default search action
Ioannis Agrafiotis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Louise Axon, Arnau Erola, Ioannis Agrafiotis, Ganbayar Uuganbayar, Michael Goldsmith, Sadie Creese:
Ransomware as a Predator: Modelling the Systemic Risk to Prey. DTRAP 4(4): 55:1-55:38 (2023) - 2022
- [j14]Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. Comput. Secur. 113: 102545 (2022) - [j13]Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations. J. Inf. Secur. Appl. 67: 103167 (2022) - 2021
- [j12]Jassim Happa, Ioannis Agrafiotis, Martin Helmhout, Thomas Bashford-Rogers, Michael Goldsmith, Sadie Creese:
Assessing a Decision Support Tool for SOC Analysts. DTRAP 2(3): 22:1-22:35 (2021) - [j11]Ioannis Agrafiotis, Gökhan Kul:
Guest Editorial: Special Issue on Advances in Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 1-2 (2021) - [j10]Alexander Walls, Ioannis Agrafiotis:
A Bayesian approach to insider threat detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 48-84 (2021) - [c25]Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Control Effectiveness: a Capture-the-Flag Study. ARES 2021: 87:1-87:10 - 2020
- [j9]Georgios Giasemidis, Nikolaos Kaplis, Ioannis Agrafiotis, Jason R. C. Nurse:
A Semi-Supervised Approach to Message Stance Classification. IEEE Trans. Knowl. Data Eng. 32(1): 1-11 (2020) - [c24]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CyberSA 2020: 1-8 - [i7]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CoRR abs/2008.04713 (2020)
2010 – 2019
- 2019
- [j8]Jassim Happa, Thomas Bashford-Rogers, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Anomaly Detection Using Pattern-of-Life Visual Metaphors. IEEE Access 7: 154018-154034 (2019) - [c23]Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Analysing cyber-insurance claims to design harm-propagation trees. CyberSA 2019: 1-4 - [c22]Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa. ICISSP 2019: 75-87 - [c21]Mary K. Bispham, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith:
Black-Box Attacks via the Speech Interface Using Linguistically Crafted Input. ICISSP (Revised Selected Papers) 2019: 93-120 - [c20]Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms. ICISSP (Revised Selected Papers) 2019: 288-316 - [c19]Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
Attack and Defence Modelling for Attacks via the Speech Interface. ICISSP 2019: 519-527 - [c18]Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse:
Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs). WISA 2019: 219-233 - [i6]Georgios Giasemidis, Nikolaos Kaplis, Ioannis Agrafiotis, Jason R. C. Nurse:
A semi-supervised approach to message stance classification. CoRR abs/1902.03097 (2019) - [i5]Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse:
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs). CoRR abs/1908.03640 (2019) - [i4]Maria Bada, Basie von Solms, Ioannis Agrafiotis:
Reviewing National Cybersecurity Awareness for Users and Executives in Africa. CoRR abs/1910.01005 (2019) - 2018
- [j7]Ioannis Agrafiotis, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, David Upton:
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1): tyy006 (2018) - [j6]Charlie Kingston, Jason R. C. Nurse, Ioannis Agrafiotis, Andrew Milich:
Using semantic clustering to support situation awareness on Twitter: the case of world views. Hum. centric Comput. Inf. Sci. 8: 22 (2018) - [j5]Cheyenne Atapour, Ioannis Agrafiotis, Sadie Creese:
Modeling Advanced Persistent Threats to enhance anomaly detection techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(4): 71-102 (2018) - [c17]Olusola Akinrolabu, Ioannis Agrafiotis, Arnau Erola:
The challenge of detecting sophisticated attacks: Insights from SOC Analysts. ARES 2018: 55:1-55:9 - [c16]Haozhe Zhang, Ioannis Agrafiotis, Arnau Erola, Sadie Creese, Michael Goldsmith:
A State Machine System for Insider Threat Detection. GraMSec@FLoC 2018: 111-129 - [i3]Charlie Kingston, Jason R. C. Nurse, Ioannis Agrafiotis, Andrew Milich:
Using semantic clustering to support situation awareness on Twitter: The case of World Views. CoRR abs/1807.06588 (2018) - [i2]Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
Nonsense Attacks on Google Assistant. CoRR abs/1808.01947 (2018) - 2017
- [j4]Daniel W. Woods, Ioannis Agrafiotis, Jason R. C. Nurse, Sadie Creese:
Mapping the coverage of security controls in cyber insurance proposal forms. J. Internet Serv. Appl. 8(1): 8:1-8:13 (2017) - [j3]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
Formalising Policies for Insider-threat Detection: A Tripwire Grammar. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 26-43 (2017) - [c15]Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, Philip A. Legg:
RicherPicture: Semi-automated cyber defence using context-aware data analytics. CyberSA 2017: 1-8 - [c14]Jason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese:
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. HCI (22) 2017: 366-383 - 2016
- [c13]Tabish Rashid, Ioannis Agrafiotis, Jason R. C. Nurse:
A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models. MIST@CCS 2016: 47-56 - [c12]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
A Tripwire Grammar for Insider Threat Detection. MIST@CCS 2016: 105-108 - [c11]Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
A Pragmatic System-failure Assessment and Response Model. ICISSP 2016: 503-508 - [c10]Georgios Giasemidis, Colin Singleton, Ioannis Agrafiotis, Jason R. C. Nurse, Alan Pilgrim, Chris Willis, Danica Vukadinovic Greetham:
Determining the Veracity of Rumours on Twitter. SocInfo (1) 2016: 185-205 - [c9]Ioannis Agrafiotis, Arnau Erola, Jassim Happa, Michael Goldsmith, Sadie Creese:
Validating an Insider Threat Detection System: A Real Scenario Perspective. IEEE Symposium on Security and Privacy Workshops 2016: 286-295 - [i1]Georgios Giasemidis, Colin Singleton, Ioannis Agrafiotis, Jason R. C. Nurse, Alan Pilgrim, Chris Willis, Danica Vukadinovic Greetham:
Determining the Veracity of Rumours on Twitter. CoRR abs/1611.06314 (2016) - 2015
- [c8]Jason R. C. Nurse, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things. SIoT 2015: 5-14 - 2014
- [j2]Ioannis Agrafiotis, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. J. Internet Serv. Inf. Secur. 4(4): 127-137 (2014) - [c7]Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. HCI (24) 2014: 270-281 - 2013
- [j1]Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 20-37 (2013) - [c6]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Communicating trustworthiness using radar graphs: A detailed look. PST 2013: 333-339 - [c5]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Building Confidence in Information-Trustworthiness Metrics for Decision Support. TrustCom/ISPA/IUCC 2013: 535-543 - 2011
- [c4]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Developing a Strategy for Automated Privacy Testing Suites. PrimeLife 2011: 32-44 - [c3]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation. PrimeLife 2011: 232-244 - 2010
- [c2]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements. PrimeLife 2010: 271-282
2000 – 2009
- 2009
- [c1]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data. PrimeLife 2009: 246-258
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint