A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate I Agrafiotis, JRC Nurse, M Goldsmith, S Creese, D Upton Journal of Cybersecurity 4 (1), tyy006, 2018 | 401 | 2018 |
A new take on detecting insider threats: exploring the use of hidden markov models T Rashid, I Agrafiotis, JRC Nurse Proceedings of the 8th ACM CCS International workshop on managing insider …, 2016 | 200 | 2016 |
Towards a conceptual model and reasoning structure for insider threat detection PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ... Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013 | 116 | 2013 |
Mapping the coverage of security controls in cyber insurance proposal forms D Woods, I Agrafiotis, JRC Nurse, S Creese Journal of Internet Services and Applications 8, 1-13, 2017 | 92 | 2017 |
Identifying attack patterns for insider threat detection I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith Computer Fraud & Security 2015 (7), 9-17, 2015 | 79 | 2015 |
Determining the veracity of rumours on Twitter G Giasemidis, C Singleton, I Agrafiotis, JRC Nurse, A Pilgrim, C Willis, ... International Conference on Social Informatics, 185-205, 2016 | 78 | 2016 |
Smart insiders: exploring the threat from insiders using the internet-of-things JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese 2015 International Workshop on Secure Internet of Things (SIoT), 5-14, 2015 | 62 | 2015 |
The data that drives cyber insurance: A study into the underwriting and claims processes JRC Nurse, L Axon, A Erola, I Agrafiotis, M Goldsmith, S Creese 2020 International conference on cyber situational awareness, data analytics …, 2020 | 54 | 2020 |
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) JRCN Lukas Halgas, Ioannis Agrafiotis 20th World Conference on Information Security Applications (WISA 2019), 2020 | 53* | 2020 |
Cyber harm: concepts, taxonomy and measurement I Agrafiotis, M Bada, P Cornish, S Creese, M Goldsmith, ... Saïd Business School WP 23, 2016 | 49 | 2016 |
Two sides of the coin: measuring and communicating the trustworthiness of online information JRC Nurse, I Agrafiotis, M Goldsmith, S Creese, K Lamberts Journal of Trust Management 1, 1-20, 2014 | 45 | 2014 |
Reviewing national cybersecurity awareness in Africa: An empirical study M Bada, B Von Solms, I Agrafiotis | 44 | 2019 |
The challenge of detecting sophisticated attacks: Insights from SOC Analysts O Akinrolabu, I Agrafiotis, A Erola Proceedings of the 13th international conference on availability …, 2018 | 44 | 2018 |
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ... Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 41 | 2014 |
A semi-supervised approach to message stance classification G Giasemidis, N Kaplis, I Agrafiotis, JRC Nurse IEEE Transactions on Knowledge and Data Engineering 32 (1), 1-11, 2018 | 37 | 2018 |
Insider threat response and recovery strategies in financial services firms J Eggenschwiler, I Agrafiotis, JRC Nurse Computer Fraud & Security 2016 (11), 12-19, 2016 | 37 | 2016 |
A system to calculate Cyber Value-at-Risk A Erola, I Agrafiotis, JRC Nurse, L Axon, M Goldsmith, S Creese Computers & Security 113, 102545, 2022 | 35 | 2022 |
Nonsense attacks on google assistant and missense attacks on amazon alexa M Bispham, I Agrafiotis, M Goldsmith 5th International Conference on Information Systems Security and Privacy 1, 2019 | 26 | 2019 |
Validating an insider threat detection system: A real scenario perspective I Agrafiotis, A Erola, J Happa, M Goldsmith, S Creese 2016 IEEE Security and Privacy Workshops (SPW), 286-295, 2016 | 22 | 2016 |
A tripwire grammar for insider threat detection I Agrafiotis, A Erola, M Goldsmith, S Creese Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016 | 20 | 2016 |