Ioannis Agrafiotis : Publications
Click here to download all publications in a single bibtex file
@article{jowua18-9-4-04,
title = "Modeling Advanced Persistent Threats to enhance anomaly detection techniques",
author = "Cheyenne Atapour and Ioannis Agrafiotis and Sadie Creese",
year = "2018",
journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)",
month = "December",
number = "4",
pages = "71--102",
volume = "9",
}
@article{bispham2018taxonomy,
title = "A taxonomy of attacks via the speech interface",
author = "Bispham, Mary K and Agrafiotis, Ioannis and Goldsmith, Michael",
year = "2018",
booktitle = "Proceedings of CYBER 2018 : The Third International Conference on Cyber-Technologies and Cyber-Systems",
publisher = "ThinkMind Digital Library for the Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018)",
}
@article{giasemidis2018semi,
title = "A semi-supervised approach to message stance classification",
author = "Giasemidis, Georgios and Kaplis, Nikolaos and Agrafiotis, Ioannis and Nurse, Jason",
year = "2018",
journal = "IEEE Transactions on Knowledge and Data Engineering",
publisher = "IEEE",
}
@article{bada2018reviewing,
title = "Reviewing national cybersecurity awareness in Africa: An empirical study",
author = "Bada, Maria and Von Solms, Basie and Agrafiotis, Ioannis",
year = "2018",
publisher = "CYBER 2018, The Third International Conference on Cyber-Technologies and Cyber-Systems",
}
@article{hameed2018analysing,
title = "Analysing trends and success factors of international cybersecurity capacity-building initiatives",
author = "Hameed, F and Agrafiotis, I and Weisser, C and Goldsmith, M and Creese, S",
year = "2018",
journal = "SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies",
publisher = "IARIA",
}
@article{zhang2018state,
title = "A state machine system for insider threat detection",
author = "Zhang, H and Agrafiotis, I and Erola, A and Creese, S and Goldsmith, M",
year = "2018",
journal = "The fifth International Workshop on Graphical Models for Security (GramSec), in conjunction with FLoC 2018",
publisher = "Springer",
}
@article{doi:10.1093/cybsec/tyy006,
title = "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate",
author = "Agrafiotis, Ioannis and Nurse, Jason R C and Goldsmith, Michael and Creese, Sadie and Upton, David",
year = "2018",
journal = "Journal of Cybersecurity",
pages = "tyy006",
url = "http://dx.doi.org/10.1093/cybsec/tyy006",
doi = "10.1093/cybsec/tyy006",
}
@article{kingston2018using,
title = "Using semantic clustering to support situation awareness on Twitter: the case of world views",
author = "Kingston, Charlie and Nurse, Jason RC and Agrafiotis, Ioannis and Milich, Andrew Burke",
year = "2018",
journal = "Human-centric Computing and Information Sciences",
number = "1",
pages = "22",
publisher = "SpringerOpen",
volume = "8",
}
@inproceedings{akinrolabu2018challenge,
title = "The challenge of detecting sophisticated attacks: Insights from SOC Analysts",
author = "Akinrolabu, Olusola and Agrafiotis, Ioannis and Erola, Arnau",
year = "2018",
booktitle = "Proceedings of the 13th International Conference on Availability, Reliability and Security",
organization = "ACM",
pages = "55",
}
@article{Woods2017,
title = "Mapping the coverage of security controls in cyber insurance proposal forms",
author = "Woods, Daniel and Agrafiotis, Ioannis and Nurse, Jason R. C. and Creese, Sadie",
year = "2017",
issn = "1869-0238",
journal = "Journal of Internet Services and Applications",
month = "Jul",
number = "1",
pages = "8",
url = "https://doi.org/10.1186/s13174-017-0059-y",
volume = "8",
doi = "10.1186/s13174-017-0059-y",
}
@article{agrafiotis2017formalising,
title = "Formalising policies for insider-threat detection: A tripwire grammar",
author = "Agrafiotis, Ioannis and Erola, Arnau and Goldsmith, Michael and Creese, Sadie",
year = "2017",
journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)",
number = "1",
pages = "26--43",
volume = "8",
}
@article{erola2017richerpicture,
title = "RicherPicture: Semi-automated cyber defence using context-aware data analytics",
author = "Erola, Arnau and Agrafiotis, Ioannis and Happa, Jassim and Goldsmith, Michael and Creese, Sadie and Legg, Philip",
year = "2017",
publisher = "IEEE",
}
@conference{2017-has-nurse-et-al,
title = "An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System",
author = "Jason R.C. Nurse; Ioannis Agrafiotis; Arnau Erola; Maria Bada; Taylor Roberts; Meredydd Williams; Michael Goldsmith; Sadie Creese",
year = "2017",
booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 19th International Conference on Human-Computer Interaction (HCII)",
note = "Accepted for publication",
publisher = "Springer",
doi = "10.1007/978-3-319-58460-7_26",
}
@techreport{RR-17-01,
title = "The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance",
author = "Ioannis Agrafiotis and Sadie Creese and Michael Goldsmith and Jason R.C. Nurse and David Upton",
year = "2017",
address = "Oxford, UK",
institution = "DCS",
number = "RR-17-01",
pages = "87",
}
@article{2016-cfs-ein,
title = "Insider threat response and recovery strategies in financial services firms",
author = "Jacqueline Eggenschwiler, Ioannis Agrafiotis, Jason R. C. Nurse",
year = "2016",
issn = "1361-3723",
journal = "Computer Fraud & Security",
publisher = "Elsevier Ltd.",
doi = "10.1016/S1361-3723(16)30091-4",
}
@article{writ2016,
title = "Validating an insider threat detection system: A real scenario perspective",
author = "Agrafiotis, Ioannis and Erola, Arnau and Happa, Jassim and Goldsmith, Michael and Creese, Sadie",
year = "2016",
journal = "IEEE Symposium on Security and Privacy, Workshop on Research for Insider Threats (WRIT)",
}
@inproceedings{rashid2016new,
title = "A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models",
author = "Rashid, Tabish and Agrafiotis, Ioannis and Nurse, Jason RC",
year = "2016",
booktitle = "Proceedings of the 2016 International Workshop on Managing Insider Security Threats",
organization = "ACM",
pages = "47--56",
}
@inproceedings{agrafiotis2016tripwire,
title = "A tripwire grammar for insider threat detection",
author = "Agrafiotis, Ioannis and Erola, Arnau and Goldsmith, Michael and Creese, Sadie",
year = "2016",
booktitle = "Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats",
organization = "ACM",
pages = "105--108",
}
@conference{socinfo2016-gsanpw,
title = "Determining the veracity of rumours on Twitter",
author = "Giasemidis, Georgios and Singleton, Colin and Agrafiotis, Ioannis and Nurse, Jason R.C. and Pilgrim, Alan and Willis, Chris",
year = "2016",
booktitle = "8th International Conference on Social Informatics (SocInfo 2016)",
pages = "185--205",
publisher = "Springer",
doi = "10.1007/978-3-319-47880-7_12",
}
@article{cfs2015agrafiotisetal,
title = "Identifying attack patterns for insider threat detection",
author = "Ioannis Agrafiotis and Jason R. C. Nurse and Oliver Buckley and Phil Legg and Sadie Creese and Michael Goldsmith",
year = "2015",
issn = "1361-3723",
journal = "Computer Fraud & Security",
month = "July",
number = "7",
pages = "9--17",
url = "http://www.journals.elsevier.com/computer-fraud-and-security",
doi = "10.1016/S1361-3723(15)30066-X",
}
@inproceedings{nurse2015,
title = "Information trustworthiness as a solution to the misinformation problems in social media",
author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn",
year = "2015",
booktitle = "International Conference on Cyber Security for Sustainable Society",
issn = "2052-8604",
pages = "28-35",
}
@article{agrafiotis2014towards,
title = "Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection",
author = "Agrafiotis, Ioannis and Legg, Philip and Goldsmith, Michael and Creese, Sadie",
year = "2014",
journal = "Journal of Internet Services and Information Security (JISIS)",
number = "4",
pages = "127--137",
volume = "4",
}
@article{nagcl14,
title = "Two sides of the coin: measuring and communicating the trustworthiness of online information",
author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen",
year = "2014",
journal = "Journal of Trust Management",
keywords = "Information trustworthiness; Information quality; Trust metrics; Trust visuals; Decision-making; Social-media content; Risk communication",
number = "5",
publisher = "Springer Open",
url = "http://www.journaloftrustmanagement.com/content/1/1/5",
volume = "1",
doi = "10.1186/2196-064X-1-5",
}
@conference{nagclpj2014,
title = "Managing the influence of social media using information trust",
author = "Jason R.C. Nurse and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese and Koen Lamberts and Darren Price and Glyn Jones",
year = "2014",
booktitle = "Social Influence in the Information Age Conference",
}
@inproceedings{nlbawwugc14,
title = "A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches",
author = "Nurse, Jason R.C. and Legg, Philip A. and Buckley, Oliver and Agrafiotis, Ioannis and Wright, Gordon and Whitty, Monica and Upton, David and Goldsmith, Michael and Creese, Sadie",
year = "2014",
booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI)",
publisher = "Springer",
doi = "10.1007/978-3-319-07620-1_24",
}
@techreport{agrafiotis2015as,
title = "Supplementary document for Identifying attack patterns for insider-threat detection",
author = "Agrafiotis I., Nurse J., Buckley O., Legg P., Creese S., Goldsmith M.",
year = "2014",
}
@article{legg2013mist,
title = "Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection",
author = "Philip A. Legg, Nick Moffat, Jason R.C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese",
year = "2013",
issn = "2093-5382",
journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications",
number = "4",
pages = "20-37",
url = "http://isyou.info/jowua/papers/jowua-v4n4-2.pdf",
volume = "4",
}
@inproceedings{cybervis,
title = "CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise",
author = "Sadie Creese and Michael Goldsmith and Nick Moffat and Jassim Happa and Ioannis Agrafiotis",
year = "2013",
booktitle = "Proceedings of the 13th annual IEEE Conference on Technologies for Homeland Security",
}
@inproceedings{7027,
title = "Communicating Trustworthiness using Radar Graphs: A Detailed Look",
author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
year = "2013",
booktitle = "The 11th International Conference on Privacy, Security and Trust (PST)",
keywords = "Trustworthiness factors; trustworthiness visualisation; risk communication; communicating trustworthiness and quality; user studies",
publisher = "IEEE",
doi = "10.1109/PST.2013.6596085",
}
@inproceedings{7026,
title = "Building Confidence in Information-Trustworthiness Metrics for Decision Support",
author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
year = "2013",
booktitle = "The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)",
keywords = "Trust metrics; trustworthiness visualisation; decision-making; risk communication; information quality",
publisher = "IEEE",
doi = "10.1109/TrustCom.2013.6",
}
@incollection{agrafiotis2012formalising,
title = "Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation",
author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael",
year = "2012",
booktitle = "Privacy and Identity Management for Life",
pages = "232--244",
publisher = "Springer Boston",
}
@incollection{agrafiotis2012developing,
title = "Developing a Strategy for Automated Privacy Testing Suites",
author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael",
year = "2012",
booktitle = "Privacy and Identity Management for Life",
pages = "32--44",
publisher = "Springer Boston",
}
@inproceedings{5557,
title = "Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation",
author = "I. Agrafiotis, S. Creese, M. Goldsmith",
year = "2011",
booktitle = "Proceedings of the IFIP Summer School 2011",
month = "September",
}
@inproceedings{5556,
title = "Developing a Strategy for Automated Privacy Testing Suites",
author = "I. Agrafiotis, S. Creese, M. Goldsmith",
year = "2011",
booktitle = "Proceedings of the IFIP Summer School",
month = "September 2011",
}
@incollection{agrafiotis2011applying,
title = "Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements",
author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick",
year = "2011",
booktitle = "Privacy and Identity Management for Life",
pages = "271--282",
publisher = "Springer IFIP AICT",
volume = "352",
}
@inproceedings{5567,
title = "Applying formal methods to describe the privacy-control requirements in real case-study scenario: emerging ambiguities and proposed solutions",
author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou",
year = "2010",
booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School",
}
@inproceedings{5565,
title = "Defining Consent and Revocation Policies",
author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou, M Casassa Mont, S. Pearson",
year = "2010",
booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School",
}
@incollection{agrafiotis2010reaching,
title = "Reaching for informed revocation: shutting off the tap on personal data",
author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick",
year = "2010",
booktitle = "Privacy and Identity Management for Life",
pages = "246--258",
publisher = "Springer IFIP AICT",
volume = "320",
}
@inbook{5576,
title = "Reaching for Informed Revocation: Shutting Off the Tap on Personal Data",
author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou",
year = "2009",
booktitle = "Privacy and Identity Management for Life, Proceedings of 5th PrimeLife/IFIP International Summer School",
publisher = "Springer IFIP AICT 320",
}