Dr Maria Papadaki
Profiles

Dr Maria Papadaki

Visiting Researcher

School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)

Maria can be contacted through arrangement with our Press Office, to speak to the media on these areas of expertise.
  • Information security
  • Computer security
  • Computer - intrusion detection
  • Computer-incident response

Key publications

Key publications are highlighted

Journals
Articles
Akinsanya OO, Papadaki M & Sun L 2019 'Towards a maturity model for health-care cloud security (M2HCS)' Information & Computer Security 28, (3) 321-345 , DOI
Furnell S, Millet K & Papadaki M 2019 'Fifteen years of phishing: can technology save us?' Computer Fraud & Security 2019, (7) 11-16 , DOI
Alharbi N, Papadaki M & Dowland P 2016 'The impact of security and its antecedents in behaviour intention of using e-government services' Behaviour and Information Technology 36, (6) 620-636 , DOI
Alsaiari H, Papadaki M, Haskell-Dowland P & Furnell SM 2016 'Graphical One-Time Password (GOTPass): A usability evaluation' Information Security Journal: A Global Perspective 25, (1-3) Publisher Site , DOI Open access
Jones KD, Tam K & Papadaki M 2016 'Threats and Impacts in Maritime Cyber Security' Engineering & Technology Reference Publisher Site Open access
Alsaiari H, Papadaki M, Dowland P & Furnell S 2015 'Secure Graphical One Time Password (GOTPass): An Empirical Study' Information Security Journal: A Global Perspective 24, (4-6) 207-220 , DOI
Furnell S, Emm D & Papadaki M 2015 'The challenge of measuring cyber-dependent crimes' Computer Fraud & Security 2015, (10) 5-12 , DOI
Kokolaki E, Karaliopoulos M, Kollias G, Papadaki M & Stavrakakis I 2014 'Vulnerability of opportunistic parking assistance systems to vehicular node selfishness' Computer Communications 48, 159-170 , DOI
Shiaeles SN & Papadaki M 2014 'FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks' The Computer Journal 58, (4) 892-903 , DOI Open access
Anuar NB, Papadaki M, Furnell S & Clarke N 2013 'A response selection model for intrusion response systems: Response Strategy Model (RSM)' SECURITY AND COMMUNICATION NETWORKS 7, (11) 1831-1848 Author Site , DOI
Li F, Clarke N, Papadaki M & Dowland P 2013 'Active authentication for mobile devices utilising behaviour profiling' INTERNATIONAL JOURNAL OF INFORMATION SECURITY 13, (3) 229-244 Author Site , DOI Open access
Anuar NB, Papadaki M, Furnell SM & Clarke N 2013 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks 6, (9) 1087-1116 , DOI
Anuar NB, Papadaki M, Furnell SM & Clarke N 2012 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks , DOI
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S 2012 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 Author Site , DOI
Anuar NB, Furnell S, Papadaki M & Clarke N 2011 'A risk index model for security incident prioritisation'
Magklaras G, Furnell S & Papadaki M 2011 'LUARM: An Audit Engine for Insider Misuse Detection' International Journal of Digital Crime and Forensics (IJDCF) 3, 37-49
Li F, Clarke N, Papadaki M & Dowland P 2011 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 Author Site , DOI
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and< i> K</i>-means algorithm' Computers & Security 29, 712-723
Sanders BG, Dowland P, Atkinson S, Zahra D, Furnell S & Papadaki M 2010 'Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments' J. Multim. Process. Technol. 1, 181-193
Karakasiliotis A, Furnell SM & Papadaki M 2007 'An assessment of end-user vulnerability to phishing attacks' Journal of Information Warfare 6, (1) 17-28
Preuß J, Furnell SM & Papadaki M 2007 'Considering the potential of criminal profiling to combat hacking' Journal in Computer Virology 3, 135-141
Papadaki M & Furnell SM 2006 'Achieving Automated Intrusion Response: A Prototype Implementation' Information Management & Computer Security 14, (3) 235-251
Papadaki M & Furnell S 2005 'Informing the decision process in an automated intrusion response system' Information Security Technical Report 10, (3) 150-161
Papadaki M & Furnell SM 2004 'IDS or IPS: what is best?' Network Security 7, 15-19
Papadaki M, Furnell SM, Lee SJ, Lines BM & Reynolds PL 2003 'Enhancing response in intrusion detection systems' Journal of Information Warfare 2, (1) 90-102
Irakleous I, Furnell SM, Dowland PS & Papadaki M 2002 'An experimental comparison of secret-based user authentication technologies' Information Management & Computer Security 10, (3) 100-108
Irakleous I, Furnell SM, Dowland PS & Papadaki M 2002 'An experimental comparison of secret-based user authentication technologies' Information Management and Computer Security 10, (2-3) 100-108 , DOI
Dowland PS, Papadaki M & Papadaki M 2002 'Keystroke analysis as a method of advanced user authentication and response' Security in the Information Society: Visions and Perspectives 86, 215-226
Papadaki M, Magklaras GB, Furnell SM & Alayed A 2001 'Security vulnerabilities and system intrusions-the need for automatic response frameworks' Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, Setembro de
Furnell SM, Papadaki M & Thomson KL 'Scare tactics – A viable weapon in the security war?' Computer Fraud & Security 2009, (12) 6-10
Bakhshi T, Papadaki M & Furnell SM 'Social engineering: assessing vulnerabilities in practice' Information Management and Computer Security 17, (1) 53-63
Furnell SM & Papadaki M 'Testing our defences or defending our tests: the obstacles to performing security assessment' Computer Fraud & Security 2008, (5) 8-12
Papadaki M & Furnell SM 'Vulnerability management: an attitude of mind?' Network Security 2010, (10) 4-8
Conference Papers
Tolah A, Furnell SM & Papadaki M 2019 'A Comprehensive Framework for Understanding Security Culture in Organizations' Springer International Publishing 143-156 , DOI
Akinsanya OO, Papadaki M & Sun L 2019 'Current cybersecurity maturity models: How effective in healthcare cloud?' 211-222
Ali M, Shiaeles S, Papadaki M & Ghita BV 2018 'Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis' 2018 Global Information Infrastructure and Networking Symposium (GIIS) 0-/-1/20180-/-1/2018IEEE , DOI Open access
Alotaibi F, Furnell S, Stengel I & Papadaki M 2017 'Enhancing cyber security awareness with mobile games' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20172-/-1/2017IEEE , DOI
Alotaibi F, Furnell S, Stengel I & Papadaki M 2016 'A survey of cyber-security awareness in Saudi Arabia' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20162-/-1/2016IEEE , DOI
Alharbi N, Papadaki M & Dowland P 2014 'Security challenges of E-government adoption based on end users' perspective' 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20142-/-1/2014IEEE , DOI
Alsaiari H, Papadaki M, Dowland PS & Furnell SM 2014 'Alternative graphical authentication for online banking environments' 122-136
Kokolaki E, Kollias G, Papadaki M, Karaliopoulos M & Stavrakakis I 2013 'Opportunistically-assisted parking search: A story of free riders, selfish liars and bona fide mules' 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS) 3-/-0/20133-/-0/2013IEEE , DOI
Kronawitter K, Wentzel C & Papadaki M 2013 'IT Application Outsourcing in Europe: Long-Term Outcomes, Success Factors and Implications for ITO Maturity' 2013 46th Hawaii International Conference on System Sciences (HICSS) 1-/-0/20131-/-0/2013IEEE , DOI
Smith A, Papadaki M & Furnell SM 2013 'Improving Awareness of Social Engineering Attacks' Springer Berlin Heidelberg 249-256 , DOI
Anuar N, Papadaki M, Furnell S & Clarke N 2012 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
Sercombe AA & Papadaki M 2012 'Education in the 'virtual' community: Can beating Malware Man teach users about social networking security?' 33-39
Li F, Clarke N, Papadaki M & Dowland P 2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 307-314
Anuar NB, Papadaki M, Furnell S & Clarke N 2010 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' 1-8
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2010 'Assessing the Usability of End-User Security Software' 177-189
Kronawitter K, Wentzel C & Papadaki M 2010 'ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success' 355-359
Sanders B, Chen V, Zahra D, Dowland P, Atkinson S, Papadaki M & Furnell S 2010 'Online addiction: privacy risks in online gaming environments' 114-121
Ibrahim T, Furnell S, Papadaki M & Clarke N 2009 'Assessing the Usability of Personal Internet Security Tools' 102-111
Helala M, Furnell SM & Papadaki M 2008 'Evaluating the usability impacts of security interface adjustments in Word 2007' 48-55
Bakhshi T, Papadaki M & Furnell S 2008 'A Practical Assessment of Social Engineering Vulnerabilities' Lulu. com 12-23
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'Investigating the problem of IDS false alarms: An experimental study using Snort' 253-267
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' 139-+
Papadaki M, Furnell S, Lines B & Reynolds P 2003 'Operational characteristics of an automated intrusion response system' 65-75
Papadaki M, Furnell S, Lines B & Reynolds P 2003 'Operational characteristics of an automated intrusion response system' 65-75
Papadaki M, Furnell SM, Lines BM & Reynolds PL 2002 'A Response-Orientated Taxomony of IT System Intrusions' in Roccetti M SCS Europe 87-95
Dowland P, Furnell S & Papadaki M 2002 'Keystroke Analysis as a Method of Advanced User Authentication and Response' in Ghonaimy A; El-Hadidi MT; Aslan HK Kluwer 215-226 Publisher Site
Papadaki M, Magklaras GB, Furnell SM & Alayed A 2001 'Security and System Intrusions - The need for Automatic Response Frameworks' in Eloff JHP; von Solms R; Dhillon G Kluwer Academic Publishers 87-97
Ytreberg JA & Papadaki M 'Investigating the Evasion Resilience of Network Intrusion Detection Systems' Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, UK, 7-/-0/20077-/-0/2007327-334

Links

Further information relating to research publications, professional activities, research interests etc., can be found at this web site.

Find out more about:

School of Engineering, Computing and Mathematics

BSc (Hons) Cyber Security