Volgen
Theo Tryfonas
Titel
Geciteerd door
Geciteerd door
Jaar
The Internet of Things: a security point of view
S Li, T Tryfonas, H Li
Internet Research 26 (2), 337-359, 2016
3162016
Living labs, innovation districts and information marketplaces: A systems approach for smart cities
E Cosgrave, K Arbuthnot, T Tryfonas
Procedia Computer Science 16, 668-677, 2013
2732013
A pilot study on the security of pattern screen-lock methods and soft side channel attacks
P Andriotis, T Tryfonas, G Oikonomou, C Yildiz
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
1352013
A distributed consensus algorithm for decision-making in service-oriented Internet of Things
S Li, G Oikonomou, T Tryfonas, T Chen, L Xu
IEEE Transactions on Industrial Informatics 10 (2), 1461 - 1468, 2014
1142014
A Game Theoretic Defence Framework Against DoS/DDoS Cyber Attacks
T Spyridopoulos, G Karanikas, T Tryfonas, G Oikonomou
Computers & Security, 2013
1112013
Embedding security practices in contemporary information systems development approaches
T Tryfonas, E Kiountouzis, A Poulymenakou
Information Management & Computer Security 9 (4), 183-197, 2001
872001
Tidal stream power technology-state of the art
J King, T Tryfonas
Oceans 2009-Europe, 1-8, 2009
822009
Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method
P Andriotis, T Tryfonas, G Oikonomou
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
792014
Acquiring volatile operating system data tools and techniques
I Sutherland, J Evans, T Tryfonas, A Blyth
ACM SIGOPS Operating Systems Review 42 (3), 65-73, 2008
682008
IPv6 multicast forwarding in RPL-based wireless sensor networks
G Oikonomou, I Phillips, T Tryfonas
Wireless personal communications 73, 1089-1116, 2013
642013
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage
V Mee, T Tryfonas, I Sutherland
Digital Investigation 3 (3), 166-173, 2006
572006
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network
S Li, T Tryfonas, G Russell, P Andriotis
Cybernetics, IEEE Transactions on, 2016
522016
Forensic analysis of wireless networking evidence of android smartphones
P Andriotis, G Oikonomou, T Tryfonas
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
512012
Migrating to the cloud: lessons and limitations of ‘traditional’IS success models
I Khan, M Lewis, T Tryfonas
Procedia Computer Science 16, 737-746, 2013
492013
Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems
T Spyridopoulos, T Tryfonas, J May
System Safety Conference incorporating the Cyber Security Conference 2013 …, 2013
472013
Exploring the relationship between smart city policy and implementation
E Cosgrave, T Tryfonas
The First International Conference on Smart Systems, Devices and …, 2012
462012
The Smart City from a Public Value Perspective.
E Cosgrave, T Tryfonas, T Crick
2nd International Conference on ICT for Sustainability, ICT4S 2014, 369-377, 2014
442014
JPEG steganography detection with Benford's Law
P Andriotis, G Oikonomou, T Tryfonas
Digital Investigation 9 (3-4), 246-257, 2013
432013
A Qualitative Approach to Information Availability
T Tryfonas, D Gritzalis, S Kokolakis
Information Security for Global Information Infrastructures: IFIP TC11 …, 2000
42*2000
The long and winding road: MBSE adoption for functional avionics of spacecraft
J Gregory, L Berthoud, T Tryfonas, A Rossignol, L Faure
Journal of Systems and Software 160, 110453, 2020
392020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20