Randomness on a CC2538: a Case Study. IACR Cryptol. ePrint Arch. 2016: 1021 (2016) - 2015
- [j18]Theodoros Spyridopoulos, Konstantinos Maraslis, Alexios Mylonas, Theo Tryfonas, George C. Oikonomou:
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention. Inf. Secur. J. A Glob. Perspect. 24(4-6): 164-176 (2015) - [c42]Peter Cooper, Tom Crick, Theo Tryfonas, George C. Oikonomou:
Whole-Life Environmental Impacts of ICT Use. GLOBECOM Workshops 2015: 1-7 - [c41]Larissa Suzuki, Peter Cooper, Theo Tryfonas, George C. Oikonomou:
Hidden Presence: Sensing Occupancy and Extracting Value from Occupancy Data. HCI (20) 2015: 412-424 - [c40]Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Irwin King:
A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem. IFIP Int. Conf. Digital Forensics 2015: 251-267 - [c39]Konstantinos Maraslis, Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mo Haghighi:
Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems. SEC 2015: 601-615 - [c38]Peter Cooper, Tom Crick, Theo Tryfonas:
Smart data-harnessing for financial value in short-term hire electric car schemes. SoSE 2015: 374-379 - [c37]Beichen Chen, Zhong Fan, Fengming Cao, George C. Oikonomou, Theo Tryfonas:
Class Based Overall Priority Scheduling for M2M Communications over LTE Networks. VTC Spring 2015: 1-5 - [c36]Mo Haghighi, Konstantinos Maraslis, Theo Tryfonas, George C. Oikonomou, Alison Burrows, Pete Woznowski, Robert J. Piechocki:
Game theoretic approach towards optimal multi-tasking and data-distribution in IoT. WF-IoT 2015: 406-411 - [e5]Theo Tryfonas, Ioannis G. Askoxylakis:
Human Aspects of Information Security, Privacy, and Trust - Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings. Lecture Notes in Computer Science 9190, Springer 2015, ISBN 978-3-319-20375-1 [contents] - 2014
- [j17]Vijay Kumar, George C. Oikonomou, Theo Tryfonas, Dan Page, Iain W. Phillips:
Digital investigations for IPv6-based Wireless Sensor Networks. Digit. Investig. 11(Supplement 2): S66-S75 (2014) - [j16]Shancang Li, George C. Oikonomou, Theo Tryfonas, Thomas M. Chen, Li Da Xu:
A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things. IEEE Trans. Ind. Informatics 10(2): 1461-1468 (2014) - [c35]Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou:
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method. HCI (24) 2014: 115-126 - [c34]Ellie Cosgrave, Theo Tryfonas, Tom Crick:
The Smart City from a Public Value Perspective. ICT4S 2014 - [c33]Panagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas:
Smartphone Message Sentiment Analysis. IFIP Int. Conf. Digital Forensics 2014: 253-265 - [c32]Theodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda:
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model. SEC 2014: 438-445 - [c31]Richard Craig, Theodoros Spyridopoulos, Theo Tryfonas, John May:
Soft systems methodology in net-centric cyber defence system development. SMC 2014: 672-677 - [c30]Richard Craig, Theo Tryfonas, John May:
A viable systems approach towards cyber situational awareness. SMC 2014: 1405-1411 - [c29]Alexander O. Hultin, Theo Tryfonas, Nigel Johnston, Martin Kirkman:
Modelling effective Product Development systems as Network-of-Networks. SysCon 2014: 89-96 - [c28]Theodoros Spyridopoulos, Konstantinos Maraslis, Theo Tryfonas, George C. Oikonomou, Shancang Li:
Managing cyber security risks in industrial control systems with game theory and viable system modelling. SoSE 2014: 266-271 - [c27]Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Shancang Li, Zacharias Tzermias, Konstantinos Xynos, Huw Read, Vassilis Prevelakis:
On the Development of Automated Forensic Analysis Methods for Mobile Devices. TRUST 2014: 212-213 - [e4]Theo Tryfonas, Ioannis G. Askoxylakis:
Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings. Lecture Notes in Computer Science 8533, Springer 2014, ISBN 978-3-319-07619-5 [contents] - [i1]Theo Tryfonas, Ioannis G. Askoxylakis:
Introduction to the Special Theme - Future Cities and Smart Technologies: A Landscape of Ambition and Caution. ERCIM News 2014(98) (2014) - 2013
- [j15]Theodoros Spyridopoulos, G. Karanikas, Theodore Tryfonas, Georgios Oikonomou:
A game theoretic defence framework against DoS/DDoS cyber attacks. Comput. Secur. 38: 39-50 (2013) - [j14]Panagiotis Andriotis, George C. Oikonomou, Theo Tryfonas:
JPEG steganography detection with Benford's Law. Digit. Investig. 9(3-4): 246-257 (2013) - [j13]George C. Oikonomou, Iain Phillips, Theo Tryfonas:
IPv6 Multicast Forwarding in RPL-Based Wireless Sensor Networks. Wirel. Pers. Commun. 73(3): 1089-1116 (2013) - [c26]Kalliopi Anastasopoulou, Theo Tryfonas, Spyros Kokolakis:
Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps. HCI (27) 2013: 209-216 - [c25]Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mengmeng Ge:
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention. SEC 2013: 28-41 - [c24]Dana Polatin-Reuben, Richard Craig, Theodoros Spyridopoulos, Theo Tryfonas:
A System Dynamics Model of Cyber Conflict. SMC 2013: 303-308 - [c23]Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Can Yildiz:
A pilot study on the security of pattern screen-lock methods and soft side channel attacks. WISEC 2013: 1-6 - [c22]Panagiotis Ilia, George C. Oikonomou, Theo Tryfonas:
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks. WISTP 2013: 34-49 - [c21]Ellie Cosgrave, Kate Arbuthnot, Theo Tryfonas:
Living Labs, Innovation Districts and Information Marketplaces: A Systems Approach for Smart Cities. CSER 2013: 668-677 - [c20]Imran Khan Azeemi, Mike Lewis, Theo Tryfonas:
Migrating To The Cloud: Lessons And Limitations Of 'Traditional' IS Success Models. CSER 2013: 737-746 - 2012
- [j12]Alexandros G. Fragkiadakis, Elias Z. Tragos, Theodore Tryfonas, Ioannis G. Askoxylakis:
Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype. EURASIP J. Wirel. Commun. Netw. 2012: 73 (2012) - [c19]Nikolaos E. Petroulakis, Ioannis G. Askoxylakis, Theo Tryfonas:
Life-logging in smart environments: Challenges and security threats. ICC 2012: 5680-5684 - [c18]Ellie Cosgrave, Theo Tryfonas, Kirsten Cater:
Developing an ICT-enabled, anti-prophetic approach to sustainable cities. SoSE 2012: 47-52 - [c17]Panagiotis Andriotis, George C. Oikonomou, Theo Tryfonas:
Forensic analysis of wireless networking evidence of Android smartphones. WIFS 2012: 109-114 - [e3]Nathan L. Clarke, Theodore Tryfonas, Ronald Dodge:
7th International Workshop on Digital Forensics and Incident Analysis, WDFIA 2012, Crete, Greece, June 6-8, 2012. Proceedings. Plymouth University, UK 2012, ISBN 978-1-84102-316-8 [contents] - 2011
- [j11]Ioannis G. Askoxylakis, Theodore Tryfonas, John May, Vasilios A. Siris, Apostolos Traganitis:
A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j10]Alexandros Zaharis, Adamantini Martini, Theo Tryfonas, Christos Ilioudis, George Pangalos:
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis. Int. J. Digit. Crime Forensics 3(4): 29-41 (2011) - [c16]Rachel Freeman, Theo Tryfonas:
Application of Systems Thinking to energy demand reduction. SoSE 2011: 143-148 - [c15]George Cave, William Goodwin, Maxwell Harrison, Amina Sadiq, Theo Tryfonas:
Design of a sustainable forward operating base. SoSE 2011: 251-257 - [c14]Alexandros Zaharis, Adamantini Martini, Theodore Tryfonas, Christos Ilioudis, George Pangalos:
Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination. WDFIA 2011: 55-68 - [e2]Nathan L. Clarke, Theodore Tryfonas:
6th International Workshop on Digital Forensics and Incident Analysis, WDFIA 2011, London, UK, July 7-8, 2011. Proceedings. Plymouth University, UK 2011, ISBN 978-1-84102-285-7 [contents] - 2010
- [c13]Ioannis G. Askoxylakis, Theodore Tryfonas, John May, Apostolos Traganitis:
A Dynamic Key Agreement Mechanism for Mission Critical Mobile Ad Hoc Networking. MOBILIGHT 2010: 216-228 - [c12]Rhys Evans, Aggeliki Tsohou, Theo Tryfonas, Thea Morgan:
Engineering secure systems with ISO 26702 and 27001. SoSE 2010: 1-6
2000 – 2009
- 2009
- [j9]Martyn Styles, Theo Tryfonas:
Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users. Inf. Manag. Comput. Secur. 17(1): 44-52 (2009) - [j8]Pete Davies, Theodore Tryfonas:
A lightweight web-based vulnerability scanner for small-scale computer network security assessment. J. Netw. Comput. Appl. 32(1): 78-95 (2009) - [c11]Ioannis G. Askoxylakis, Konstantinos Markantonakis, Theodore Tryfonas, John May, Apostolos Traganitis:
A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks. MOBILIGHT 2009: 103-113 - [e1]Nathan L. Clarke, Theodore Tryfonas:
4th International Workshop on Digital Forensics and Incident Analysis, WDFIA 2009, Athens, Greece, June 25-26, 2009. Proceedings. Plymouth University, UK 2009, ISBN 978-1-84102-230-7 [contents] - 2008
- [j7]Theodore Tryfonas, Bob Kearney:
Standardising business application security assessments with pattern-driven audit automations. Comput. Stand. Interfaces 30(4): 262-270 (2008) - [j6]Bob Kearney, Theodore Tryfonas:
Security Patterns for Automated Continuous Auditing. Inf. Secur. J. A Glob. Perspect. 17(1): 13-25 (2008) - [c10]Wai Man To, Theodore Tryfonas, Dave W. Farthing:
Audit Log Unification and Review with Log Management Information Bases. DB&IS 2008: 180-191 - [c9]Martyn Styles, Theodore Tryfonas:
Cultivating an Atmosphere of Proactive Computer Security to Mitigate Limited End-User Awareness. HAISA 2008: 48-55 - [c8]Leonard Shand, Theodore Tryfonas:
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code. ISSA 2008: 1-18 - [c7]Ioannis G. Askoxylakis, Damien Sauveron, Constantinos Markantonakis, Theodore Tryfonas, Apostolos Traganitis:
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. SECURWARE 2008: 193-202 - 2007
- [j5]Olga Angelopoulou, Paula Thomas, Konstantinos Xynos, Theodore Tryfonas:
Online ID theft techniques, investigation and response. Int. J. Electron. Secur. Digit. Forensics 1(1): 76-88 (2007) - [j4]Theodore Tryfonas, Iain Sutherland, Ioannis Pompogiatzis:
Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples. Internet Res. 17(1): 61-87 (2007) - [c6]Paula Thomas, Theodore Tryfonas:
Hard-drive Disposal and Identity Fraud. SEC 2007: 461-466 - 2006
- [j3]Vivienne Mee, Theodore Tryfonas, Iain Sutherland:
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage. Digit. Investig. 3(3): 166-173 (2006) - 2005
- [c5]Theodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas:
Distribution of Offensive Material Over Computer Networks: A Research Agenda. ECIW 2005: 355-362 - 2004
- [j2]Vassilis Tsoumas, Theodore Tryfonas:
From risk analysis to effective security management: towards an automated approach. Inf. Manag. Comput. Secur. 12(1): 91-101 (2004) - 2003
- [b1]Theodore Tryfonas:
Η συμβολή οργανωσιακών εικόνων ασφαλείας πληροφοριακού συστήματος στην υλοποίηση ασφαλών πληροφοριακών συστημάτων. Athens University Economics and Business, Greece, 2003 - [c4]Theodore Tryfonas, Evangelos A. Kiountouzis:
Perceptions of Security Contributing to the Implementation of Secure IS. SEC 2003: 313-324 - 2002
- [c3]Theodore Tryfonas, Evangelos A. Kiountouzis:
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration. SEC 2002: 347-356 - 2001
- [j1]Theodore Tryfonas, Evangelos A. Kiountouzis, Angeliki Poulymenakou:
Embedding security practices in contemporary information systems development approaches. Inf. Manag. Comput. Secur. 9(4): 183-197 (2001) - [c2]Theodore Tryfonas, Evangelos A. Kiountouzis:
Security Concerns for Contemporary Development Practices: A Case Study. SEC 2001: 421-436 - 2000
- [c1]Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis:
A Qualitative Approach to Information Availability. SEC 2000: 37-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint