Ioannis Agrafiotis
University of Oxford
H-index: 19
Europe-United Kingdom
Top articles of Ioannis Agrafiotis
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Ransomware as a Predator: Modelling the Systemic Risk to Prey | Digital Threats: Research and Practice | Louise Axon Arnau Erola Ioannis Agrafiotis Ganbayar Uuganbayar Michael Goldsmith | 2023/10/20 |
Cybersecurity Risks of Changing Workplaces: A Global Survey of Shifts in Working from Home Through the Covid-19 Pandemic | Available at SSRN 4522839 | Patricia Esteve-Gonzalez William H Dutton Sadie Creese Ioannis Agrafiotis | 2023/7/27 |
Cybersecurity implications of changing patterns of office, home, and hybrid work: An exploratory global survey | Home, and Hybrid Work: An Exploratory Global Survey (January 11, 2023) | Patricia Esteve-Gonzalez William H Dutton Sadie Creese Ioannis Agrafiotis | 2023/1/11 |
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations | Journal of Information Security and Applications | Arnau Erola Ioannis Agrafiotis Michael Goldsmith Sadie Creese | 2022/6/1 |
A system to calculate Cyber Value-at-Risk | Computers & Security | Arnau Erola Ioannis Agrafiotis Jason RC Nurse Louise Axon Michael Goldsmith | 2022 |
A Bayesian approach to insider threat detection | Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications | Alexander Wall Ioannis Agrafiotis | 2021/8/30 |
Control effectiveness: A capture-the-flag study | Arnau Erola Louise Axon Alastair Janse van Rensburg Ioannis Agrafiotis Michael Goldsmith | 2021/8/17 | |
Assessing a decision support tool for SOC analysts | Digital Threats: Research and Practice | Jassim Happa Ioannis Agrafiotis Martin Helmhout Thomas Bashford-Rogers Michael Goldsmith | 2021/6/8 |
Guest Editorial: Special Issue on Advances in Insider Threat Detection. | J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. | Ioannis Agrafiotis Gökhan Kul | 2021 |
Black-box attacks via the speech interface using linguistically crafted input | Mary K Bispham Alastair Janse van Rensburg Ioannis Agrafiotis Michael Goldsmith | 2020 | |
The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms | Mary K Bispham Ioannis Agrafiotis Michael Goldsmith | 2020 | |
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) | Lukas Halgas Ioannis Agrafiotis Jason R. C. Nurse | 2020 | |
The data that drives cyber insurance: A study into the underwriting and claims processes | Jason R. C. Nurse Louise Axon Arnau Erola Ioannis Agrafiotis Michael Goldsmith | 2020 |