- A328, Portland Square, Drake Circus, Plymouth, PL4 8AA
- +44 1752 586260
- maria.papadaki@plymouth.ac.uk

Profiles
Dr Maria Papadaki
Visiting Researcher
School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)
Dr Maria Papadaki can be contacted through arrangement with our Press Office, to speak to the media on these areas of expertise.
- Information security
- Computer security
- Computer – intrusion detection
- Computer-incident response
Email publicrelations@plymouth.ac.uk to enquire.
Research
Research
Publications
Publications
Key publications
Key publications are highlighted
Journals
Articles
(2023) 'An Adaptive Cybersecurity Training Framework for the Education of Social Media Users at Work' Applied Sciences 13, (17) 9595-9595 , DOI
(2021) 'An empirical analysis of the information security culture key factors framework' Computers & Security 108, 102354-102354 , DOI
(2021) 'A collaborative approach for national cybersecurity incident management' Information & Computer Security 29, (3) 457-484 , DOI
(2021) 'Towards a cross-cultural education framework for online safety awareness' Information & Computer Security 29, (4) 664-679 , DOI
(2019) 'Towards a maturity model for health-care cloud security (M<sup>2</sup>HCS)' Information & Computer Security 28, (3) 321-345 , DOI
(2019) 'Fifteen years of phishing: can technology save us?' Computer Fraud & Security 2019, (7) 11-16 , DOI
(2016) 'The impact of security and its antecedents in behaviour intention of using e-government services' Behaviour and Information Technology 36, (6) 620-636 , DOI
(2016) 'Graphical One-Time Password (GOTPass): A usability evaluation' Information Security Journal: A Global Perspective 25, (1-3) Publisher Site , DOI Open access
(2016) 'Threats and Impacts in Maritime Cyber Security' Engineering & Technology Reference Publisher Site Open access
(2015) 'Secure Graphical One Time Password (GOTPass): An Empirical Study' Information Security Journal: A Global Perspective 24, (4-6) 207-220 , DOI
(2015) 'The challenge of measuring cyber-dependent crimes' Computer Fraud & Security 2015, (10) 5-12 , DOI
(2014) 'Vulnerability of opportunistic parking assistance systems to vehicular node selfishness' Computer Communications 48, 159-170 , DOI
(2014) 'FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks' The Computer Journal 58, (4) 892-903 , DOI Open access
(2013) 'A response selection model for intrusion response systems: Response Strategy Model (RSM)' SECURITY AND COMMUNICATION NETWORKS 7, (11) 1831-1848 , DOI
(2013) 'Active authentication for mobile devices utilising behaviour profiling' INTERNATIONAL JOURNAL OF INFORMATION SECURITY 13, (3) 229-244 , DOI Open access
(2013) 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks 6, (9) 1087-1116 , DOI
(2012) 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks , DOI
(2012) 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 , DOI
(2011) 'A risk index model for security incident prioritisation'
(2011) 'LUARM: An Audit Engine for Insider Misuse Detection' International Journal of Digital Crime and Forensics (IJDCF) 3, 37-49
(2011) 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
(2010) 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 , DOI
(2010) 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and< i> K</i>-means algorithm' Computers & Security 29, 712-723
(2010) 'Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments' J. Multim. Process. Technol. 1, 181-193
(2007) 'An assessment of end-user vulnerability to phishing attacks' Journal of Information Warfare 6, (1) 17-28
(2007) 'Considering the potential of criminal profiling to combat hacking' Journal in Computer Virology 3, 135-141
(2006) 'Achieving Automated Intrusion Response: A Prototype Implementation' Information Management & Computer Security 14, (3) 235-251
(2005) 'Informing the decision process in an automated intrusion response system' Information Security Technical Report 10, (3) 150-161
(2004) 'IDS or IPS: what is best?' Network Security 7, 15-19
(2003) 'Enhancing response in intrusion detection systems' Journal of Information Warfare 2, (1) 90-102
(2002) 'An experimental comparison of secret-based user authentication technologies' Information Management & Computer Security 10, (3) 100-108
(2002) 'Keystroke analysis as a method of advanced user authentication and response' Security in the Information Society: Visions and Perspectives 86, 215-226
(2002) 'An experimental comparison of secret-based user authentication technologies' Information Management and Computer Security 10, (2-3) 100-108 , DOI
(2001) 'Security vulnerabilities and system intrusions-the need for automatic response frameworks' Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, Setembro de
'Scare tactics – A viable weapon in the security war?' Computer Fraud & Security 2009, (12) 6-10
'Social engineering: assessing vulnerabilities in practice' Information Management and Computer Security 17, (1) 53-63
'Vulnerability management: an attitude of mind?' Network Security 2010, (10) 4-8
'Testing our defences or defending our tests: the obstacles to performing security assessment' Computer Fraud & Security 2008, (5) 8-12
Conference Papers
(2023) 'Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats' Springer Nature Switzerland 349-363 , DOI
(2022) 'The Importance of the Job Role in Social Media Cybersecurity Training' 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 6-/-0/20226-/-0/2022IEEE , DOI Open access
(2020) 'Towards a Cross-Cultural Education Framework for Online Safety Awareness' Springer International Publishing 47-57 , DOI
(2019) 'A Comprehensive Framework for Understanding Security Culture in Organizations' Springer International Publishing 143-156 , DOI
(2019) 'Current cybersecurity maturity models: How effective in healthcare cloud?' 211-222
(2018) 'Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis' 2018 Global Information Infrastructure and Networking Symposium (GIIS) 0-/-1/20180-/-1/2018IEEE , DOI Open access
(2017) 'Enhancing cyber security awareness with mobile games' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20172-/-1/2017IEEE , DOI
(2016) 'A survey of cyber-security awareness in Saudi Arabia' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20162-/-1/2016IEEE , DOI
(2014) 'Security challenges of E-government adoption based on end users' perspective' 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20142-/-1/2014IEEE , DOI
(2014) 'Alternative graphical authentication for online banking environments' 122-136
(2013) 'Opportunistically-assisted parking search: A story of free riders, selfish liars and bona fide mules' 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS) 3-/-0/20133-/-0/2013IEEE , DOI
(2013) 'IT Application Outsourcing in Europe: Long-Term Outcomes, Success Factors and Implications for ITO Maturity' 2013 46th Hawaii International Conference on System Sciences (HICSS) 1-/-0/20131-/-0/2013IEEE , DOI
(2012) 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
(2012) 'Education in the 'virtual' community: Can beating Malware Man teach users about social networking security?' 33-39
(2011) 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 307-314
(2010) 'Assessing the Usability of End-User Security Software' 177-189
(2010) 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' 1-8
(2010) 'ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success' 355-359
(2010) 'Online addiction: privacy risks in online gaming environments' 114-121
(2009) 'Assessing the Usability of Personal Internet Security Tools' 102-111
(2008) 'Evaluating the usability impacts of security interface adjustments in Word 2007' 48-55
(2008) 'Investigating the problem of IDS false alarms: An experimental study using Snort' 253-267
(2008) 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' 139-+
(2008) 'A Practical Assessment of Social Engineering Vulnerabilities' Lulu. com 12-23
(2003) 'Operational characteristics of an automated intrusion response system' 65-75
(2003) 'Operational characteristics of an automated intrusion response system' 65-75
(2002) 'A Response-Orientated Taxomony of IT System Intrusions' in Roccetti M SCS Europe 87-95
(2002) 'Keystroke Analysis as a Method of Advanced User Authentication and Response' in Ghonaimy A; El-Hadidi MT; Aslan HK Kluwer 215-226 Publisher Site
(2001) 'Security and System Intrusions - The need for Automatic Response Frameworks' in Eloff JHP; von Solms R; Dhillon G Kluwer Academic Publishers 87-97
'Investigating the Evasion Resilience of Network Intrusion Detection Systems' Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, UK, 7-/-0/20077-/-0/2007327-334
Personal
Personal
Links
Further information relating to research publications, professional activities, research interests etc., can be found at the CSCAN website.
Find out more about: