Follow
Panagiotis Andriotis
Panagiotis Andriotis
UWE Bristol, National Institute of Informatics
Verified email at uwe.ac.uk - Homepage
Title
Cited by
Cited by
Year
Mamadroid: Detecting android malware by building markov chains of behavioral models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
arXiv preprint arXiv:1612.04433, 2016
2662016
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019
1592019
A pilot study on the security of pattern screen-lock methods and soft side channel attacks
P Andriotis, T Tryfonas, G Oikonomou, C Yildiz
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
1282013
Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method
P Andriotis, T Tryfonas, G Oikonomou
International conference on human aspects of information security, privacy …, 2014
712014
Forensic analysis of wireless networking evidence of android smartphones
P Andriotis, G Oikonomou, T Tryfonas
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
502012
Risk assessment for mobile systems through a multilayered hierarchical Bayesian network
S Li, T Tryfonas, G Russell, P Andriotis
IEEE transactions on cybernetics 46 (8), 1749-1759, 2016
492016
Distributed consensus algorithm for events detection in cyber-physical systems
S Li, S Zhao, P Yang, P Andriotis, L Xu, Q Sun
IEEE Internet of Things Journal 6 (2), 2299-2308, 2019
472019
JPEG steganography detection with Benford's Law
P Andriotis, G Oikonomou, T Tryfonas
Digital Investigation 9 (3-4), 246-257, 2013
462013
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model
P Andriotis, MA Sasse, G Stringhini
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
392016
A study on usability and security features of the android pattern lock screen
P Andriotis, G Oikonomou, A Mylonas, T Tryfonas
Information & Computer Security, 2016
232016
Emotional bots: content-based spammer detection on social media
P Andriotis, A Takasu
2018 IEEE international workshop on information forensics and security (WIFS …, 2018
162018
Smartphone message sentiment analysis
P Andriotis, A Takasu, T Tryfonas
IFIP International Conference on Digital Forensics, 253-265, 2014
152014
A comparative study of android users’ privacy preferences under the runtime permission model
P Andriotis, S Li, T Spyridopoulos, G Stringhini
International Conference on Human Aspects of Information Security, Privacy …, 2017
132017
Highlighting relationships of a smartphone’s social ecosystem in potentially large investigations
P Andriotis, G Oikonomou, T Tryfonas, S Li
IEEE Transactions on Cybernetics 46 (9), 1974-1985, 2015
132015
Studying users’ adaptation to android’s run-time fine-grained access control system
P Andriotis, G Stringhini, MA Sasse
Journal of information security and applications 40, 31-43, 2018
112018
Real-time monitoring of privacy abuses and intrusion detection in android system
S Li, J Chen, T Spyridopoulos, P Andriotis, R Ludwiniak, G Russell
International Conference on Human Aspects of Information Security, Privacy …, 2015
112015
Mass surveillance in cyberspace and the lost art of keeping a secret
T Tryfonas, M Carter, T Crick, P Andriotis
International Conference on Human Aspects of Information Security, Privacy …, 2016
92016
Impact of user data privacy management controls on mobile device investigations
P Andriotis, T Tryfonas
IFIP International Conference on Digital Forensics, 89-105, 2016
92016
Detecting Android Malware by Building Markov Chains of Behavioural Models
E Mariconti, O Lucky, P Andriotis
NDDS'17, 2017
72017
Poster: breaking the android pattern lock screen with neural networks and smudge attacks
P Andriotis, T Tryfonas, Z Yu
Proc. of the sixth ACM conference on Security and privacy in wireless and …, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20