Dr Maria Papadaki
Profiles

Dr Maria Papadaki

Visiting Researcher

Discretionary Member

Maria can be contacted through arrangement with our Press Office, to speak to the media on these areas of expertise.
  • Information security
  • Computer security
  • Computer - intrusion detection
  • Computer-incident response

Key publications

Key publications are highlighted

Journals
Articles
Akinsanya OO, Papadaki M & Sun L 2019 'Towards a maturity model for health-care cloud security (M2HCS)' Information & Computer Security 28, (3) 321-345 , DOI
Furnell S, Millet K & Papadaki M 2019 'Fifteen years of phishing: can technology save us?' Computer Fraud & Security 2019, (7) 11-16 , DOI
Alharbi N, Papadaki M & Dowland P 2016 'The impact of security and its antecedents in behaviour intention of using e-government services' Behaviour and Information Technology 36, (6) 620-636 , DOI
Alsaiari H, Papadaki M, Haskell-Dowland P & Furnell SM 2016 'Graphical One-Time Password (GOTPass): A usability evaluation' Information Security Journal: A Global Perspective 25, (1-3) Publisher Site , DOI PEARL
Jones KD, Tam K & Papadaki M 2016 'Threats and Impacts in Maritime Cyber Security' Engineering & Technology Reference Publisher Site PEARL
Alsaiari H, Papadaki M, Dowland P & Furnell S 2015 'Secure Graphical One Time Password (GOTPass): An Empirical Study' Information Security Journal: A Global Perspective 24, (4-6) 207-220 , DOI
Furnell S, Emm D & Papadaki M 2015 'The challenge of measuring cyber-dependent crimes' Computer Fraud & Security 2015, (10) 5-12 , DOI
Kokolaki E, Karaliopoulos M, Kollias G, Papadaki M & Stavrakakis I 2014 'Vulnerability of opportunistic parking assistance systems to vehicular node selfishness' Computer Communications 48, 159-170 , DOI
Shiaeles SN & Papadaki M 2014 'FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks' The Computer Journal 58, (4) 892-903 , DOI PEARL
Anuar NB, Papadaki M, Furnell S & Clarke N 2013 'A response selection model for intrusion response systems: Response Strategy Model (RSM)' SECURITY AND COMMUNICATION NETWORKS 7, (11) 1831-1848 Author Site , DOI
Li F, Clarke N, Papadaki M & Dowland P 2013 'Active authentication for mobile devices utilising behaviour profiling' INTERNATIONAL JOURNAL OF INFORMATION SECURITY 13, (3) 229-244 Author Site , DOI PEARL
Anuar NB, Papadaki M, Furnell SM & Clarke N 2013 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks 6, (9) 1087-1116 , DOI
Anuar NB, Papadaki M, Furnell SM & Clarke N 2012 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks , DOI
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S 2012 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 Author Site , DOI
Anuar NB, Furnell S, Papadaki M & Clarke N 2011 'A risk index model for security incident prioritisation'
Magklaras G, Furnell S & Papadaki M 2011 'LUARM: An Audit Engine for Insider Misuse Detection' International Journal of Digital Crime and Forensics (IJDCF) 3, 37-49
Li F, Clarke N, Papadaki M & Dowland P 2011 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 Author Site , DOI
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and< i> K</i>-means algorithm' Computers & Security 29, 712-723
Sanders BG, Dowland P, Atkinson S, Zahra D, Furnell S & Papadaki M 2010 'Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments' J. Multim. Process. Technol. 1, 181-193
Karakasiliotis A, Furnell SM & Papadaki M 2007 'An assessment of end-user vulnerability to phishing attacks' Journal of Information Warfare 6, (1) 17-28
Preuß J, Furnell SM & Papadaki M 2007 'Considering the potential of criminal profiling to combat hacking' Journal in Computer Virology 3, 135-141
Papadaki M & Furnell SM 2006 'Achieving Automated Intrusion Response: A Prototype Implementation' Information Management & Computer Security 14, (3) 235-251
Papadaki M & Furnell S 2005 'Informing the decision process in an automated intrusion response system' Information Security Technical Report 10, (3) 150-161
Papadaki M & Furnell SM 2004 'IDS or IPS: what is best?' Network Security 7, 15-19
Papadaki M, Furnell SM, Lee SJ, Lines BM & Reynolds PL 2003 'Enhancing response in intrusion detection systems' Journal of Information Warfare 2, (1) 90-102
Irakleous I, Furnell SM, Dowland PS & Papadaki M 2002 'An experimental comparison of secret-based user authentication technologies' Information Management & Computer Security 10, (3) 100-108
Irakleous I, Furnell SM, Dowland PS & Papadaki M 2002 'An experimental comparison of secret-based user authentication technologies' Information Management and Computer Security 10, (2-3) 100-108 , DOI
Dowland PS, Papadaki M & Papadaki M 2002 'Keystroke analysis as a method of advanced user authentication and response' Security in the Information Society: Visions and Perspectives 86, 215-226
Papadaki M, Magklaras GB, Furnell SM & Alayed A 2001 'Security vulnerabilities and system intrusions-the need for automatic response frameworks' Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, Setembro de
Furnell SM, Papadaki M & Thomson KL 0 'Scare tactics – A viable weapon in the security war?' Computer Fraud & Security 2009, (12) 6-10
Bakhshi T, Papadaki M & Furnell SM 0 'Social engineering: assessing vulnerabilities in practice' Information Management and Computer Security 17, (1) 53-63
Furnell SM & Papadaki M 0 'Testing our defences or defending our tests: the obstacles to performing security assessment' Computer Fraud & Security 2008, (5) 8-12
Papadaki M & Furnell SM 0 'Vulnerability management: an attitude of mind?' Network Security 2010, (10) 4-8
Conference Papers
Tolah A, Furnell SM & Papadaki M 2019 'A Comprehensive Framework for Understanding Security Culture in Organizations' 1-/-0/19001-/-0/1900Springer International Publishing 143-156 , DOI
Akinsanya OO, Papadaki M & Sun L 2019 'Current cybersecurity maturity models: How effective in healthcare cloud?' 1-/-0/19001-/-0/1900211-222
Ali M, Shiaeles S, Papadaki M & Ghita BV 2018 'Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis' 2018 Global Information Infrastructure and Networking Symposium (GIIS) 0-/-1/20180-/-1/2018IEEE , DOI PEARL
Alotaibi F, Furnell S, Stengel I & Papadaki M 2017 'Enhancing cyber security awareness with mobile games' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20172-/-1/2017IEEE , DOI
Alotaibi F, Furnell S, Stengel I & Papadaki M 2016 'A survey of cyber-security awareness in Saudi Arabia' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20162-/-1/2016IEEE , DOI
Alharbi N, Papadaki M & Dowland P 2014 'Security challenges of E-government adoption based on end users' perspective' 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20142-/-1/2014IEEE , DOI
Alsaiari H, Papadaki M, Dowland PS & Furnell SM 2014 'Alternative graphical authentication for online banking environments' 1-/-0/19001-/-0/1900122-136
Kokolaki E, Kollias G, Papadaki M, Karaliopoulos M & Stavrakakis I 2013 'Opportunistically-assisted parking search: A story of free riders, selfish liars and bona fide mules' 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS) 3-/-0/20133-/-0/2013IEEE , DOI
Kronawitter K, Wentzel C & Papadaki M 2013 'IT Application Outsourcing in Europe: Long-Term Outcomes, Success Factors and Implications for ITO Maturity' 2013 46th Hawaii International Conference on System Sciences (HICSS) 1-/-0/20131-/-0/2013IEEE , DOI
Smith A, Papadaki M & Furnell SM 2013 'Improving Awareness of Social Engineering Attacks' 1-/-0/19001-/-0/1900Springer Berlin Heidelberg 249-256 , DOI
Anuar N, Papadaki M, Furnell S & Clarke N 2012 'A Response Strategy Model for Intrusion Response Systems' 1-/-0/19001-/-0/1900Springer Boston 573-578
Sercombe AA & Papadaki M 2012 'Education in the 'virtual' community: Can beating Malware Man teach users about social networking security?' 1-/-0/19001-/-0/190033-39
Li F, Clarke N, Papadaki M & Dowland P 2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 1-/-0/19001-/-0/1900307-314
Anuar NB, Papadaki M, Furnell S & Clarke N 2010 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' 1-/-0/19001-/-0/19001-8
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2010 'Assessing the Usability of End-User Security Software' 1-/-0/19001-/-0/1900177-189
Kronawitter K, Wentzel C & Papadaki M 2010 'ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success' 1-/-0/19001-/-0/1900355-359
Sanders B, Chen V, Zahra D, Dowland P, Atkinson S, Papadaki M & Furnell S 2010 'Online addiction: privacy risks in online gaming environments' 1-/-0/19001-/-0/1900114-121
Ibrahim T, Furnell S, Papadaki M & Clarke N 2009 'Assessing the Usability of Personal Internet Security Tools' 1-/-0/19001-/-0/1900102-111
Helala M, Furnell SM & Papadaki M 2008 'Evaluating the usability impacts of security interface adjustments in Word 2007' 1-/-0/19001-/-0/190048-55
Bakhshi T, Papadaki M & Furnell S 2008 'A Practical Assessment of Social Engineering Vulnerabilities' 1-/-0/19001-/-0/1900Lulu. com 12-23
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'Investigating the problem of IDS false alarms: An experimental study using Snort' 1-/-0/19001-/-0/1900253-267
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' 1-/-0/19001-/-0/1900139-+
Papadaki M, Furnell S, Lines B & Reynolds P 2003 'Operational characteristics of an automated intrusion response system' 1-/-0/19001-/-0/190065-75
Papadaki M, Furnell S, Lines B & Reynolds P 2003 'Operational characteristics of an automated intrusion response system' 1-/-0/19001-/-0/190065-75
Papadaki M, Furnell SM, Lines BM & Reynolds PL 2002 'A Response-Orientated Taxomony of IT System Intrusions' in Roccetti M 1-/-0/19001-/-0/1900SCS Europe 87-95
Dowland P, Furnell S & Papadaki M 2002 'Keystroke Analysis as a Method of Advanced User Authentication and Response' in Ghonaimy A; El-Hadidi MT; Aslan HK 1-/-0/19001-/-0/1900Kluwer 215-226 Publisher Site
Papadaki M, Magklaras GB, Furnell SM & Alayed A 2001 'Security and System Intrusions - The need for Automatic Response Frameworks' in Eloff JHP; von Solms R; Dhillon G 1-/-0/19001-/-0/1900Kluwer Academic Publishers 87-97
Ytreberg JA & Papadaki M 0 'Investigating the Evasion Resilience of Network Intrusion Detection Systems' Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, UK, 7-/-0/20077-/-0/2007327-334

Links

Further information relating to research publications, professional activities, research interests etc., can be found at this web site.

Find out more about:

School of Engineering, Computing and Mathematics

BSc (Hons) Cyber Security