Recent publications
Book
Andriotis, P, Li, S, Spyridopoulos, T & Stringhini, G 2017, A comparative study of android users’ privacy preferences under the runtime permission model. https://doi.org/10.1007/978-3-319-58460-7_42
Anastasopoulou, K, Kokolakis, S & Andriotis, P 2017, Privacy decision-making in the digital era: A game theoretic review. https://doi.org/10.1007/978-3-319-58460-7_41
Article
McCarthy, A, Ghadafi, E, Andriotis, P & Legg, P 2023, 'Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification', Journal of Information Security and Applications, vol. 72, 103398. https://doi.org/10.1016/j.jisa.2022.103398
Nemorin, S, Vlachidis, A, Ayerakwa, HM & Andriotis, P 2022, 'AI hyped? A horizon scan of discourse on artificial intelligence in education (AIED) and development', Learning, Media and Technology. https://doi.org/10.1080/17439884.2022.2095568
Andriotis, P, Kirby, M & Takasu, A 2022, 'Bu-Dash: a universal and dynamic graphical password scheme (extended version)', International Journal of Information Security. https://doi.org/10.1007/s10207-022-00642-2
McCarthy, A, Ghadafi, E, Andriotis, P & Legg, P 2022, 'Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: a survey', Journal of Cybersecurity and Privacy, vol. 2, no. 1, pp. 154-190. https://doi.org/10.3390/jcp2010010
Li, S, Zhao, S, Yang, P, Andriotis, P, Xu, L & Sun, Q 2019, 'Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems', IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2019.2906157
Onwuzurike, L, Mariconti, E, Andriotis, P, Cristofaro, ED, Ross, G & Stringhini, G 2019, 'MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)', ACM Transactions on Privacy and Security, vol. 22, no. 2. https://doi.org/10.1145/3313391
Andriotis, P, Stringhini, G & Sasse, MA 2018, 'Studying users’ adaptation to Android’s run-time fine-grained access control system', Journal of Information Security and Applications. https://doi.org/10.1016/j.jisa.2018.02.004
Chapter
Andriotis, P & Takasu, A 2020, To Allow, or Deny? That is the Question. in Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-030-50309-3_20
Conference contribution
Andriotis, P, Kirby, M & Takasu, A 2022, Bu-Dash: A Universal and Dynamic Graphical Password Scheme. in A Moallem (ed.), HCI for Cybersecurity, Privacy and Trust : 4th International Conference, HCI-CPT 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Proceedings. Lecture Notes in Computer Science, vol. 13333, Springer, pp. 209-227. https://doi.org/10.1007/978-3-031-05563-8_14
McCarthy, A, Andriotis, P, Ghadafi, E & Legg, P 2021, Feature vulnerability and robustness assessment against adversarial machine learning attacks. in 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)., 9478199, IEEE, 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, 14/06/21. https://doi.org/10.1109/CyberSA52016.2021.9478199
Andriotis, P & Takasu, A 2018, Emotional Bots: Content-based Spammer Detection on Social Media. in 2018 IEEE International Workshop on Information Forensics and Security (WIFS). pp. 1-8. https://doi.org/10.1109/WIFS.2018.8630760
Mariconti, E, Onwuzurike, L, Andriotis, P, Cristofaro, ED, Ross, GJ & Stringhini, G 2017, MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. in 24th Network and Distributed System Security Symposium (NDSS 2017). pp. 1-15. https://doi.org/10.14722/ndss.2017.23353
Andriotis, P, Sasse, MA & Stringhini, G 2017, Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. in 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016. https://doi.org/10.1109/WIFS.2016.7823922
View all publications in research portal