Остановите войну!
for scientists:
default search action
Maria Papadaki
- > Home > Persons > Maria Papadaki
Publications
- 2024
- [c38]Aseel Aldabjan, Steven Furnell, Xavier Carpent, Maria Papadaki:
Cybersecurity Incident Response Readiness in Organisations. ICISSP 2024: 262-269 - 2023
- [c36]Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell:
Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats. HAISA 2023: 349-363 - 2022
- [c33]Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Steven Furnell:
The Importance of the Job Role in Social Media Cybersecurity Training. EuroS&P Workshops 2022: 454-462 - 2021
- [j26]Alaa Tolah, Steven M. Furnell, Maria Papadaki:
An empirical analysis of the information security culture key factors framework. Comput. Secur. 108: 102354 (2021) - [j24]Ram Herkanaidu, Steven M. Furnell, Maria Papadaki:
Towards a cross-cultural education framework for online safety awareness. Inf. Comput. Secur. 29(4): 664-679 (2021) - 2020
- [c28]Ram Herkanaidu, Steven M. Furnell, Maria Papadaki:
Towards a Cross-Cultural Education Framework for Online Safety Awareness. HAISA 2020: 47-57 - 2019
- [c25]Alaa Tolah, Steven M. Furnell, Maria Papadaki:
A Comprehensive Framework for Understanding Security Culture in Organizations. World Conference on Information Security Education 2019: 143-156 - 2018
- [c23]Ram Herkanaidu, Steven Furnell, Maria Papadaki, Tharabun Khuchinda:
Designing an Anti-Cyberbullying Programme in Thailand. HAISA 2018: 111-122 - 2017
- [c22]Alaa Tolah, Steven Furnell, Maria Papadaki:
A comperhansive framework for cultivating and assessing Information Security Culture . HAISA 2017: 52-64 - [c21]Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki:
Enhancing cyber security awareness with mobile games. ICITST 2017: 129-134 - 2016
- [j19]Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Graphical One-Time Password (GOTPass): A usability evaluation. Inf. Secur. J. A Glob. Perspect. 25(1-3): 94-108 (2016) - [c20]Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki:
A survey of cyber-security awareness in Saudi Arabia. ICITST 2016: 154-158 - 2015
- [j17]Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Secure Graphical One Time Password (GOTPass): An Empirical Study. Inf. Secur. J. A Glob. Perspect. 24(4-6): 207-220 (2015) - 2014
- [j14]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A response selection model for intrusion response systems: Response Strategy Model (RSM). Secur. Commun. Networks 7(11): 1831-1848 (2014) - [c19]Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Alternative Graphical Authentication for Online Banking Environments. HAISA 2014: 122-136 - 2013
- [j13]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). Secur. Commun. Networks 6(9): 1087-1116 (2013) - 2012
- [c14]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A Response Strategy Model for Intrusion Response Systems. SEC 2012: 573-578 - 2011
- [j10]George Magklaras, Steven Furnell, Maria Papadaki:
LUARM: An Audit Engine for Insider Misuse Detection. Int. J. Digit. Crime Forensics 3(3): 37-49 (2011) - [c13]George Magklaras, Steven Furnell, Maria Papadaki:
LUARM – An audit engine for insider misuse detection. WDFIA 2011: 133-148 - 2010
- [j9]Gina C. Tjhai, Steven Furnell, Maria Papadaki, Nathan L. Clarke:
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. Comput. Secur. 29(6): 712-723 (2010) - [j8]Benjamin George Sanders, Paul Dowland, Shirley Atkinson, Daniel Zahra, Steven Furnell, Maria Papadaki:
Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments. J. Multim. Process. Technol. 1(3): 181-193 (2010) - [j7]Maria Papadaki, Steven Furnell:
Vulnerability management: an attitude of mind? Netw. Secur. 2010(10): 4-8 (2010) - [c10]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
An investigation and survey of response options for Intrusion Response Systems (IRSs). ISSA 2010 - [c9]Benjamin George Sanders, Vivian Chen, Daniel Zahra, Paul Dowland, Shirley Atkinson, Maria Papadaki, Steven Furnell:
Online addiction: privacy risks in online gaming environments. MEDES 2010: 114-121 - [c8]Tarik Ibrahim, Steven Furnell, Maria Papadaki, Nathan L. Clarke:
Assessing the Usability of End-User Security Software. TrustBus 2010: 177-189 - 2009
- [j6]Taimur Bakhshi, Maria Papadaki, Steven Furnell:
Social engineering: assessing vulnerabilities in practice. Inf. Manag. Comput. Secur. 17(1): 53-63 (2009) - [c7]Aaron Smith, Maria Papadaki, Steven M. Furnell:
Improving Awareness of Social Engineering Attacks. World Conference on Information Security Education 2009: 249-256 - 2008
- [c6]Taimur Bakhshi, Maria Papadaki, Steven Furnell:
A Practical Assessment of Social Engineering Vulnerabilities. HAISA 2008: 12-23 - [c5]Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
Investigating the problem of IDS false alarms: An experimental study using Snort. SEC 2008: 253-267 - [c4]Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. TrustBus 2008: 139-150 - 2007
- [j5]Jörg Preuß, Steven Furnell, Maria Papadaki:
Considering the potential of criminal profiling to combat hacking. J. Comput. Virol. 3(2): 135-141 (2007) - 2006
- [j4]Maria Papadaki, Steven Furnell:
Achieving automated intrusion response: a prototype implementation. Inf. Manag. Comput. Secur. 14(3): 235-251 (2006) - 2005
- [j2]Maria Papadaki, Steven M. Furnell:
Informing the decision process in an automated intrusion response system. Inf. Secur. Tech. Rep. 10(3): 150-161 (2005) - 2003
- [c3]Maria Papadaki, Steven Furnell, Benn Lines, Paul L. Reynolds:
Operational Characteristics of an Automated Intrusion Response System. Communications and Multimedia Security 2003: 65-75 - 2002
- [j1]I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki:
An experimental comparison of secret-based user authentication technologies. Inf. Manag. Comput. Secur. 10(3): 100-108 (2002) - [c2]Paul Dowland, Steven Furnell, Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response. SEC 2002: 215-226 - 2001
- [c1]Steven Furnell, Maria Papadaki, George Magklaras, A. Alayed:
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks. Conference on Information Security Management & Small Systems Security 2001: 87-98
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-16 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint