Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Browse by Current Cardiff authors

Number of items: 35.

Al lelah, Turki, Theodorakopoulos, George ORCID: https://orcid.org/0000-0003-2701-7809, Javed, Amir ORCID: https://orcid.org/0000-0001-9761-0945 and Anthi, Eirini 2023. Machine learning detection of cloud services abuse as C&C Infrastructure. Journal of Cybersecurity and Privacy 3 (4) , pp. 858-881. 10.3390/jcp3040039
file

Al lelah, Turki, Theodorakopoulos, George ORCID: https://orcid.org/0000-0003-2701-7809, Reinecke, Philipp ORCID: https://orcid.org/0000-0002-2411-0891, Javed, Amir ORCID: https://orcid.org/0000-0001-9761-0945 and Anthi, Eirini 2023. Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review. Journal of Cybersecurity and Privacy 3 (3) , pp. 558-590. 10.3390/jcp3030027
file

Subahi, Alanoud ORCID: https://orcid.org/0000-0002-8642-1708 and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2022. Automated approach to analyze IoT privacy policies. Cagáňová, Dagmar and Horňáková, Natalia, eds. Industry 4.0 Challenges in Smart Cities, Cham: Springer, pp. 163-186. (10.1007/978-3-030-92968-8_12)
file

Theodorakopoulos, George ORCID: https://orcid.org/0000-0003-2701-7809, Panaousis, Emmanouil, Liang, Kaitai and Loukas, George 2022. On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing 19 (1) , pp. 566-578. 10.1109/TDSC.2020.2980270
file

Bostanipour, Behnaz and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2021. Joint obfuscation of location and its semantic information for privacy protection. Computers and Security 107 , 102310. 10.1016/j.cose.2021.102310
file

Murakonda, Sasi Kumar, Shokri, Reza and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2021. Quantifying the privacy risks of learning high-dimensional graphical models. Presented at: 24th International Conference on Artificial Intelligence and Statistics (AISTATS), virtual, 13-15 April 2021. Proceedings of Machine Learning Research. pp. 2287-2295.
file

Barati, Masoud, Theodorakopoulos, George ORCID: https://orcid.org/0000-0003-2701-7809 and Rana, Omer ORCID: https://orcid.org/0000-0003-3597-2646 2020. Automating GDPR compliance verification for cloud-hosted services. Presented at: 2020 International Symposium on Networks, Computers and Communications (ISNCC), Virtual, Canada, 20-22 October 2020. 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, pp. 1-6. 10.1109/ISNCC49221.2020.9297309
file

Alodhyani, Fahad, Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 and Reinecke, Philipp ORCID: https://orcid.org/0000-0002-2411-0891 2020. Password managers—it’s all about trust and transparency. Future Internet 12 (11) , 189. 10.3390/fi12110189
file

Xu, Yibin, Huang, Yangyu, Shao, Jianhua ORCID: https://orcid.org/0000-0001-8461-1471 and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2020. A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol. Concurrency and Computation: Practice and Experience 32 (19) , e5773. 10.1002/cpe.5773
file

Pratomo, Baskoro, Burnap, Peter ORCID: https://orcid.org/0000-0003-0396-633X and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2020. BLATTA: early exploit setection on network traffic with recurrent neural networks. Security and Communication Networks 2020 , 8826038. 10.1155/2020/8826038
file

Alrayes, Fatma, Abdelmoty, Alia ORCID: https://orcid.org/0000-0003-2031-4413 and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2020. Modelling perceived risks to personal privacy from location disclosure on online social networks. International Journal of Geographical Information Science 34 (1) , pp. 150-176. 10.1080/13658816.2019.1654109
file

Loukides, Grigorios ORCID: https://orcid.org/0000-0003-0888-5061 and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2020. Location histogram privacy by sensitive location hiding and target histogram avoidance/resemblance. Knowledge and Information Systems 62 , pp. 2613-2651. 10.1007/s10115-019-01432-4
file

Barati, Masoud, Rana, Omer ORCID: https://orcid.org/0000-0003-3597-2646, Petri, Ioan ORCID: https://orcid.org/0000-0002-1625-8247 and Theodorakopoulos, George ORCID: https://orcid.org/0000-0003-2701-7809 2020. GDPR compliance verification in Internet of Things. IEEE Access 8 , pp. 119697-119709. 10.1109/ACCESS.2020.3005509
file

Subahi, Alanoud and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2019. Detecting IoT user behavior and sensitive information in encrypted IoT -app traffic. Sensors 19 (21) , 4777. 10.3390/s19214777
file

Anthi, Eirini, Williams, Lowri, Malgorzata, Slowinska, Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 and Burnap, Peter ORCID: https://orcid.org/0000-0003-0396-633X 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6 (5) , pp. 9042-9053. 10.1109/JIOT.2019.2926365
file

Subahi, Alanoud and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2018. Ensuring compliance of IoT devices with their Privacy Policy Agreement. Presented at: 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, 6-8 August. 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud). Barcelona, Spain: IEEE, pp. 100-107. 10.1109/FiCloud.2018.00022
file

Anthi, Eirini, Ahmad, Shazaib, Rana, Omer ORCID: https://orcid.org/0000-0003-3597-2646, Burnap, Pete ORCID: https://orcid.org/0000-0003-0396-633X and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78 , pp. 477-490. 10.1016/j.cose.2018.07.016
file

Mamais, Stylianos and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2017. Behavioural verification: preventing report fraud in decentralized advert distribution systems. Future Internet 9 (4) , 88. 10.3390/fi9040088
file

Anthi, Eirini, Javed, Amir ORCID: https://orcid.org/0000-0001-9761-0945, Rana, Omer F. ORCID: https://orcid.org/0000-0003-3597-2646 and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2017. Secure data sharing and analysis in cloud-based energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017. Published in: Longo, Antonella, Zappatore, Marco, Villari, Massimo, Rana, Omer, Bruneo, Dario, Ranjan, Rajiv, Fazin, Maria and Massonet, Philippe eds. IISSC 2017, CN4IoT 2017: Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , vol.189 Springer, pp. 228-242. 10.1007/978-3-319-67636-4_24
file

Mamais, Stylianos and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2017. Private and secure distribution of targeted advertisements to mobile phones. Future Internet 9 (2) , 16. 10.3390/fi9020016
file

Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2017. An open framework for flexible plug-in privacy mechanisms in crowdsensing applications. Presented at: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA, 13-17 March 2017. Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on. IEEE, pp. 237-242. 10.1109/PERCOMW.2017.7917564
file

Anthi, Eirini and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2017. Sensitive data in Smartphone Applications: Where does it go? Can it be intercepted? [Technical Report]. Springer.
file

Shokri, Reza, Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 and Troncoso, Carmela 2016. Privacy games along location traces: a game-theoretic framework for optimizing location privacy. ACM Transactions on Privacy and Security 19 (4) , 11. 10.1145/3009908
file

Galini, Tsoukaneri, Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809, Hugh, Leather and Mahesh, Marina 2016. On the inference of user paths from anonymized mobility data. Presented at: 1st IEEE European Symposium on Security and Privacy, Saarbrücken, Germany, 21-24 March 2016.
file

Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2015. The same-origin attack against location privacy. Presented at: 22nd ACM Conference on Computer and Communications Security, Denver, Colorado, USA, 12-126 October 2015. Published in: Ray, Indrajit, Hopper, Nicholas and Jansen, Rob eds. WPES '15 Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society. ACM, pp. 49-53. 10.1145/2808138.2808150

Shokri, Reza, Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809, Papadimitratos, Panos, Kazemi, Ehsan and Hubaux, Jean-Pierre 2014. Hiding in the mobile crowd: location privacy through collaboration. IEEE Transactions on Dependable and Secure Computing 11 (3) , pp. 266-279. 10.1109/TDSC.2013.57
file

Petri, Ioan ORCID: https://orcid.org/0000-0002-1625-8247, Punceva, Magdalena, Rana, Omer Farooq ORCID: https://orcid.org/0000-0003-3597-2646, Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 and Rezgui, Yacine ORCID: https://orcid.org/0000-0002-5711-8400 2014. A broker based consumption mechanism for social clouds. International Journal of Cloud Computing 2 (1) , pp. 45-57.
file

Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809, Le Boudec, J. Y. and Baras, J. S. 2013. Selfish response to epidemic propagation. IEEE Transactions on Automatic Control 58 (2) , pp. 363-376. 10.1109/TAC.2012.2209949

Shokri, Reza, Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809, Troncoso, Carmela, Hubaux, Jean-Pierre and Le Boudec, Jean-Yves 2012. Protecting location privacy: Optimal strategy against localization attacks. Presented at: 19th ACM Conference on Computer and Communications Security (CCS 2012), Raleigh, NC, USA, 16-18 October 2012. Published in: Yu, Ting, Danezis, George and Gligor, Virgil D. eds. Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. ACM 2012. New York, NY: ACM, pp. 617-627. 10.1145/2382196.2382261

Shokri, Reza, Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809, Le Boudec, Jean-Yves and Hubaux, Jean-Pierre 2011. Quantifying location privacy. Presented at: 2011 IEEE Symposium on Security and Privacy (SP), Berkeley, CA, USA, 22-25 May 2011. Published in: O’Conner, L. ed. Proceedings of the 2011 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA: IEEE, pp. 247-262. 10.1109/SP.2011.18
file

Baras, John and Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2010. Path problems in networks. Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers. 10.2200/S00245ED1V01Y201001CNT003

Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 and Baras, John 2008. Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications 26 (7) , pp. 1317-1327. 10.1109/JSAC.2008.080928

Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 2007. Robust network trust establishment for collaborative applications and protocols. PhD Thesis, University of Maryland, College Park.

Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 and Baras, J. S. 2006. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24 (2) , pp. 318-328. 10.1109/JSAC.2005.861390
file

Theodorakopoulos, Georgios ORCID: https://orcid.org/0000-0003-2701-7809 and Baras, John S. 2004. Trust evaluation in ad-hoc networks. Presented at: WiSe '04:3rd ACM workshop on Wireless security, 1 October 2004, Published in: Jakobsson, M. and Perrig, A. eds. WiSe '04 Proceedings of the 3rd ACM workshop on Wireless security. New York, NY: ACM, pp. 1-10. 10.1145/1023646.1023648
file

This list was generated on Tue Apr 16 05:49:17 2024 BST.