Skip to main content

Ioannis Agrafiotis : Publications

Click here to download all publications in a single bibtex file

@article{jowua18-9-4-04,
  title = "Modeling Advanced Persistent Threats to enhance anomaly detection techniques",
  author = "Cheyenne Atapour and Ioannis Agrafiotis and Sadie Creese",
  year = "2018",
  journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)",
  month = "December",
  number = "4",
  pages = "71--102",
  volume = "9",
}
@article{bispham2018taxonomy,
  title = "A taxonomy of attacks via the speech interface",
  author = "Bispham, Mary K and Agrafiotis, Ioannis and Goldsmith, Michael",
  year = "2018",
  booktitle = "Proceedings of CYBER 2018 : The Third International Conference on Cyber-Technologies and Cyber-Systems",
  publisher = "ThinkMind Digital Library for the Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018)",
}
@article{giasemidis2018semi,
  title = "A semi-supervised approach to message stance classification",
  author = "Giasemidis, Georgios and Kaplis, Nikolaos and Agrafiotis, Ioannis and Nurse, Jason",
  year = "2018",
  journal = "IEEE Transactions on Knowledge and Data Engineering",
  publisher = "IEEE",
}
@article{bada2018reviewing,
  title = "Reviewing national cybersecurity awareness in Africa: An empirical study",
  author = "Bada, Maria and Von Solms, Basie and Agrafiotis, Ioannis",
  year = "2018",
  publisher = "CYBER 2018, The Third International Conference on Cyber-Technologies and Cyber-Systems",
}
@article{hameed2018analysing,
  title = "Analysing trends and success factors of international cybersecurity capacity-building initiatives",
  author = "Hameed, F and Agrafiotis, I and Weisser, C and Goldsmith, M and Creese, S",
  year = "2018",
  journal = "SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies",
  publisher = "IARIA",
}
@article{zhang2018state,
  title = "A state machine system for insider threat detection",
  author = "Zhang, H and Agrafiotis, I and Erola, A and Creese, S and Goldsmith, M",
  year = "2018",
  journal = "The fifth International Workshop on Graphical Models for Security (GramSec), in conjunction with FLoC 2018",
  publisher = "Springer",
}
@article{doi:10.1093/cybsec/tyy006,
  title = "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate",
  author = "Agrafiotis, Ioannis and Nurse, Jason R C and Goldsmith, Michael and Creese, Sadie and Upton, David",
  year = "2018",
  journal = "Journal of Cybersecurity",
  pages = "tyy006",
  url = "http://dx.doi.org/10.1093/cybsec/tyy006",
  doi = "10.1093/cybsec/tyy006",
}
@article{kingston2018using,
  title = "Using semantic clustering to support situation awareness on Twitter: the case of world views",
  author = "Kingston, Charlie and Nurse, Jason RC and Agrafiotis, Ioannis and Milich, Andrew Burke",
  year = "2018",
  journal = "Human-centric Computing and Information Sciences",
  number = "1",
  pages = "22",
  publisher = "SpringerOpen",
  volume = "8",
}
@inproceedings{akinrolabu2018challenge,
  title = "The challenge of detecting sophisticated attacks: Insights from SOC Analysts",
  author = "Akinrolabu, Olusola and Agrafiotis, Ioannis and Erola, Arnau",
  year = "2018",
  booktitle = "Proceedings of the 13th International Conference on Availability, Reliability and Security",
  organization = "ACM",
  pages = "55",
}
@article{Woods2017,
  title = "Mapping the coverage of security controls in cyber insurance proposal forms",
  author = "Woods, Daniel and Agrafiotis, Ioannis and Nurse, Jason R. C. and Creese, Sadie",
  year = "2017",
  issn = "1869-0238",
  journal = "Journal of Internet Services and Applications",
  month = "Jul",
  number = "1",
  pages = "8",
  url = "https://doi.org/10.1186/s13174-017-0059-y",
  volume = "8",
  doi = "10.1186/s13174-017-0059-y",
}
@article{agrafiotis2017formalising,
  title = "Formalising policies for insider-threat detection: A tripwire grammar",
  author = "Agrafiotis, Ioannis and Erola, Arnau and Goldsmith, Michael and Creese, Sadie",
  year = "2017",
  journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)",
  number = "1",
  pages = "26--43",
  volume = "8",
}
@article{erola2017richerpicture,
  title = "RicherPicture: Semi-automated cyber defence using context-aware data analytics",
  author = "Erola, Arnau and Agrafiotis, Ioannis and Happa, Jassim and Goldsmith, Michael and Creese, Sadie and Legg, Philip",
  year = "2017",
  publisher = "IEEE",
}
@conference{2017-has-nurse-et-al,
  title = "An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System",
  author = "Jason R.C. Nurse; Ioannis Agrafiotis; Arnau Erola; Maria Bada; Taylor Roberts; Meredydd Williams; Michael Goldsmith; Sadie Creese",
  year = "2017",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 19th International Conference on Human-Computer Interaction (HCII)",
  note = "Accepted for publication",
  publisher = "Springer",
  doi = "10.1007/978-3-319-58460-7_26",
}
@techreport{RR-17-01,
  title = "The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance",
  author = "Ioannis Agrafiotis and Sadie Creese and Michael Goldsmith and Jason R.C. Nurse and David Upton",
  year = "2017",
  address = "Oxford, UK",
  institution = "DCS",
  number = "RR-17-01",
  pages = "87",
}
@article{2016-cfs-ein,
  title = "Insider threat response and recovery strategies in financial services firms",
  author = "Jacqueline Eggenschwiler, Ioannis Agrafiotis, Jason R. C. Nurse",
  year = "2016",
  issn = "1361-3723",
  journal = "Computer Fraud & Security",
  publisher = "Elsevier Ltd.",
  doi = "10.1016/S1361-3723(16)30091-4",
}
@article{writ2016,
  title = "Validating an insider threat detection system: A real scenario perspective",
  author = "Agrafiotis, Ioannis and Erola, Arnau and Happa, Jassim and Goldsmith, Michael and Creese, Sadie",
  year = "2016",
  journal = "IEEE Symposium on Security and Privacy, Workshop on Research for Insider Threats (WRIT)",
}
@inproceedings{rashid2016new,
  title = "A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models",
  author = "Rashid, Tabish and Agrafiotis, Ioannis and Nurse, Jason RC",
  year = "2016",
  booktitle = "Proceedings of the 2016 International Workshop on Managing Insider Security Threats",
  organization = "ACM",
  pages = "47--56",
}
@inproceedings{agrafiotis2016tripwire,
  title = "A tripwire grammar for insider threat detection",
  author = "Agrafiotis, Ioannis and Erola, Arnau and Goldsmith, Michael and Creese, Sadie",
  year = "2016",
  booktitle = "Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats",
  organization = "ACM",
  pages = "105--108",
}
@conference{socinfo2016-gsanpw,
  title = "Determining the veracity of rumours on Twitter",
  author = "Giasemidis, Georgios and Singleton, Colin and Agrafiotis, Ioannis and Nurse, Jason R.C. and Pilgrim, Alan and Willis, Chris",
  year = "2016",
  booktitle = "8th International Conference on Social Informatics (SocInfo 2016)",
  pages = "185--205",
  publisher = "Springer",
  doi = "10.1007/978-3-319-47880-7_12",
}
@article{cfs2015agrafiotisetal,
  title = "Identifying attack patterns for insider threat detection",
  author = "Ioannis Agrafiotis and Jason R. C. Nurse and Oliver Buckley and Phil Legg and Sadie Creese and Michael Goldsmith",
  year = "2015",
  issn = "1361-3723",
  journal = "Computer Fraud & Security",
  month = "July",
  number = "7",
  pages = "9--17",
  url = "http://www.journals.elsevier.com/computer-fraud-and-security",
  doi = "10.1016/S1361-3723(15)30066-X",
}
@inproceedings{nurse2015,
  title = "Information trustworthiness as a solution to the misinformation problems in social media",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn",
  year = "2015",
  booktitle = "International Conference on Cyber Security for Sustainable Society",
  issn = "2052-8604",
  pages = "28-35",
}
@article{agrafiotis2014towards,
  title = "Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection",
  author = "Agrafiotis, Ioannis and Legg, Philip and Goldsmith, Michael and Creese, Sadie",
  year = "2014",
  journal = "Journal of Internet Services and Information Security (JISIS)",
  number = "4",
  pages = "127--137",
  volume = "4",
}
@article{nagcl14,
  title = "Two sides of the coin: measuring and communicating the trustworthiness of online information",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen",
  year = "2014",
  journal = "Journal of Trust Management",
  keywords = "Information trustworthiness; Information quality; Trust metrics; Trust visuals; Decision-making; Social-media content; Risk communication",
  number = "5",
  publisher = "Springer Open",
  url = "http://www.journaloftrustmanagement.com/content/1/1/5",
  volume = "1",
  doi = "10.1186/2196-064X-1-5",
}
@conference{nagclpj2014,
  title = "Managing the influence of social media using information trust",
  author = "Jason R.C. Nurse and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese and Koen Lamberts and Darren Price and Glyn Jones",
  year = "2014",
  booktitle = "Social Influence in the Information Age Conference",
}
@inproceedings{nlbawwugc14,
  title = "A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches",
  author = "Nurse, Jason R.C. and Legg, Philip A. and Buckley, Oliver and Agrafiotis, Ioannis and Wright, Gordon and Whitty, Monica and Upton, David and Goldsmith, Michael and Creese, Sadie",
  year = "2014",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI)",
  publisher = "Springer",
  doi = "10.1007/978-3-319-07620-1_24",
}
@techreport{agrafiotis2015as,
  title = "Supplementary document for Identifying attack patterns for insider-threat detection",
  author = "Agrafiotis I., Nurse J., Buckley O., Legg P., Creese S., Goldsmith M.",
  year = "2014",
}
@article{legg2013mist,
  title = "Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection",
  author = "Philip A. Legg, Nick Moffat, Jason R.C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese",
  year = "2013",
  issn = "2093-5382",
  journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications",
  number = "4",
  pages = "20-37",
  url = "http://isyou.info/jowua/papers/jowua-v4n4-2.pdf",
  volume = "4",
}
@inproceedings{cybervis,
  title = "CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise",
  author = "Sadie Creese and Michael Goldsmith and Nick Moffat and Jassim Happa and Ioannis Agrafiotis",
  year = "2013",
  booktitle = "Proceedings of the 13th annual IEEE Conference on Technologies for Homeland Security",
}
@inproceedings{7027,
  title = "Communicating Trustworthiness using Radar Graphs: A Detailed Look",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2013",
  booktitle = "The 11th International Conference on Privacy, Security and Trust (PST)",
  keywords = "Trustworthiness factors; trustworthiness visualisation; risk communication; communicating trustworthiness and quality; user studies",
  publisher = "IEEE",
  doi = "10.1109/PST.2013.6596085",
}
@inproceedings{7026,
  title = "Building Confidence in Information-Trustworthiness Metrics for Decision Support",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2013",
  booktitle = "The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)",
  keywords = "Trust metrics; trustworthiness visualisation; decision-making; risk communication; information quality",
  publisher = "IEEE",
  doi = "10.1109/TrustCom.2013.6",
}
@incollection{agrafiotis2012formalising,
  title = "Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation",
  author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael",
  year = "2012",
  booktitle = "Privacy and Identity Management for Life",
  pages = "232--244",
  publisher = "Springer Boston",
}
@incollection{agrafiotis2012developing,
  title = "Developing a Strategy for Automated Privacy Testing Suites",
  author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael",
  year = "2012",
  booktitle = "Privacy and Identity Management for Life",
  pages = "32--44",
  publisher = "Springer Boston",
}
@inproceedings{5557,
  title = "Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith",
  year = "2011",
  booktitle = "Proceedings of the IFIP Summer School 2011",
  month = "September",
}
@inproceedings{5556,
  title = "Developing a Strategy for Automated Privacy Testing Suites",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith",
  year = "2011",
  booktitle = "Proceedings of the IFIP Summer School",
  month = "September 2011",
}
@incollection{agrafiotis2011applying,
  title = "Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements",
  author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick",
  year = "2011",
  booktitle = "Privacy and Identity Management for Life",
  pages = "271--282",
  publisher = "Springer IFIP AICT",
  volume = "352",
}
@inproceedings{5567,
  title = "Applying formal methods to describe the privacy-control requirements in real case-study scenario: emerging ambiguities and proposed solutions",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou",
  year = "2010",
  booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School",
}
@inproceedings{5565,
  title = "Defining Consent and Revocation Policies",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou, M Casassa Mont, S. Pearson",
  year = "2010",
  booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School",
}
@incollection{agrafiotis2010reaching,
  title = "Reaching for informed revocation: shutting off the tap on personal data",
  author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick",
  year = "2010",
  booktitle = "Privacy and Identity Management for Life",
  pages = "246--258",
  publisher = "Springer IFIP AICT",
  volume = "320",
}
@inbook{5576,
  title = "Reaching for Informed Revocation: Shutting Off the Tap on Personal Data",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou",
  year = "2009",
  booktitle = "Privacy and Identity Management for Life, Proceedings of 5th PrimeLife/IFIP International Summer School",
  publisher = "Springer IFIP AICT 320",
}