- A328, Portland Square, Drake Circus
- +44 1752 586260
- maria.papadaki@plymouth.ac.uk

Profiles
Dr Maria Papadaki
Associate Professor of Cyber Security
School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)
Key publications are highlighted
Journals
Articles
2019
'Fifteen years of phishing: can technology save us?'
Computer Fraud & Security
2019,
(7)
11-16
, DOI
2016
'The impact of security and its antecedents in behaviour intention of using e-government services'
Behaviour and Information Technology
36,
(6)
620-636
, DOI
2016
'Graphical One-Time Password (GOTPass): A usability evaluation'
Information Security Journal: A Global Perspective
25,
(1-3)
Publisher Site
, DOI
PEARL
2016
'Threats and Impacts in Maritime Cyber Security'
Engineering & Technology Reference
Publisher Site
PEARL
2015
'Secure Graphical One Time Password (GOTPass): An Empirical Study'
Information Security Journal: A Global Perspective
24,
(4-6)
207-220
, DOI
2015
'The challenge of measuring cyber-dependent crimes'
Computer Fraud & Security
2015,
(10)
5-12
, DOI
2014
'Vulnerability of opportunistic parking assistance systems to vehicular node selfishness'
Computer Communications
48,
159-170
, DOI
2014
'FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks'
The Computer Journal
58,
(4)
892-903
, DOI
PEARL
2013
'A response selection model for intrusion response systems: Response Strategy Model (RSM)'
SECURITY AND COMMUNICATION NETWORKS
7,
(11)
1831-1848
, DOI
2013
'Active authentication for mobile devices utilising behaviour profiling'
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
13,
(3)
229-244
, DOI
PEARL
2013
'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)'
Security and Communication Networks
6,
(9)
1087-1116
, DOI
2012
'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)'
Security and Communication Networks
, DOI
2011
'A risk index model for security incident prioritisation'
2011
'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers'
SECURITY AND COMMUNICATION NETWORKS
5,
(1)
3-14
, DOI
2011
'LUARM: An Audit Engine for Insider Misuse Detection'
International Journal of Digital Crime and Forensics (IJDCF)
3,
37-49
2011
'Misuse detection for mobile devices using behaviour profiling'
International Journal of Cyber Warfare and Terrorism (IJCWT)
1,
41-53
2010
'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm'
COMPUTERS & SECURITY
29,
(6)
712-723
, DOI
2010
'A preliminary two-stage alarm correlation and filtering system using SOM neural network and< i> K</i>-means algorithm'
Computers & Security
29,
712-723
2010
'An investigation and survey of response options for Intrusion Response Systems (IRSs)'
Information Security for South Africa (ISSA)
2010,
1-8
2010
'Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments'
JMPT
1,
181-193
2007
'An assessment of end-user vulnerability to phishing attacks'
Journal of Information Warfare
6,
(1)
17-28
2007
'Considering the potential of criminal profiling to combat hacking'
Journal in Computer Virology
3,
135-141
2006
'Achieving Automated Intrusion Response: A Prototype Implementation'
Information Management & Computer Security
14,
(3)
235-251
2005
'Informing the decision process in an automated intrusion response system'
Information Security Technical Report
10,
(3)
150-161
2004
'IDS or IPS: what is best?'
Network Security
7,
15-19
2003
'Enhancing response in intrusion detection systems'
Journal of Information Warfare
2,
(1)
90-102
2002
'An experimental comparison of secret-based user authentication technologies'
Information Management & Computer Security
10,
(3)
100-108
2002
'An experimental comparison of secret-based user authentication technologies'
Information Management and Computer Security
10,
(2-3)
100-108
2002
'Keystroke analysis as a method of advanced user authentication and response'
Security in the Information Society: Visions and Perspectives
86,
215-226
2001
'Security vulnerabilities and system intrusions-the need for automatic response frameworks'
Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, Setembro de
0
'Scare tactics – A viable weapon in the security war?'
Computer Fraud & Security
2009,
(12)
6-10
0
'Social engineering: assessing vulnerabilities in practice'
Information Management and Computer Security
17,
(1)
53-63
0
'Testing our defences or defending our tests: the obstacles to performing security assessment'
Computer Fraud & Security
2008,
(5)
8-12
0
'Vulnerability management: an attitude of mind?'
Network Security
2010,
(10)
4-8
Conference Papers
2019
'A Comprehensive Framework for Understanding Security Culture in Organizations'
Springer International Publishing
143-156
, DOI
2019
'Current cybersecurity maturity models: How effective in healthcare cloud?'
211-222
2018
'Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis'
2018 Global Information Infrastructure and Networking Symposium (GIIS)
23/10/2018
25/10/2018
IEEE
, DOI
PEARL
2017
'Enhancing cyber security awareness with mobile games'
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
11/12/2017
14/12/2017
IEEE
, DOI
2016
'A survey of cyber-security awareness in Saudi Arabia'
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
05/12/2016
07/12/2016
IEEE
, DOI
2014
'Security challenges of E-government adoption based on end users' perspective'
2014 9th International Conference for Internet Technology and Secured Transactions (ICITST)
08/12/2014
10/12/2014
IEEE
, DOI
2014
'Alternative graphical authentication for online banking environments'
122-136
2013
'Opportunistically-assisted parking search: A story of free riders, selfish liars and bona fide mules'
2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS)
18/03/2013
20/03/2013
IEEE
, DOI
2013
'IT Application Outsourcing in Europe: Long-Term Outcomes, Success Factors and Implications for ITO Maturity'
2013 46th Hawaii International Conference on System Sciences (HICSS)
07/01/2013
10/01/2013
IEEE
, DOI
2012
'A Response Strategy Model for Intrusion Response Systems'
Springer Boston
573-578
2012
'Education in the 'virtual' community: Can beating Malware Man teach users about social networking security?'
33-39
2011
'Behaviour Profiling for Transparent Authentication for Mobile Devices'
307-314
2010
'Assessing the Usability of End-User Security Software'
177-189
2010
'Investigating the problem of IDS false alarms: An experimental study using Snort'
253-267
2010
'ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success'
355-359
2010
'Online addiction: privacy risks in online gaming environments'
114-121
2009
'Assessing the Usability of Personal Internet Security Tools'
102-111
2008
'Evaluating the usability impacts of security interface adjustments in Word 2007'
48-55
2008
'A Practical Assessment of Social Engineering Vulnerabilities'
Lulu. com
12-23
2008
'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset'
139-+
2003
'Operational characteristics of an automated intrusion response system'
65-75
2003
'Operational characteristics of an automated intrusion response system'
65-75
2002
'A Response-Orientated Taxomony of IT System Intrusions'
Roccetti M
SCS Europe
87-95
2002
'Keystroke Analysis as a Method of Advanced User Authentication and Response'
Ghonaimy A; El-Hadidi MT; Aslan HK
Kluwer
215-226
Publisher Site
2001
'Security and System Intrusions - The need for Automatic Response Frameworks'
Eloff JHP; von Solms R; Dhillon G
Kluwer Academic Publishers
87-97
0
'Investigating the Evasion Resilience of Network Intrusion Detection Systems'
Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, UK,
02/07/2007
03/07/2007
327-334
Links
Further information relating to research publications, professional activities, research interests etc., can be found at this web site.
Find out more about:
School of Engineering, Computing and Mathematics