- A328, Portland Square, Drake Circus, Plymouth, PL4 8AA
- +44 1752 586260
- maria.papadaki@plymouth.ac.uk

Profiles
Dr Maria Papadaki
Visiting Researcher
School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)
Maria can be contacted through arrangement with our Press Office, to speak to the media on these areas of expertise.
- Information security
- Computer security
- Computer - intrusion detection
- Computer-incident response
Email publicrelations@plymouth.ac.uk to enquire.
Key publications
Key publications are highlighted
Journals
Articles
2019 'Towards a maturity model for health-care cloud security (M2HCS)' Information & Computer Security 28, (3) 321-345 , DOI
2019 'Fifteen years of phishing: can technology save us?' Computer Fraud & Security 2019, (7) 11-16 , DOI
2016 'The impact of security and its antecedents in behaviour intention of using e-government services' Behaviour and Information Technology 36, (6) 620-636 , DOI
2016 'Graphical One-Time Password (GOTPass): A usability evaluation' Information Security Journal: A Global Perspective 25, (1-3) Publisher Site , DOI Open access
2016 'Threats and Impacts in Maritime Cyber Security' Engineering & Technology Reference Publisher Site Open access
2015 'Secure Graphical One Time Password (GOTPass): An Empirical Study' Information Security Journal: A Global Perspective 24, (4-6) 207-220 , DOI
2015 'The challenge of measuring cyber-dependent crimes' Computer Fraud & Security 2015, (10) 5-12 , DOI
2014 'Vulnerability of opportunistic parking assistance systems to vehicular node selfishness' Computer Communications 48, 159-170 , DOI
2014 'FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks' The Computer Journal 58, (4) 892-903 , DOI Open access
2013 'A response selection model for intrusion response systems: Response Strategy Model (RSM)' SECURITY AND COMMUNICATION NETWORKS 7, (11) 1831-1848 , DOI
2013 'Active authentication for mobile devices utilising behaviour profiling' INTERNATIONAL JOURNAL OF INFORMATION SECURITY 13, (3) 229-244 , DOI Open access
2013 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks 6, (9) 1087-1116 , DOI
2012 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks , DOI
2012 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 , DOI
2011 'A risk index model for security incident prioritisation'
2011 'LUARM: An Audit Engine for Insider Misuse Detection' International Journal of Digital Crime and Forensics (IJDCF) 3, 37-49
2011 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 , DOI
2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and< i> K</i>-means algorithm' Computers & Security 29, 712-723
2010 'Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments' J. Multim. Process. Technol. 1, 181-193
2007 'An assessment of end-user vulnerability to phishing attacks' Journal of Information Warfare 6, (1) 17-28
2007 'Considering the potential of criminal profiling to combat hacking' Journal in Computer Virology 3, 135-141
2006 'Achieving Automated Intrusion Response: A Prototype Implementation' Information Management & Computer Security 14, (3) 235-251
2005 'Informing the decision process in an automated intrusion response system' Information Security Technical Report 10, (3) 150-161
2004 'IDS or IPS: what is best?' Network Security 7, 15-19
2003 'Enhancing response in intrusion detection systems' Journal of Information Warfare 2, (1) 90-102
2002 'An experimental comparison of secret-based user authentication technologies' Information Management & Computer Security 10, (3) 100-108
2002 'An experimental comparison of secret-based user authentication technologies' Information Management and Computer Security 10, (2-3) 100-108 , DOI
2002 'Keystroke analysis as a method of advanced user authentication and response' Security in the Information Society: Visions and Perspectives 86, 215-226
2001 'Security vulnerabilities and system intrusions-the need for automatic response frameworks' Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, Setembro de
'Scare tactics – A viable weapon in the security war?' Computer Fraud & Security 2009, (12) 6-10
'Social engineering: assessing vulnerabilities in practice' Information Management and Computer Security 17, (1) 53-63
'Testing our defences or defending our tests: the obstacles to performing security assessment' Computer Fraud & Security 2008, (5) 8-12
'Vulnerability management: an attitude of mind?' Network Security 2010, (10) 4-8
Conference Papers
2020 'Towards a Cross-Cultural Education Framework for Online Safety Awareness' Springer International Publishing 47-57 , DOI
2019 'A Comprehensive Framework for Understanding Security Culture in Organizations' Springer International Publishing 143-156 , DOI
2019 'Current cybersecurity maturity models: How effective in healthcare cloud?' 211-222
2018 'Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis' 2018 Global Information Infrastructure and Networking Symposium (GIIS) 0-/-1/20180-/-1/2018IEEE , DOI Open access
2017 'Enhancing cyber security awareness with mobile games' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20172-/-1/2017IEEE , DOI
2016 'A survey of cyber-security awareness in Saudi Arabia' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20162-/-1/2016IEEE , DOI
2014 'Security challenges of E-government adoption based on end users' perspective' 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20142-/-1/2014IEEE , DOI
2014 'Alternative graphical authentication for online banking environments' 122-136
2013 'Opportunistically-assisted parking search: A story of free riders, selfish liars and bona fide mules' 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS) 3-/-0/20133-/-0/2013IEEE , DOI
2013 'IT Application Outsourcing in Europe: Long-Term Outcomes, Success Factors and Implications for ITO Maturity' 2013 46th Hawaii International Conference on System Sciences (HICSS) 1-/-0/20131-/-0/2013IEEE , DOI
2012 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
2012 'Education in the 'virtual' community: Can beating Malware Man teach users about social networking security?' 33-39
2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 307-314
2010 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' 1-8
2010 'Assessing the Usability of End-User Security Software' 177-189
2010 'ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success' 355-359
2010 'Online addiction: privacy risks in online gaming environments' 114-121
2009 'Assessing the Usability of Personal Internet Security Tools' 102-111
2008 'Evaluating the usability impacts of security interface adjustments in Word 2007' 48-55
2008 'A Practical Assessment of Social Engineering Vulnerabilities' Lulu. com 12-23
2008 'Investigating the problem of IDS false alarms: An experimental study using Snort' 253-267
2008 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' 139-+
2003 'Operational characteristics of an automated intrusion response system' 65-75
2003 'Operational characteristics of an automated intrusion response system' 65-75
2002 'A Response-Orientated Taxomony of IT System Intrusions' in Roccetti M SCS Europe 87-95
2002 'Keystroke Analysis as a Method of Advanced User Authentication and Response' in Ghonaimy A; El-Hadidi MT; Aslan HK Kluwer 215-226 Publisher Site
2001 'Security and System Intrusions - The need for Automatic Response Frameworks' in Eloff JHP; von Solms R; Dhillon G Kluwer Academic Publishers 87-97
'Investigating the Evasion Resilience of Network Intrusion Detection Systems' Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, UK, 7-/-0/20077-/-0/2007327-334
Links
Further information relating to research publications, professional activities, research interests etc., can be found at this web site.
Find out more about: