Follow
Stilianos Vidalis
Stilianos Vidalis
Deputy Head of Department, University of Hertfordshire
Verified email at herts.ac.uk
Title
Cited by
Cited by
Year
Cloud computing: The impact on digital forensic investigations
S Biggs, S Vidalis
2009 International Conference for Internet Technology and Secured …, 2009
1912009
Using vulnerability trees for decision making in threat assessment
S Vidalis, A Jones
University of Glamorgan, School of Computing, Tech. Rep. CS-03-2, 2003
532003
A critical discussion of risk and threat analysis methods and methodologies
S Vidalis
School of Computing Technical Report CS-04-03, University of Glamorgan, 2004
372004
Assessing identity theft in the Internet of Things
S Vidalis, O Angelopoulou
Journal of IT Convergence Practice, 2014
332014
Analyzing Threat Agents and Their Attributes.
S Vidalis, A Jones
ECIW, 369-380, 2005
282005
Cloud computing storms
S Biggs, S Vidalis
International Journal of Intelligent Computing Research 1 (1), 61-68, 2010
202010
Rethinking digital forensics
A Jones, S Vidalis
Annals of Emerging Technologies in Computing (AETiC), Print ISSN, 2516-0281, 2019
172019
Measuring vulnerabilities and their exploitation cycle
E Morakis, S Vidalis, A Blyth
Information Security Technical Report 8 (4), 45-55, 2003
142003
Security through deception
S Vidalis, Z Kazmi
Information Systems Security 16 (1), 34-41, 2007
122007
A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues
G Sharma, S Vidalis, N Anand, C Menon, S Kumar
Electronics 10 (19), 2365, 2021
112021
A framework for representing and analysing cyber attacks using object oriented hierarchy trees
E Morakis, S Vidalis, A Blyth
Proceedings of the 2nd European Conference On Information Warfare And …, 2003
112003
Assessing cyber-threats in the information environment
S Vidalis, A Jones, A Blyth
Network Security 2004 (11), 10-16, 2004
102004
TAMMPS: a threat assessment model for micro-payment systems
S Vidalis
School of Computing. Pontypridd, University of Glmaorgan, 1-152, 2001
92001
Analysis and implementation of threat agents profiles in semi-automated manner for a network traffic in real-time information environment
G Sharma, S Vidalis, C Menon, N Anand, S Kumar
Electronics 10 (15), 1849, 2021
82021
Information security and digital forensics in the world of cyber physical systems
A Jones, S Vidalis, N Abouzakhar
2016 Eleventh international conference on digital information management …, 2016
82016
Towards ‘crime specific’digital investigation frameworks
O Angelopoulou, S Vidalis
72013
Threat Agents: what InfoSec officers need to know
S Vidalis, A Jones
Mediterranean Journal of Computers and Networks 1 (2), 97-110, 2005
72005
Security in heterogeneous large scale environments using GRID technology
S Vidalis, M Pilgermann, E Morakis, A Blyth
International Journal of Innovative Computing Information and Control 1, 715-725, 2005
72005
Enhanced reliable reactive routing (ER3) protocol for multimedia applications in 3D wireless sensor networks
N Anand, S Varma, G Sharma, S Vidalis
Multimedia Tools and Applications 77, 16927-16946, 2018
62018
Understanding and Developing a Threat Assessment Model
S Vidalis, A Blyth
University of Glamorgan, School of Computing, 2002
62002
The system can't perform the operation now. Try again later.
Articles 1–20