Theo Tryfonas

ORCID: 0000-0003-4024-8003
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Digital and Cyber Forensics
  • Systems Engineering Methodologies and Applications
  • Smart Cities and Technologies
  • Energy Efficient Wireless Sensor Networks
  • Information Technology Governance and Strategy
  • Digital Media Forensic Detection
  • User Authentication and Security Systems
  • Complex Systems and Decision Making
  • IoT and Edge/Fog Computing
  • Water Quality Monitoring Technologies
  • Infrastructure Maintenance and Monitoring
  • Concrete Corrosion and Durability
  • Software Engineering Techniques and Practices
  • Complex Network Analysis Techniques
  • Structural Health Monitoring Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cybercrime and Law Enforcement Studies
  • Technology Assessment and Management
  • Wireless Networks and Protocols
  • Smart Grid Security and Resilience

University of Bristol
2016-2025

IRD Fuel Cells (Denmark)
2024

Delft University of Technology
2023

Speechmatics (United Kingdom)
2023

At Bristol
2018-2023

Cabot (United States)
2011-2021

University College London
2016

Faculty (United Kingdom)
2014

Engineering (Italy)
2014

State Key Laboratory of Cryptology
2008-2013

Purpose – The purpose of this paper is to provide an in-depth overview the security requirements and challenges for Internet Things (IoT) discuss solutions various enabling technologies implications applications. Design/methodology/approach Security are analysed based on a four-layer framework IoT sensing layer, network service application layer. cross-layer threats followed by discussion including identification tracking technologies, WSN RFID, communication, networks, management. Findings...

10.1108/intr-07-2014-0173 article EN Internet Research 2016-03-24

Digital Twins (DTs) are forecasted to be used in two-thirds of large industrial companies the next decade. In Architecture, Engineering and Construction (AEC) sector, their actual application is still largely at prototype stage. Industry academia currently reconciling many competing definitions unclear processes for developing DTs. There a compelling need establish DTs as practice AEC by common procedures standards tailored sector's use cases. This paper proposes step-by-step workflow...

10.1016/j.autcon.2022.104421 article EN cc-by Automation in Construction 2022-07-03

In the past few years many groundbreaking promises have been made about potential of Smart City. The future cities relies perceivably on ubiquitous sensing, and anytime-anywhere information access control. However, city leaders are still struggling to identify quantifiable sources value that novel ICT can generate. Current City investment is characterized by relatively small demonstrators often lack scalability real long lasting impacts economy. this paper we adopt view a as an marketplace...

10.1016/j.procs.2013.01.070 article EN Procedia Computer Science 2013-01-01

In a service-oriented Internet of things (IoT) deployment, it is difficult to make consensus decisions for services at different IoT edge nodes where available information might be insufficient or overloaded. Existing statistical methods attempt resolve the inconsistency, which requires adequate decisions. Distributed decision making (CDM) can provide an efficient and reliable means synthesizing by using wider range than existing methods. this paper, we first discuss service composition...

10.1109/tii.2014.2306331 article EN IEEE Transactions on Industrial Informatics 2014-02-14

Graphical passwords that allow a user to unlock smartphone's screen are one of the Android operating system's features and many users prefer them instead traditional text-based codes. A variety attacks has been proposed against this mechanism, which notable methods recover lock patterns using oily residues left on screens when people move their fingers reproduce code. In paper we present pilot study habits setting pattern perceptions regarding what constitutes secure pattern. We use our...

10.1145/2462096.2462098 article EN 2013-04-16

Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate with devastating impact. When assessing the overall security mobile system, it is important assess risks posed by each applications (apps), thus gaining stronger understanding any present. This paper aims at developing three-layer framework assesses potential which apps introduce within Android systems. A Bayesian risk graphical model proposed evaluate propagation in...

10.1109/tcyb.2016.2537649 article EN IEEE Transactions on Cybernetics 2016-04-04

The current Electric Vehicle (EV) adoption models target the factors impacting on a national scale. However, these fail to explain observed variability in EV within one nation. To that end, this study investigates potential affecting of across nation, taking England as case study. examined include electricity and gas consumption, photovoltaic installations, total number privately registered vehicles. These were analysed form growth rates spanning from 2015 2021. Spatial Error Model was used...

10.1080/03081060.2024.2449127 article EN cc-by Transportation Planning and Technology 2025-01-08

Purpose – The Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by visual representation of password, which enhance its memorability. Graphical passwords are vulnerable to attacks (e.g. shoulder surfing); thus, need for more complex becomes apparent. This paper aims focus features constitute usable and secure investigate existence heuristic physical rules possibly dictate formation pattern....

10.1108/ics-01-2015-0001 article EN Information and Computer Security 2016-02-25

Model-Based Systems Engineering (MBSE) represents a move away from the traditional approach of Document-Based (DBSE). It is claimed that MBSE promotes consistency, communication, clarity and maintainability within systems engineering projects addresses issues associated with cost, complexity safety. While these potential benefits are generally agreed upon by would-be practitioners, its implementation challenging many organisations struggle to overcome cultural technical hurdles along long...

10.1016/j.jss.2019.110453 article EN cc-by Journal of Systems and Software 2019-10-26

Cryptography is one of the most widely employed means to ensure confidentiality in Internet Things (IoT). Establishing cryptographically secure links between IoT devices requires prior consensus a secret encryption key. Yet, are resource-constrained and cannot employ traditional key distribution schemes. As result, there growing interest generating random keys locally, using shared randomness communicating channel. This article presents generation scheme, named SKYGlow, which targeted at...

10.1016/j.adhoc.2018.08.014 article EN cc-by Ad Hoc Networks 2018-08-28

Free-stream tidal currents, such as those in the Alderney Race and Fall of Warness, represent a potentially plentiful reliable source clean energy. This paper seeks to describe state art stream power technology. There is wide variety across range devices under development and, although majority concepts utilise horizontal axis rotational method generation, there no sign yet that industry near convergence towards single configuration. are, however, several clear trends emerging technology...

10.1109/oceanse.2009.5278329 article EN OCEANS 2007 - Europe 2009-05-01

The confidentiality of communications in the Internet Things (IoT) is critical, with cryptography currently being most widely employed method ensuring it. Establishing cryptographically secure communication links between two transceivers requires pre-agreement on some key, unknown to an external attacker. In recent years there has been growing attention techniques that generate a shared random key through observation channel and its effects exchanged messages. this work we present SKYGlow,...

10.1109/icc.2017.7997419 article EN 2017-05-01

Three distinct trends have emerged that disrupted the dominance of privately owned, combustion-powered car transport in United Kingdom. First, electric powertrain has as an affordable means transport, addressing various existing environmental concerns; second, new models ownership are developing, particularly urban areas; third, growth "smart city" thinking emphasizes capitalizing on increased connectivity and data availability to create value. We define combination these three "tri-opt"...

10.1080/10630732.2018.1553096 article EN cc-by Journal of Urban Technology 2019-01-02

Water quality monitoring is essential to understanding the complex dynamics of water ecosystems, impact human infrastructure on them and ensure safe use resources for drinking, recreation transport. High frequency in-situ systems are being increasingly employed in schemes due their much finer temporal measurement scales possible reduced cost associated with manual sampling, manpower time needed process results compared traditional grab-sampling. Modelling data at higher reduces uncertainty...

10.3389/frsc.2021.791595 article EN cc-by Frontiers in Sustainable Cities 2022-01-31

The current approach to forensic examination during search and seizure has predominantly been pull the plug on suspect machine subsequently perform a post mortem storage medium. However, with advent of larger capacities memory, drive encryption anti-forensics, this procedure may result in loss valuable evidence. Volatile data be vital determining criminal activity; it contain passwords used for encryption, indications anti-forensic techniques, memory resident malware which would otherwise go...

10.1145/1368506.1368516 article EN ACM SIGOPS Operating Systems Review 2008-04-01

This paper introduces a method for acquiring forensic-grade evidence from Android smartphones using open source tools. We investigate in particular cases where the suspect has made use of smartphone's Wi-Fi or Bluetooth interfaces. discuss forensic analysis four case studies, which revealed traces that were left inner structure three mobile devices and also indicated security vulnerabilities. Subsequently, we propose detailed plan examiners to follow when dealing with investigations...

10.1109/wifs.2012.6412634 article EN 2012-12-01

SCADA and industrial control systems have been traditionally isolated in physically protected environments.However, developments such as standardisation of data exchange protocols increased use IP, emerging wireless sensor networks machine-to-machine communication mean that the near future related threat vectors will require consideration too outside scope traditional security incident response.In light significance for resilience critical infrastructures targeted incidents against them...

10.1049/cp.2013.1720 article EN 2013-01-01

The successful deployment of safe and trustworthy Connected Autonomous Vehicles (CAVs) will highly depend on the ability to devise robust effective security solutions resist sophisticated cyber attacks patch up critical vulnerabilities. Pseudonym Public Key Infrastructure (PPKI) is a promising approach secure vehicular networks as well ensure data location privacy, concealing vehicles' real identities. Nevertheless, pseudonym distribution management affect PPKI scalability due significant...

10.1109/vtcfall.2017.8288287 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2017-09-01

This paper explores whether it is useful to view the fundamental ideas behind smart city concept through lens of 'Public Value Management' (PVM) paradigm.It investigates how appropriate ICT investment in cities might be articulated and valued PVM.In order achieve this, core concepts found PVM literature, draws key connections literature.This data supported semi-structured interviews with experts.The aim understand potential value beyond simple optimisation processes cost cutting.This...

10.2991/ict4s-14.2014.45 article EN cc-by-nc Advances in computer science research 2014-01-01
Coming Soon ...