Maria Papadaki
Maria Papadaki
Associate Professor in Cyber Security, University of Derby
Verified email at
Cited by
Cited by
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
GC Tjhai, SM Furnell, M Papadaki, NL Clarke
Computers & Security 29 (6), 712-723, 2010
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13, 229-244, 2014
A review of using gaming technology for cyber-security awareness
F Alotaibi, S Furnell, I Stengel, M Papadaki
Int. J. Inf. Secur. Res.(IJISR) 6 (2), 660-666, 2016
Assessing end-user awareness of social engineering and phishing
A Karakasiliotis, SM Furnell, M Papadaki
School of Computer and Information Science, Edith Cowan University, Perth …, 2006
Keystroke analysis as a method of advanced user authentication and response
PS Dowland, SM Furnell, M Papadaki
Security in the Information Society: Visions and Perspectives, 215-226, 2002
Investigating the problem of IDS false alarms: An experimental study using Snort
GC Tjhai, M Papadaki, SM Furnell, NL Clarke
Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008
The impact of security and its antecedents in behaviour intention of using e-government services
N Alharbi, M Papadaki, P Dowland
Behaviour & Information Technology 36 (6), 620-636, 2017
Threats and impacts in maritime cyber security
KD Jones, K Tam, M Papadaki
IET, 2016
Social engineering: assessing vulnerabilities in practice
T Bakhshi, M Papadaki, S Furnell
Information Management & Computer Security 17 (1), 53-63, 2009
Behaviour profiling on mobile devices
F Li, N Clarke, M Papadaki, P Dowland
2010 International conference on emerging security technologies, 77-82, 2010
Behaviour profiling for transparent authentication for mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Academic Publishing Ltd, UK, 2011
An investigation and survey of response options for Intrusion Response Systems (IRSs)
NB Anuar, M Papadaki, S Furnell, N Clarke
2010 Information Security for South Africa, 1-8, 2010
A survey of cyber-security awareness in Saudi Arabia
F Alotaibi, S Furnell, I Stengel, M Papadaki
2016 11th International Conference for Internet Technology and Secured …, 2016
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.
GC Tjhai, M Papadaki, S Furnell, NL Clarke
TrustBus 99, 139-150, 2008
An experimental comparison of secret‐based user authentication technologies
I Irakleous, SM Furnell, PS Dowland, M Papadaki
Information Management & Computer Security 10 (3), 100-108, 2002
The challenge of measuring cyber-dependent crimes
S Furnell, D Emm, M Papadaki
Computer Fraud & Security 2015 (10), 5-12, 2015
A Practical Assessment of Social Engineering Vulnerabilities.
T Bakhshi, M Papadaki, S Furnell
HAISA, 12-23, 2008
Assessing the usability of end-user security software
T Ibrahim, SM Furnell, M Papadaki, NL Clarke
Trust, Privacy and Security in Digital Business: 7th International …, 2010
Improving awareness of social engineering attacks
A Smith, M Papadaki, SM Furnell
Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20