Maria Papadaki
Maria Papadaki
Associate Professor in Cyber Security, University of Derby
Verified email at
Cited by
Cited by
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
GC Tjhai, SM Furnell, M Papadaki, NL Clarke
Computers & Security 29 (6), 712-723, 2010
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
A review of using gaming technology for cyber-security awareness
F Alotaibi, S Furnell, I Stengel, M Papadaki
Int. J. Inf. Secur. Res.(IJISR) 6 (2), 660-666, 2016
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13, 229-244, 2014
Assessing end-user awareness of social engineering and phishing
A Karakasiliotis, SM Furnell, M Papadaki
School of Computer and Information Science, Edith Cowan University, Perth …, 2006
The impact of security and its antecedents in behaviour intention of using e-government services
N Alharbi, M Papadaki, P Dowland
Behaviour & Information Technology 36 (6), 620-636, 2017
Threats and impacts in maritime cyber security
K Jones, K Tam, M Papadaki
IET, 2016
Investigating the problem of IDS false alarms: An experimental study using Snort
GC Tjhai, M Papadaki, SM Furnell, NL Clarke
Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008
Keystroke analysis as a method of advanced user authentication and response
PS Dowland, SM Furnell, M Papadaki
Security in the Information Society: Visions and Perspectives, 215-226, 2002
A survey of cyber-security awareness in Saudi Arabia
F Alotaibi, S Furnell, I Stengel, M Papadaki
2016 11th International Conference for Internet Technology and Secured …, 2016
Social engineering: assessing vulnerabilities in practice
T Bakhshi, M Papadaki, S Furnell
Information Management & Computer Security 17 (1), 53-63, 2009
Behaviour profiling for transparent authentication for mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Academic Publishing Ltd, UK, 2011
An investigation and survey of response options for Intrusion Response Systems (IRSs)
NB Anuar, M Papadaki, S Furnell, N Clarke
2010 Information Security for South Africa, 1-8, 2010
Behaviour profiling on mobile devices
F Li, N Clarke, M Papadaki, P Dowland
2010 International conference on emerging security technologies, 77-82, 2010
The challenge of measuring cyber-dependent crimes
S Furnell, D Emm, M Papadaki
Computer Fraud & Security 2015 (10), 5-12, 2015
The problem of false alarms: Evaluation with snort and DARPA 1999 dataset
GC Tjhai, M Papadaki, SM Furnell, NL Clarke
Trust, Privacy and Security in Digital Business: 5th International …, 2008
An experimental comparison of secret‐based user authentication technologies
I Irakleous, SM Furnell, PS Dowland, M Papadaki
Information Management & Computer Security 10 (3), 100-108, 2002
Improving awareness of social engineering attacks
A Smith, M Papadaki, SM Furnell
Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013
A Practical Assessment of Social Engineering Vulnerabilities.
T Bakhshi, M Papadaki, S Furnell
HAISA, 12-23, 2008
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)
NB Anuar, M Papadaki, S Furnell, N Clarke
Security and communication networks 6 (9), 1087-1116, 2013
The system can't perform the operation now. Try again later.
Articles 1–20