University of Hertfordshire

Dr Alexios Mylonas

Dr Alexios Mylonas

Postal address:
University of Hertfordshire, Hatfield, Hertfordshire
United Kingdom

Publications

  1. 2022
  2. A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks

    Chiejina, E., Xiao, H., Christianson, B., Mylonas, A. & Chiejina, C., 12 Jan 2022, In: Sensors. 22, 2, 32 p., 571.

    Research output: Contribution to journalArticlepeer-review

  3. 2021
  4. Towards lightweight url-based phishing detection

    Butnaru, A., Mylonas, A. & Pitropakis, N., 13 Jun 2021, In: Future internet. 13, 6, 15 p., 154.

    Research output: Contribution to journalArticlepeer-review

  5. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

    Papadopoulos, P., Essen, O. T. V., Pitropakis, N., Chrysoulas, C., Mylonas, A. & Buchanan, W. J., 23 Apr 2021, In: Journal of Cybersecurity and Privacy. 1, 2, p. 252-273

    Research output: Contribution to journalArticlepeer-review

  6. A Comparative Analysis of Honeypots on Different Cloud Platforms

    Kelly, C., Pitropakis, N., Mylonas, A., McKeown, S. & Buchanan, W. J., 1 Apr 2021, In: Sensors. 21, 7, 19 p., 2433.

    Research output: Contribution to journalArticlepeer-review

  7. 2020
  8. Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection

    Kantartopoulos, P., Pitropakis, N., Mylonas, A. & Kylilis, N., 6 Nov 2020, In: Technologies. 8, 4, p. 64 1 p.

    Research output: Contribution to journalArticlepeer-review

  9. Known unknowns: Indeterminacy in authentication in IoT

    Heydari, M., Mylonas, A., Tafreshi, V. H. F., Benkhelifa, E. & Singh, S., 1 Oct 2020, In: Future Generation Computer Systems. 111, p. 278-287 10 p.

    Research output: Contribution to journalArticlepeer-review

  10. Towards a multi-layered phishing detection

    Rendall, K., Nisioti, A. & Mylonas, A., 13 Aug 2020, In: Sensors (Switzerland). 20, 16, 18 p., 4540.

    Research output: Contribution to journalArticlepeer-review

  11. Monitoring Users’ Behavior: Anti-Immigration Speech Detection on Twitter

    Pitropakis, N., Kokot, K., Gkatzia, D., Ludwiniak, R., Mylonas, A. & Kandias, M., 3 Aug 2020, In: Machine Learning and Knowledge Extraction. 2, 3, p. 192-215 24 p.

    Research output: Contribution to journalArticlepeer-review

  12. Identifying safety and human factors issues in rail using IRIS and CAIRIS

    Altaf, A., Faily, S., Dogan, H., Mylonas, A. & Thron, E., 22 Feb 2020, Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Revised Selected Papers. Katsikas, S., Katsikas, S., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Gritzalis, S., Kalloniatis, C., Mylopoulos, J., Antón, A., Pallas, F., Pohle, J., Sasse, A., Meng, W., Furnell, S. & Garcia-Alfaro, J. (eds.). Springer US, p. 98-107 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11980 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Uncertainty-aware authentication model for IoT

    Heydari, M., Mylonas, A., Katos, V., Balaguer-Ballester, E., Altaf, A. & Tafreshi, V. H. F., 22 Feb 2020, Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Revised Selected Papers. Katsikas, S., Katsikas, S., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Gritzalis, S., Kalloniatis, C., Mylopoulos, J., Antón, A., Pallas, F., Pohle, J., Sasse, A., Meng, W., Furnell, S. & Garcia-Alfaro, J. (eds.). Springer US, p. 224-237 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11980 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification

    Tsimperidis, I., Yoo, P. D., Taha, K., Mylonas, A. & Katos, V., 1 Feb 2020, In: IEEE Transactions on Cybernetics. 50, 2, p. 525 - 535 11 p.

    Research output: Contribution to journalArticlepeer-review

  15. 2019
  16. A Location-Aware Authentication Model to Handle Uncertainty in IoT

    Heydari, M., Mylonas, A., Katos, V., Balaguer-Ballester, E., Tafreshi, V. H. F. & Benkhelifa, E., 23 Dec 2019, 2019 6th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019. Alsmirat, M. & Jararweh, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 43-50 8 p. 8939230. (2019 6th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Uncertainty-aware authentication model for fog computing in IoT

    Heydari, M., Mylonas, A., Katos, V., Balaguer-Ballester, E., Tafreshi, V. H. F. & Benkhelifa, E., 15 Aug 2019, 2019 4th International Conference on Fog and Mobile Edge Computing, FMEC 2019. Institute of Electrical and Electronics Engineers Inc., p. 52-59 8 p. 8795332. (2019 4th International Conference on Fog and Mobile Edge Computing, FMEC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. A Usability Evaluation of Privacy Add-ons for Web Browsers

    Corner, M., Dogan, H., Mylonas, A. & Djabri, F., 4 Jul 2019, Design, User Experience, and Usability. Practice and Case Studies - 8th International Conference, DUXU 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Proceedings. Marcus, A. & Wang, W. (eds.). Springer Verlag, p. 442-458 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11586 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. 2018
  20. From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

    Nisioti, A., Mylonas, A., Yoo, P. D. & Katos, V., 1 Oct 2018, In: IEEE Communications Surveys and Tutorials. 20, 4, p. 3369-3388 20 p., 8410366.

    Research output: Contribution to journalArticlepeer-review

  21. I know what you did last summer: New persistent tracking mechanisms in the wild

    Belloro, S. & Mylonas, A., 10 Sep 2018, In: IEEE Access. 6, p. 52779-52792 14 p., 8457184.

    Research output: Contribution to journalArticlepeer-review

  22. Exiting the risk assessment maze: A meta-survey

    Gritzalis, D., Iseppi, G., Mylonas, A. & Stavrou, V., 1 Jan 2018, In: ACM Computing Surveys. 51, 1, 30 p., 11.

    Research output: Contribution to journalReview articlepeer-review

  23. 2017
  24. You can run but you cannot hide from memory: Extracting im evidence of Android apps

    Nisioti, A., Mylonas, A., Katos, V., Yoo, P. D. & Chryssanthou, A., 1 Sep 2017, 2017 IEEE Symposium on Computers and Communications, ISCC 2017. Institute of Electrical and Electronics Engineers Inc., p. 457-464 8 p. 8024571. (Proceedings - IEEE Symposium on Computers and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. TRAWL: Protection against rogue sites for the masses

    Nisioti, A., Heydari, M., Mylonas, A., Katos, V. & Tafreshi, V. H. F., 26 Jun 2017, RCIS 2017 - 11th IEEE International Conference on Research Challenges in Information Science - Conference Proceedings. Pastor, O., Mouratidis, H. & Assar, S. (eds.). IEEE Computer Society, p. 120-127 8 p. 7956527. (Proceedings - International Conference on Research Challenges in Information Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Exploring the protection of private browsing in desktop browsers

    Tsalis, N., Mylonas, A., Nisioti, A., Gritzalis, D. & Katos, V., 1 Jun 2017, In: Computers and Security. 67, p. 181-197 17 p.

    Research output: Contribution to journalArticlepeer-review

  27. Using human factor approaches to an organisation’s bring your own device scheme

    Ward, J., Dogan, H., Apeh, E., Mylonas, A. & Katos, V., 13 May 2017, Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. Tryfonas, T. (ed.). Springer Verlag, p. 396-413 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10292 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. 2016
  29. Human-centered specification exemplars for critical infrastructure environments

    Faily, S., Gritzalis, D., Lykou, G., Mylonas, A., Partridge, A. & Katos, V., 1 Jul 2016.

    Research output: Contribution to conferencePaperpeer-review

  30. An intensive analysis of security and privacy browser add-ons

    Tsalis, N., Mylonas, A. & Gritzalis, D., 2 Apr 2016, Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Revised Selected Papers. Gabillon, A. & Lambrinoudakis, C. (eds.). Springer Verlag, p. 258-273 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. A study on usability and security features of the Android pattern lock screen

    Andriotis, P., Oikonomou, G., Mylonas, A. & Tryfonas, T., 14 Mar 2016, In: Information and Computer Security. 24, 1, p. 53-72 20 p.

    Research output: Contribution to journalArticlepeer-review

  32. 2015
  33. A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention

    Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T. & Oikonomou, G., 31 Dec 2015, In: Information Security Journal. 24, 4-6, p. 164-176 13 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 Next