Dr Maria Papadaki
Profiles

Dr Maria Papadaki

Associate Professor of Cyber Security

School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)

Key publications are highlighted

Journals
Articles
Furnell S, Millet K & Papadaki M 2019 'Fifteen years of phishing: can technology save us?' Computer Fraud & Security 2019, (7) 11-16 , DOI
Alharbi N, Papadaki M & Dowland P 2016 'The impact of security and its antecedents in behaviour intention of using e-government services' Behaviour and Information Technology 36, (6) 620-636 , DOI
Alsaiari H, Papadaki M, Haskell-Dowland P & Furnell SM 2016 'Graphical One-Time Password (GOTPass): A usability evaluation' Information Security Journal: A Global Perspective 25, (1-3) Publisher Site , DOI PEARL
Jones KD, Tam K & Papadaki M 2016 'Threats and Impacts in Maritime Cyber Security' Engineering & Technology Reference Publisher Site PEARL
Alsaiari H, Papadaki M, Dowland P & Furnell S 2015 'Secure Graphical One Time Password (GOTPass): An Empirical Study' Information Security Journal: A Global Perspective 24, (4-6) 207-220 , DOI
Furnell S, Emm D & Papadaki M 2015 'The challenge of measuring cyber-dependent crimes' Computer Fraud & Security 2015, (10) 5-12 , DOI
Kokolaki E, Karaliopoulos M, Kollias G, Papadaki M & Stavrakakis I 2014 'Vulnerability of opportunistic parking assistance systems to vehicular node selfishness' Computer Communications 48, 159-170 , DOI
Shiaeles SN & Papadaki M 2014 'FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks' The Computer Journal 58, (4) 892-903 , DOI PEARL
Anuar NB, Papadaki M, Furnell S & Clarke N 2013 'A response selection model for intrusion response systems: Response Strategy Model (RSM)' SECURITY AND COMMUNICATION NETWORKS 7, (11) 1831-1848 Author Site , DOI
Li F, Clarke N, Papadaki M & Dowland P 2013 'Active authentication for mobile devices utilising behaviour profiling' INTERNATIONAL JOURNAL OF INFORMATION SECURITY 13, (3) 229-244 Author Site , DOI PEARL
Anuar NB, Papadaki M, Furnell SM & Clarke N 2013 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks 6, (9) 1087-1116 , DOI
Anuar NB, Papadaki M, Furnell SM & Clarke N 2012 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks , DOI
Anuar NB, Furnell S, Papadaki M & Clarke N 2011 'A risk index model for security incident prioritisation'
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S 2011 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 Author Site , DOI
Magklaras G, Furnell S & Papadaki M 2011 'LUARM: An Audit Engine for Insider Misuse Detection' International Journal of Digital Crime and Forensics (IJDCF) 3, 37-49
Li F, Clarke N, Papadaki M & Dowland P 2011 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 Author Site , DOI
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and< i> K</i>-means algorithm' Computers & Security 29, 712-723
Anuar NB, Papadaki M, Furnell S & Clarke N 2010 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' Information Security for South Africa (ISSA) 2010, 1-8
Sanders BG, Dowland P, Atkinson S, Zahra D, Furnell S & Papadaki M 2010 'Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments' JMPT 1, 181-193
Karakasiliotis A, Furnell SM & Papadaki M 2007 'An assessment of end-user vulnerability to phishing attacks' Journal of Information Warfare 6, (1) 17-28
Preuß J, Furnell SM & Papadaki M 2007 'Considering the potential of criminal profiling to combat hacking' Journal in Computer Virology 3, 135-141
Papadaki M & Furnell SM 2006 'Achieving Automated Intrusion Response: A Prototype Implementation' Information Management & Computer Security 14, (3) 235-251
Papadaki M & Furnell S 2005 'Informing the decision process in an automated intrusion response system' Information Security Technical Report 10, (3) 150-161
Papadaki M & Furnell SM 2004 'IDS or IPS: what is best?' Network Security 7, 15-19
Papadaki M, Furnell SM, Lee SJ, Lines BM & Reynolds PL 2003 'Enhancing response in intrusion detection systems' Journal of Information Warfare 2, (1) 90-102
Irakleous I, Furnell SM, Dowland PS & Papadaki M 2002 'An experimental comparison of secret-based user authentication technologies' Information Management & Computer Security 10, (3) 100-108
Irakleous I, Furnell SM, Dowland PS & Papadaki M 2002 'An experimental comparison of secret-based user authentication technologies' Information Management and Computer Security 10, (2-3) 100-108
Dowland PS, Papadaki M & Papadaki M 2002 'Keystroke analysis as a method of advanced user authentication and response' Security in the Information Society: Visions and Perspectives 86, 215-226
Papadaki M, Magklaras GB, Furnell SM & Alayed A 2001 'Security vulnerabilities and system intrusions-the need for automatic response frameworks' Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, Setembro de
Furnell SM, Papadaki M & Thomson KL 0 'Scare tactics – A viable weapon in the security war?' Computer Fraud & Security 2009, (12) 6-10
Bakhshi T, Papadaki M & Furnell SM 0 'Social engineering: assessing vulnerabilities in practice' Information Management and Computer Security 17, (1) 53-63
Furnell SM & Papadaki M 0 'Testing our defences or defending our tests: the obstacles to performing security assessment' Computer Fraud & Security 2008, (5) 8-12
Papadaki M & Furnell SM 0 'Vulnerability management: an attitude of mind?' Network Security 2010, (10) 4-8
Conference Papers
Tolah A, Furnell SM & Papadaki M 2019 'A Comprehensive Framework for Understanding Security Culture in Organizations' Springer International Publishing 143-156 , DOI
Akinsanya OO, Papadaki M & Sun L 2019 'Current cybersecurity maturity models: How effective in healthcare cloud?' 211-222
Ali M, Shiaeles S, Papadaki M & Ghita BV 2018 'Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis' 2018 Global Information Infrastructure and Networking Symposium (GIIS) 23/10/2018 25/10/2018 IEEE , DOI PEARL
Alotaibi F, Furnell S, Stengel I & Papadaki M 2017 'Enhancing cyber security awareness with mobile games' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 11/12/2017 14/12/2017 IEEE , DOI
Alotaibi F, Furnell S, Stengel I & Papadaki M 2016 'A survey of cyber-security awareness in Saudi Arabia' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 05/12/2016 07/12/2016 IEEE , DOI
Alharbi N, Papadaki M & Dowland P 2014 'Security challenges of E-government adoption based on end users' perspective' 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST) 08/12/2014 10/12/2014 IEEE , DOI
Alsaiari H, Papadaki M, Dowland PS & Furnell SM 2014 'Alternative graphical authentication for online banking environments' 122-136
Kokolaki E, Kollias G, Papadaki M, Karaliopoulos M & Stavrakakis I 2013 'Opportunistically-assisted parking search: A story of free riders, selfish liars and bona fide mules' 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS) 18/03/2013 20/03/2013 IEEE , DOI
Kronawitter K, Wentzel C & Papadaki M 2013 'IT Application Outsourcing in Europe: Long-Term Outcomes, Success Factors and Implications for ITO Maturity' 2013 46th Hawaii International Conference on System Sciences (HICSS) 07/01/2013 10/01/2013 IEEE , DOI
Smith A, Papadaki M & Furnell SM 2013 'Improving Awareness of Social Engineering Attacks' Springer Berlin Heidelberg 249-256 , DOI
Anuar N, Papadaki M, Furnell S & Clarke N 2012 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
Sercombe AA & Papadaki M 2012 'Education in the 'virtual' community: Can beating Malware Man teach users about social networking security?' 33-39
Li F, Clarke N, Papadaki M & Dowland P 2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 307-314
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2010 'Assessing the Usability of End-User Security Software' 177-189
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2010 'Investigating the problem of IDS false alarms: An experimental study using Snort' 253-267
Kronawitter K, Wentzel C & Papadaki M 2010 'ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success' 355-359
Sanders B, Chen V, Zahra D, Dowland P, Atkinson S, Papadaki M & Furnell S 2010 'Online addiction: privacy risks in online gaming environments' 114-121
Ibrahim T, Furnell S, Papadaki M & Clarke N 2009 'Assessing the Usability of Personal Internet Security Tools' 102-111
Helala M, Furnell SM & Papadaki M 2008 'Evaluating the usability impacts of security interface adjustments in Word 2007' 48-55
Bakhshi T, Papadaki M & Furnell S 2008 'A Practical Assessment of Social Engineering Vulnerabilities' Lulu. com 12-23
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' 139-+
Papadaki M, Furnell S, Lines B & Reynolds P 2003 'Operational characteristics of an automated intrusion response system' 65-75
Papadaki M, Furnell S, Lines B & Reynolds P 2003 'Operational characteristics of an automated intrusion response system' 65-75
Papadaki M, Furnell SM, Lines BM & Reynolds PL 2002 'A Response-Orientated Taxomony of IT System Intrusions' Roccetti M SCS Europe 87-95
Dowland P, Furnell S & Papadaki M 2002 'Keystroke Analysis as a Method of Advanced User Authentication and Response' Ghonaimy A; El-Hadidi MT; Aslan HK Kluwer 215-226 Publisher Site
Papadaki M, Magklaras GB, Furnell SM & Alayed A 2001 'Security and System Intrusions - The need for Automatic Response Frameworks' Eloff JHP; von Solms R; Dhillon G Kluwer Academic Publishers 87-97
Ytreberg JA & Papadaki M 0 'Investigating the Evasion Resilience of Network Intrusion Detection Systems' Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, UK, 02/07/2007 03/07/2007 327-334

Links

Further information relating to research publications, professional activities, research interests etc., can be found at this web site.

Find out more about:

School of Engineering, Computing and Mathematics

BSc(Hons) Computer and Information Security

MSc Computer and Information Security