2009 |
14 | EE | Pete Davies,
Theodore Tryfonas:
A lightweight web-based vulnerability scanner for small-scale computer network security assessment.
J. Network and Computer Applications 32(1): 78-95 (2009) |
2008 |
13 | EE | Wai Man To,
Theodore Tryfonas,
Dave W. Farthing:
Audit Log Unification and Review with Log Management Information Bases.
DB&IS 2008: 180-191 |
12 | EE | Leonard Shand,
Theodore Tryfonas:
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code.
ISSA 2008: 1-18 |
11 | EE | Ioannis G. Askoxylakis,
Damien Sauveron,
Constantinos Markantonakis,
Theodore Tryfonas,
Apostolos Traganitis:
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks.
SECURWARE 2008: 193-202 |
10 | EE | Bob Kearney,
Theodore Tryfonas:
Security Patterns for Automated Continuous Auditing.
Information Security Journal: A Global Perspective 17(1): 13-25 (2008) |
2007 |
9 | EE | Paula Thomas,
Theodore Tryfonas:
Hard-drive Disposal and Identity Fraud.
SEC 2007: 461-466 |
2006 |
8 | EE | Vivienne Mee,
Theodore Tryfonas,
Iain Sutherland:
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage.
Digital Investigation 3(3): 166-173 (2006) |
2005 |
7 | | Theodore Tryfonas,
Vivienne Mee,
Iain Sutherland,
Paula Thomas:
Distribution of Offensive Material Over Computer Networks: A Research Agenda.
ECIW 2005: 355-362 |
2004 |
6 | EE | Vassilis Tsoumas,
Theodore Tryfonas:
From risk analysis to effective security management: towards an automated approach.
Inf. Manag. Comput. Security 12(1): 91-101 (2004) |
2003 |
5 | | Theodore Tryfonas,
Evangelos A. Kiountouzis:
Perceptions of Security Contributing to the Implementation of Secure IS.
SEC 2003: 313-324 |
2002 |
4 | | Theodore Tryfonas,
Evangelos A. Kiountouzis:
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration.
SEC 2002: 347-356 |
2001 |
3 | | Theodore Tryfonas,
Evangelos A. Kiountouzis:
Security Concerns for Contemporary Development Practices: A Case Study.
SEC 2001: 421-436 |
2 | EE | Theodore Tryfonas,
Evangelos A. Kiountouzis,
Angeliki Poulymenakou:
Embedding security practices in contemporary information systems development approaches.
Inf. Manag. Comput. Security 9(4): 183-197 (2001) |
2000 |
1 | | Theodore Tryfonas,
Dimitris Gritzalis,
Spyros Kokolakis:
A Qualitative Approach to Information Availability.
SEC 2000: 37-48 |