


default search action
Maria Papadaki
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e8]Marinos Themistocleous
, Nikolaos P. Bakas
, George Kokosalakis
, Maria Papadaki:
Information Systems - 21st European, Mediterranean, and Middle Eastern Conference, EMCIS 2024, Athens, Greece, September 2-3, 2024, Proceedings, Part I. Lecture Notes in Business Information Processing 535, Springer 2025, ISBN 978-3-031-81321-4 [contents] - [e7]Marinos Themistocleous
, Nikolaos P. Bakas
, George Kokosalakis
, Maria Papadaki:
Information Systems - 21st European, Mediterranean, and Middle Eastern Conference, EMCIS 2024, Athens, Greece, September 2-3, 2024, Proceedings, Part II. Lecture Notes in Business Information Processing 536, Springer 2025, ISBN 978-3-031-81324-5 [contents] - 2024
- [c40]Fai Ben Salamah
, Marco A. Palomino
, Maria Papadaki
, Matthew J. Craven
, Steven Furnell
:
The Influence of Human Factors on Adaptive Social Media Cybersecurity Training and Education. HAISA (2) 2024: 3-15 - [c39]Maria Papadaki, Marinos Themistocleous, Paulo Da Cunha:
Introduction to the Minitrack on Blockchain Cases and Innovations. HICSS 2024: 5876-5877 - [c38]Aseel Aldabjan, Steven Furnell, Xavier Carpent, Maria Papadaki:
Cybersecurity Incident Response Readiness in Organisations. ICISSP 2024: 262-269 - [e6]Maria Papadaki, Marinos Themistocleous
, Khalid Al Marri, Marwan Al-Zarouni:
Information Systems - 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part I. Lecture Notes in Business Information Processing 501, Springer 2024, ISBN 978-3-031-56477-2 [contents] - [e5]Maria Papadaki, Marinos Themistocleous
, Khalid Al Marri, Marwan Al-Zarouni:
Information Systems - 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II. Lecture Notes in Business Information Processing 502, Springer 2024, ISBN 978-3-031-56480-2 [contents] - 2023
- [j27]Marinos Themistocleous, Paulo Rupino da Cunha
, Evangelos Tabakis
, Maria Papadaki
:
Towards cross-border CBDC interoperability: insights from a multivocal literature review. J. Enterp. Inf. Manag. 36(5): 1296-1318 (2023) - [c37]Nikolaos P. Bakas
, Maria Papadaki
, Evgenia Vagianou, Ioannis T. Christou, Savvas A. Chatzichristofis
:
Integrating LLMs in Higher Education, Through Interactive Problem Solving and Tutoring: Algorithmic Approach and Use Cases. EMCIS (1) 2023: 291-307 - [c36]Fai Ben Salamah
, Marco A. Palomino
, Maria Papadaki
, Matthew J. Craven
, Steven Furnell
:
Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats. HAISA 2023: 349-363 - [e4]Maria Papadaki, Paulo Rupino da Cunha
, Marinos Themistocleous
, Klitos Christodoulou:
Information Systems - 19th European, Mediterranean, and Middle Eastern Conference, EMCIS 2022, Virtual Event, December 21-22, 2022, Proceedings. Lecture Notes in Business Information Processing 464, Springer 2023, ISBN 978-3-031-30693-8 [contents] - 2022
- [c35]Atifa Albalooshi
, Khalifa Alebri
, Maria Papadaki:
Bibliometric Analysis of Publications on the Evacuation of Hazards Using GIS as a Decision Support Tool from the Scopus Database. EMCIS 2022: 630-648 - [c34]Hind Lootah
, Juma Aldhaheri
, Maria Papadaki:
A Bibliometric Analysis of Digital Transformation for a Resilient Organization. EMCIS 2022: 649-662 - [c33]Fai Ben Salamah, Marco A. Palomino, Maria Papadaki
, Steven Furnell:
The Importance of the Job Role in Social Media Cybersecurity Training. EuroS&P Workshops 2022: 454-462 - [e3]Marinos Themistocleous
, Maria Papadaki:
Information Systems - 18th European, Mediterranean, and Middle Eastern Conference, EMCIS 2021, Virtual Event, December 8-9, 2021, Proceedings. Lecture Notes in Business Information Processing 437, Springer 2022, ISBN 978-3-030-95946-3 [contents] - 2021
- [j26]Alaa Tolah
, Steven M. Furnell
, Maria Papadaki
:
An empirical analysis of the information security culture key factors framework. Comput. Secur. 108: 102354 (2021) - [j25]Oluwafemi Oriola, Adesesan B. Adeyemo, Maria Papadaki
, Eduan Kotzé
:
A collaborative approach for national cybersecurity incident management. Inf. Comput. Secur. 29(3): 457-484 (2021) - [j24]Ram Herkanaidu, Steven M. Furnell, Maria Papadaki
:
Towards a cross-cultural education framework for online safety awareness. Inf. Comput. Secur. 29(4): 664-679 (2021) - [j23]Maria Papadaki
, Ioannis Karamitsos
:
Blockchain technology in the Middle East and North Africa region. Inf. Technol. Dev. 27(3): 617-634 (2021) - [j22]Maria Papadaki, Ioannis Karamitsos, Marinos Themistocleous:
ViewpointCovid-19 digital test certificates and blockchain. J. Enterp. Inf. Manag. 34(4): 993-1003 (2021) - [c32]Amna Alhousani
, Maria Papadaki
:
A Survey of Software Development Projects. AICV 2021: 783-794 - [c31]Ioannis Karamitsos, Maria Papadaki:
Blockchain Digital Test Certificates for COVID-19. MMBD/MLIS 2021: 133-143 - [c30]Eftychia Lakka, Maria Papadaki, Don Brutzman, Richard Puk, Athanasios G. Malamos:
X3D Audio Graph for the consistent declarative representation of the W3C Audio API. Web3D 2021: 8:1-8:5 - 2020
- [j21]Opeoluwa Ore Akinsanya, Maria Papadaki
, Lingfen Sun
:
Towards a maturity model for health-care cloud security (M2HCS). Inf. Comput. Secur. 28(3): 321-345 (2020) - [c29]Evgenia Kapassa
, Marinos Themistocleous
, Jorge Rueda Quintanilla, Marios Touloupos
, Maria Papadaki:
Blockchain in Smart Energy Grids: A Market Analysis. EMCIS 2020: 113-124 - [c28]Ram Herkanaidu
, Steven M. Furnell
, Maria Papadaki
:
Towards a Cross-Cultural Education Framework for Online Safety Awareness. HAISA 2020: 47-57 - [e2]Marinos Themistocleous
, Maria Papadaki:
Information Systems - 16th European, Mediterranean, and Middle Eastern Conference, EMCIS 2019, Dubai, United Arab Emirates, December 9-10, 2019, Proceedings. Lecture Notes in Business Information Processing 381, Springer 2020, ISBN 978-3-030-44321-4 [contents] - [e1]Marinos Themistocleous
, Maria Papadaki, Muhammad Mustafa Kamal
:
Information Systems - 17th European, Mediterranean, and Middle Eastern Conference, EMCIS 2020, Dubai, United Arab Emirates, November 25-26, 2020, Proceedings. Lecture Notes in Business Information Processing 402, Springer 2020, ISBN 978-3-030-63395-0 [contents]
2010 – 2019
- 2019
- [c27]Opeoluwa Ore Akinsanya, Maria Papadaki, Lingfen Sun:
Current Cybersecurity Maturity Models: How Effective in Healthcare Cloud? CERC 2019: 211-222 - [c26]Angelika I. Kokkinaki, Styliani Kleanthous
, Fotini Zioga, Chrisostomi Maria Kirillou, Maria Papadaki:
An Online Platform for 'Black Swan' Event Management in the Hospitality Industry. EMCIS 2019: 623-634 - [c25]Alaa Tolah
, Steven M. Furnell, Maria Papadaki
:
A Comprehensive Framework for Understanding Security Culture in Organizations. World Conference on Information Security Education 2019: 143-156 - [i1]Muhammad Ali, Stavros Shiaeles, Maria Papadaki, Bogdan V. Ghita:
Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis. CoRR abs/1904.02100 (2019) - 2018
- [c24]Muhammad Ali
, Stavros Shiaeles
, Maria Papadaki
, Bogdan V. Ghita
:
Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis. GIIS 2018: 1-5 - [c23]Ram Herkanaidu, Steven Furnell, Maria Papadaki, Tharabun Khuchinda:
Designing an Anti-Cyberbullying Programme in Thailand. HAISA 2018: 111-122 - 2017
- [j20]Nawaf Sulaiman Alharbi, Maria Papadaki
, Paul Dowland
:
The impact of security and its antecedents in behaviour intention of using e-government services. Behav. Inf. Technol. 36(6): 620-636 (2017) - [c22]Alaa Tolah, Steven Furnell, Maria Papadaki:
A comperhansive framework for cultivating and assessing Information Security Culture . HAISA 2017: 52-64 - [c21]Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki
:
Enhancing cyber security awareness with mobile games. ICITST 2017: 129-134 - 2016
- [j19]Hussain Alsaiari, Maria Papadaki
, Paul Dowland
, Steven Furnell
:
Graphical One-Time Password (GOTPass): A usability evaluation. Inf. Secur. J. A Glob. Perspect. 25(1-3): 94-108 (2016) - [c20]Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki
:
A survey of cyber-security awareness in Saudi Arabia. ICITST 2016: 154-158 - 2015
- [j18]Stavros N. Shiaeles
, Maria Papadaki
:
FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks. Comput. J. 58(4): 892-903 (2015) - [j17]Hussain Alsaiari, Maria Papadaki
, Paul Dowland
, Steven Furnell
:
Secure Graphical One Time Password (GOTPass): An Empirical Study. Inf. Secur. J. A Glob. Perspect. 24(4-6): 207-220 (2015) - 2014
- [j16]Evangelia Kokolaki, Merkourios Karaliopoulos, Georgios Kollias, Maria Papadaki
, Ioannis Stavrakakis
:
Vulnerability of opportunistic parking assistance systems to vehicular node selfishness. Comput. Commun. 48: 159-170 (2014) - [j15]Fudong Li, Nathan L. Clarke
, Maria Papadaki
, Paul Dowland
:
Active authentication for mobile devices utilising behaviour profiling. Int. J. Inf. Sec. 13(3): 229-244 (2014) - [j14]Nor Badrul Anuar
, Maria Papadaki
, Steven Furnell
, Nathan L. Clarke
:
A response selection model for intrusion response systems: Response Strategy Model (RSM). Secur. Commun. Networks 7(11): 1831-1848 (2014) - [c19]Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Alternative Graphical Authentication for Online Banking Environments. HAISA 2014: 122-136 - [c18]Nawaf Sulaiman Alharbi, Maria Papadaki
, Paul Dowland
:
Security challenges of E-government adoption based on end users' perspective. ICITST 2014: 78-82 - 2013
- [j13]Nor Badrul Anuar
, Maria Papadaki
, Steven Furnell
, Nathan L. Clarke
:
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). Secur. Commun. Networks 6(9): 1087-1116 (2013) - [c17]Karin Kronawitter, Christoph Wentzel, Maria Papadaki
:
IT Application Outsourcing in Europe: Long-Term Outcomes, Success Factors and Implications for ITO Maturity. HICSS 2013: 4456-4465 - [c16]Evangelia Kokolaki, Georgios Kollias, Maria Papadaki
, Merkourios Karaliopoulos, Ioannis Stavrakakis
:
Opportunistically-assisted parking search: A story of free riders, selfish liars and bona fide mules. WONS 2013: 17-24 - 2012
- [j12]Dimitrios Damopoulos, Sofia-Anna Menesidou
, Georgios Kambourakis
, Maria Papadaki
, Nathan L. Clarke
, Stefanos Gritzalis
:
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Secur. Commun. Networks 5(1): 3-14 (2012) - [c15]Annette Sercombe, Maria Papadaki:
Education in the 'Virtual' Community: Can beating Malware Man teach users about Social Networking Security?. HAISA 2012: 33-39 - [c14]Nor Badrul Anuar
, Maria Papadaki
, Steven Furnell
, Nathan L. Clarke
:
A Response Strategy Model for Intrusion Response Systems. SEC 2012: 573-578 - 2011
- [j11]Fudong Li, Nathan L. Clarke
, Maria Papadaki, Paul Dowland
:
Misuse Detection for Mobile Devices Using Behaviour Profiling. Int. J. Cyber Warf. Terror. 1(1): 41-53 (2011) - [j10]George Magklaras
, Steven Furnell
, Maria Papadaki
:
LUARM: An Audit Engine for Insider Misuse Detection. Int. J. Digit. Crime Forensics 3(3): 37-49 (2011) - [c13]George Magklaras, Steven Furnell, Maria Papadaki:
LUARM – An audit engine for insider misuse detection. WDFIA 2011: 133-148 - 2010
- [j9]Gina C. Tjhai, Steven Furnell
, Maria Papadaki
, Nathan L. Clarke
:
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. Comput. Secur. 29(6): 712-723 (2010) - [j8]Benjamin George Sanders, Paul Dowland, Shirley Atkinson, Daniel Zahra, Steven Furnell, Maria Papadaki:
Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments. J. Multim. Process. Technol. 1(3): 181-193 (2010) - [j7]Maria Papadaki
, Steven Furnell
:
Vulnerability management: an attitude of mind? Netw. Secur. 2010(10): 4-8 (2010) - [c12]Fudong Li, Nathan L. Clarke
, Maria Papadaki
, Paul Dowland
:
Behaviour Profiling on Mobile Devices. EST 2010: 77-82 - [c11]Karin Kronawitter, Christoph Wentzel, Maria Papadaki:
ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success. INC 2010: 355-359 - [c10]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
An investigation and survey of response options for Intrusion Response Systems (IRSs). ISSA 2010 - [c9]Benjamin George Sanders, Vivian Chen, Daniel Zahra
, Paul Dowland
, Shirley Atkinson
, Maria Papadaki
, Steven Furnell
:
Online addiction: privacy risks in online gaming environments. MEDES 2010: 114-121 - [c8]Tarik Ibrahim, Steven Furnell
, Maria Papadaki
, Nathan L. Clarke
:
Assessing the Usability of End-User Security Software. TrustBus 2010: 177-189
2000 – 2009
- 2009
- [j6]Taimur Bakhshi
, Maria Papadaki
, Steven Furnell
:
Social engineering: assessing vulnerabilities in practice. Inf. Manag. Comput. Secur. 17(1): 53-63 (2009) - [c7]Aaron Smith, Maria Papadaki
, Steven M. Furnell
:
Improving Awareness of Social Engineering Attacks. World Conference on Information Security Education 2009: 249-256 - 2008
- [c6]Taimur Bakhshi, Maria Papadaki, Steven Furnell:
A Practical Assessment of Social Engineering Vulnerabilities. HAISA 2008: 12-23 - [c5]Gina C. Tjhai, Maria Papadaki
, Steven Furnell
, Nathan L. Clarke
:
Investigating the problem of IDS false alarms: An experimental study using Snort. SEC 2008: 253-267 - [c4]Gina C. Tjhai, Maria Papadaki
, Steven Furnell
, Nathan L. Clarke
:
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. TrustBus 2008: 139-150 - 2007
- [j5]Jörg Preuß, Steven Furnell
, Maria Papadaki
:
Considering the potential of criminal profiling to combat hacking. J. Comput. Virol. 3(2): 135-141 (2007) - 2006
- [j4]Maria Papadaki
, Steven Furnell
:
Achieving automated intrusion response: a prototype implementation. Inf. Manag. Comput. Secur. 14(3): 235-251 (2006) - 2005
- [j3]Maria Papadaki, Jun Gao:
Kinetic models of complex reaction systems. Comput. Chem. Eng. 29(11-12): 2449-2460 (2005) - [j2]Maria Papadaki
, Steven M. Furnell
:
Informing the decision process in an automated intrusion response system. Inf. Secur. Tech. Rep. 10(3): 150-161 (2005) - 2004
- [b1]Maria Papadaki:
Classifying and responding to network intrusions. University of Plymouth, UK, 2004 - 2003
- [c3]Maria Papadaki
, Steven Furnell, Benn Lines, Paul L. Reynolds:
Operational Characteristics of an Automated Intrusion Response System. Communications and Multimedia Security 2003: 65-75 - 2002
- [j1]I. Irakleous, Steven Furnell, Paul Dowland
, Maria Papadaki
:
An experimental comparison of secret-based user authentication technologies. Inf. Manag. Comput. Secur. 10(3): 100-108 (2002) - [c2]Paul Dowland, Steven Furnell, Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response. SEC 2002: 215-226 - 2001
- [c1]Steven Furnell, Maria Papadaki, George Magklaras, A. Alayed:
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks. Conference on Information Security Management & Small Systems Security 2001: 87-98
Coauthor Index
aka: Steven M. Furnell

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-07 01:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint