Publications

K. Anastasopoulou, S. Kokolakis, and P. Andriotis. Privacy decision-making in the digital era: A game theoretic review. In Proceedings of the 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2017), Held as Part of HCI International 2017, Vancouver, Canada, July 12-14, 2017. Springer International Publishing, 2017.

P. Andriotis, L. Shancang, T. Spyridopoulos, and G. Stringhini. A comparative study of Android users' privacy preferences under the runtime permission model. In T. Tryfonas, editor, Proceedings of the 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2017), Held as Part of HCI International 2017, Vancouver, Canada, July 12-14, 2017. Springer International Publishing, 2017.

E. Mariconti, L. Onwuzurike, P. Andriotis, E. D. Cristofaro, G. J. Ross, and G. Stringhini. Mamadroid: Detecting Android malware by building markov chains of behavioral models. In 24th Network and Distributed System Security Symposium (NDSS 2017), pages 1{15, 2017.


2016

O. Aboluwarin, P. Andriotis, A. Takasu, and T. Tryfonas. Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics, pages 69{87. Springer International Publishing, 2016. ISBN 978-3-319-46279-0. doi: 10.1007/978-3-319-46279-0_4.

P. Andriotis and T. Tryfonas. Impact of User Data Privacy Management Controls on Mobile Device Investigations, pages 89{105. Springer International Publishing, 2016. ISBN 978-3-319-46279-0. doi: 10.1007/978-3-319-46279-0_5.

P. Andriotis, G. Oikonomou, A. Mylonas, and T. Tryfonas. A study on usability and security features of the Android pattern lock screen. Information and Computer Security, 24(1):53-72, 2016. doi: 10.1108/ICS-01-2015-0001.

P. Andriotis, G. Oikonomou, T. Tryfonas, and S. Li. Highlighting relationships of a smartphone's social ecosystem in potentially large investigations. IEEE Transactions on Cybernetics, 46(9):1974-1985, Sept 2016. ISSN 2168-2267. doi: 10.1109/TCYB.2015.2454733.

P. Andriotis, M. A. Sasse, and G. Stringhini. Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pages 1-6, Dec 2016. doi:10.1109/WIFS.2016.7823922.

S. Li, T. Tryfonas, G. Russell, and P. Andriotis. Risk assessment for mobile systems through a multilayered hierarchical bayesian network. IEEE Transactions on Cybernetics, 46(8):1749-1759, Aug 2016. ISSN 2168-2267. doi: 10.1109/TCYB.2016.2537649.

T. Tryfonas, M. Carter, T. Crick, and P. Andriotis. Mass surveillance in cyberspace and the lost art of keeping a secret. In T. Tryfonas, editor, Proceedings of the 4th International Conference Human Aspects of Information Security, Privacy, and Trust (HAS 2016), Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, pages 174-185. Springer International Publishing, 2016. ISBN 978-3-319-39381-0. doi: 10.1007/978-3-319-39381-0_16.


2015

P. Andriotis and G. Oikonomou. Messaging activity reconstruction with sentiment polarity identifi cation. In T. Tryfonas and I. Askoxylakis, editors, Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015), Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015, pages 475-486. Springer International Publishing, 2015. ISBN 978-3-319-20376-8. doi: 10.1007/978-3-319-20376-8_42.

P. Andriotis, T. Tryfonas, G. Oikonomou, and I. King. A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem, pages 251-267. Springer International Publishing, 2015. ISBN 978-3-319-24123-4. doi: 10.1007/978-3-319-24123-4_15.

S. Li, J. Chen, T. Spyridopoulos, P. Andriotis, R. Ludwiniak, and G. Russell. Real-time monitoring of privacy abuses and intrusion detection in Android system. In T. Tryfonas and I. Askoxylakis, editors, Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015), Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015, pages 379{390. Springer International Publishing, 2015. ISBN 978-3-319-20376-8. doi: 10.1007/978-3-319-20376-8_34.

H. Read, K. Xynos, I. Sutherland, F. Roarson, P. Andriotis, and G. Oikonomou. An extensible platform for the forensic analysis of social media data. In T. Tryfonas and I. Askoxylakis, editors, Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015), Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015, pages 404{414. Springer International Publishing, 2015. ISBN 978-3-319-20376-8. doi: 10.1007/978-3-319-20376-8_36.


2014

P. Andriotis, A. Takasu, and T. Tryfonas. Smartphone Message Sentiment Analysis, pages 253-265. Springer Berlin Heidelberg, Berlin, Heidelberg, 2014. ISBN 978-3-662-44952-3. doi: 10.1007/978-3-662-44952-3_17.

P. Andriotis, T. Tryfonas, and G. Oikonomou. Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In T. Tryfonas and I. Askoxylakis, editors, Proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014), Held as Part of HCI International 2014, Crete, Greece, June 22-27, 2014, pages 115{126. Springer International Publishing, 2014. ISBN 978-3-319-07620-1. doi: 10.1007/978-3-319-07620-1_11.

P. Andriotis, T. Tryfonas, and Z. Yu. Poster: Breaking the Android pattern lock screen with neural networks and smudge attacks. ACM WiSec '14.

P. Andriotis, T. Tryfonas, G. Oikonomou, S. Li, Z. Tzermias, K. Xynos, H. Read, and V. Prevelakis. On the development of automated forensic analysis methods for mobile devices. In T. Holz and S. Ioannidis, editors, Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST 2014), Heraklion, Crete, June 30 - July 2, 2014, pages 212-213. Springer International Publishing, 2014. ISBN 978-3-319-08593-7. doi: 10.1007/978-3-319-08593-7_17.


2013

P. Andriotis, G. Oikonomou, and T. Tryfonas. Jpeg steganography detection with Benford's law. Digital Investigation, 9(3{4):246{257, 2013. ISSN 1742-2876. doi: 10.1016/j.diin.2013.01.005.

P. Andriotis, T. Tryfonas, G. Oikonomou, T. Spyridopoulos, A. Zaharis, A. Martini, and I. Askoxylakis. On two di erent methods for steganography detection in jpeg images with Benford's law. In Proceedings of the 7th Scienti c NATO Conference in Security and Protection of Information (SPI 2013), 2013.

P. Andriotis, T. Tryfonas, G. Oikonomou, and C. Yildiz. A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '13, pages 1-6, New York, NY, USA, 2013. ACM. ISBN 978-1-4503-1998-0. doi: 10.1145/2462096.2462098.

P. Andriotis, Z. Tzermias, A. Mparmpaki, S. Ioannidis, and G. Oikonomou. Multilevel visualization using enhanced social network analysis with smartphone data. International Journal of Digital Crime and Forensics (IJDCF), 5(4):34-54, 2013.


2012

P. Andriotis, G. Oikonomou, and T. Tryfonas. Forensic analysis of wireless networking evidence of Android smartphones. In 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pages 109-114, Dec 2012. doi: 10.1109/WIFS.2012.6412634.