Theo Tryfonas
Title
Cited by
Cited by
Year
The Internet of Things: a security point of view
S Li, T Tryfonas, H Li
Internet Research 26 (2), 337-359, 2016
235*2016
Living labs, innovation districts and information marketplaces: A systems approach for smart cities
E Cosgrave, K Arbuthnot, T Tryfonas
Procedia Computer Science 16, 668-677, 2013
2232013
A pilot study on the security of pattern screen-lock methods and soft side channel attacks
P Andriotis, T Tryfonas, G Oikonomou, C Yildiz
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
1212013
A distributed consensus algorithm for decision-making in service-oriented Internet of Things
S Li, G Oikonomou, T Tryfonas, T Chen, L Xu
IEEE Transactions on Industrial Informatics 10 (2), 1461 - 1468, 2014
962014
A Game Theoretic Defence Framework Against DoS/DDoS Cyber Attacks
T Spyridopoulos, G Karanikas, T Tryfonas, G Oikonomou
Computers & Security, 2013
932013
Embedding security practices in contemporary information systems development approaches
T Tryfonas, E Kiountouzis, A Poulymenakou
Information Management & Computer Security, 2001
832001
Tidal stream power technology-state of the art
J King, T Tryfonas
Oceans 2009-Europe, 1-8, 2009
722009
Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method
P Andriotis, T Tryfonas, G Oikonomou
International conference on human aspects of information security, privacy …, 2014
632014
IPv6 multicast forwarding in RPL-based wireless sensor networks
G Oikonomou, I Phillips, T Tryfonas
Wireless personal communications 73 (3), 1089-1116, 2013
602013
Acquiring volatile operating system data tools and techniques
I Sutherland, J Evans, T Tryfonas, A Blyth
ACM SIGOPS Operating Systems Review 42 (3), 65-73, 2008
592008
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage
V Mee, T Tryfonas, I Sutherland
Digital Investigation 3 (3), 166-173, 2006
562006
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network
S Li, T Tryfonas, G Russell, P Andriotis
Cybernetics, IEEE Transactions on, 2016
442016
Forensic analysis of wireless networking evidence of android smartphones
P Andriotis, G Oikonomou, T Tryfonas
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
422012
JPEG steganography detection with Benford's Law
P Andriotis, G Oikonomou, T Tryfonas
Digital Investigation 9 (3-4), 246-257, 2013
402013
Migrating to the cloud: lessons and limitations of ‘traditional’IS success models
IK Azeemi, M Lewis, T Tryfonas
Procedia Computer Science 16, 737-746, 2013
402013
Life-logging in smart environments: Challenges and security threats
NE Petroulakis, IG Askoxylakis, T Tryfonas
2012 IEEE International Conference on Communications (ICC), 5680-5684, 2012
362012
Exploring the relationship between smart city policy and implementation
E Cosgrave, T Tryfonas
Proceedings of The First International Conference on Smart Systems, Devices …, 2012
352012
From risk analysis to effective security management: towards an automated approach
V Tsoumas, T Tryfonas
Information Management & Computer Security, 2004
352004
The smart city from a public value perspective
E Cosgrave, T Tryfonas, T Crick
ICT for sustainability 2014 (ICT4S-14), 369-377, 2014
342014
Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype
AG Fragkiadakis, EZ Tragos, T Tryfonas, IG Askoxylakis
EURASIP Journal on Wireless Communications and Networking 2012 (1), 1-18, 2012
342012
The system can't perform the operation now. Try again later.
Articles 1–20