A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm GC Tjhai, SM Furnell, M Papadaki, NL Clarke Computers & Security 29 (6), 712-723, 2010 | 124 | 2010 |
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ... Security and Communication Networks 5 (1), 3-14, 2012 | 120 | 2012 |
A review of using gaming technology for cyber-security awareness F Alotaibi, S Furnell, I Stengel, M Papadaki Int. J. Inf. Secur. Res.(IJISR) 6 (2), 660-666, 2016 | 116 | 2016 |
Active authentication for mobile devices utilising behaviour profiling F Li, N Clarke, M Papadaki, P Dowland International journal of information security 13, 229-244, 2014 | 114 | 2014 |
Assessing end-user awareness of social engineering and phishing A Karakasiliotis, SM Furnell, M Papadaki School of Computer and Information Science, Edith Cowan University, Perth …, 2006 | 91 | 2006 |
The impact of security and its antecedents in behaviour intention of using e-government services N Alharbi, M Papadaki, P Dowland Behaviour & Information Technology 36 (6), 620-636, 2017 | 86 | 2017 |
Threats and impacts in maritime cyber security K Jones, K Tam, M Papadaki IET, 2016 | 84 | 2016 |
Investigating the problem of IDS false alarms: An experimental study using Snort GC Tjhai, M Papadaki, SM Furnell, NL Clarke Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008 | 84 | 2008 |
Keystroke analysis as a method of advanced user authentication and response PS Dowland, SM Furnell, M Papadaki Security in the Information Society: Visions and Perspectives, 215-226, 2002 | 78 | 2002 |
A survey of cyber-security awareness in Saudi Arabia F Alotaibi, S Furnell, I Stengel, M Papadaki 2016 11th International Conference for Internet Technology and Secured …, 2016 | 77 | 2016 |
Social engineering: assessing vulnerabilities in practice T Bakhshi, M Papadaki, S Furnell Information Management & Computer Security 17 (1), 53-63, 2009 | 70 | 2009 |
Behaviour profiling for transparent authentication for mobile devices F Li, N Clarke, M Papadaki, P Dowland Academic Publishing Ltd, UK, 2011 | 63 | 2011 |
An investigation and survey of response options for Intrusion Response Systems (IRSs) NB Anuar, M Papadaki, S Furnell, N Clarke 2010 Information Security for South Africa, 1-8, 2010 | 61 | 2010 |
Behaviour profiling on mobile devices F Li, N Clarke, M Papadaki, P Dowland 2010 International conference on emerging security technologies, 77-82, 2010 | 59 | 2010 |
The challenge of measuring cyber-dependent crimes S Furnell, D Emm, M Papadaki Computer Fraud & Security 2015 (10), 5-12, 2015 | 53 | 2015 |
The problem of false alarms: Evaluation with snort and DARPA 1999 dataset GC Tjhai, M Papadaki, SM Furnell, NL Clarke Trust, Privacy and Security in Digital Business: 5th International …, 2008 | 46 | 2008 |
An experimental comparison of secret‐based user authentication technologies I Irakleous, SM Furnell, PS Dowland, M Papadaki Information Management & Computer Security 10 (3), 100-108, 2002 | 43 | 2002 |
Improving awareness of social engineering attacks A Smith, M Papadaki, SM Furnell Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013 | 42 | 2013 |
A Practical Assessment of Social Engineering Vulnerabilities. T Bakhshi, M Papadaki, S Furnell HAISA, 12-23, 2008 | 42 | 2008 |
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) NB Anuar, M Papadaki, S Furnell, N Clarke Security and communication networks 6 (9), 1087-1116, 2013 | 38 | 2013 |