default search action
Eliana Stavrou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Eliana Stavrou, Andriani Piki:
Cultivating self-efficacy to empower professionals' re-up skilling in cybersecurity. Inf. Comput. Secur. 32(4): 523-541 (2024) - [j5]Georgios Potamos, Eliana Stavrou, Stavros Stavrou:
Enhancing Maritime Cybersecurity through Operational Technology Sensor Data Fusion: A Comprehensive Survey and Analysis. Sensors 24(11): 3458 (2024) - [c29]Steven Furnell, Eliana Stavrou:
Assessing the Consistency of Cyber Security Education. EDUCON 2024: 1-5 - [c28]Christos Kallonas, Andriani Piki, Eliana Stavrou:
Empowering Professionals: A Generative AI Approach to Personalized Cybersecurity Learning. EDUCON 2024: 1-10 - [c27]Michail Loupasakis, Georgios Potamos, Eliana Stavrou:
Revolutionizing Social Engineering Awareness Raising, Education and Training: Generative AI-Powered Investigations in the Maritime Domain. HCI (46) 2024: 70-83 - [c26]Eliana Stavrou, Andriani Piki, Panayiotis Varnava:
Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies. ICISSP 2024: 179-186 - [c25]Chrysanthi Koukou, Eliana Stavrou:
The Potential of Generative AI Chatbots as Career Advisors in Cybersecurity: Professionals' Perspectives. World Conference on Information Security Education 2024: 191-206 - 2023
- [j4]Lampis Alevizos, Eliana Stavrou:
Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS). Inf. Secur. J. A Glob. Perspect. 32(2): 134-161 (2023) - [c24]Eliana Stavrou:
Planning for Professional Development in Cybersecurity: A New Curriculum Design. HAISA 2023: 91-104 - [c23]Andria Procopiou, Andriani Piki, Eliana Stavrou, Nelly Zeniou:
Free Guy or Bad Guy: Safety, Privacy, and Security Risks for Minors in the Metaverse and Prominent Educational Considerations. HCI (53) 2023: 445-460 - [c22]Andria Procopiou, Eliana Stavrou:
Privacy Concerns in Smart Indoor Environments in the Internet of Everything Era: A Smart University Campus Case Study. IoECon 2023: 92-109 - 2022
- [j3]Petros Chatzis, Eliana Stavrou:
Cyber-threat landscape of border control infrastructures. Int. J. Crit. Infrastructure Prot. 36: 100503 (2022) - [c21]Georgios Potamos, Savvas Theodoulou, Eliana Stavrou, Stavros Stavrou:
Building Maritime Cybersecurity Capacity Against Ransomware Attacks. Cyber Science 2022: 87-101 - [c20]Georgios Potamos, Savvas Theodoulou, Eliana Stavrou, Stavros Stavrou:
Maritime Cyber Threats Detection Framework: Building Capabilities. World Conference on Information Security Education 2022: 107-129 - [c19]Eliana Stavrou:
Guidelines to Develop Consumers Cyber Resilience Capabilities in the IoE Ecosystem. IoECon 2022: 18-28 - 2021
- [c18]Daniel Hulatt, Eliana Stavrou:
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation. HAISA 2021: 138-147
2010 – 2019
- 2019
- [c17]Marios Ioannou, Eliana Stavrou, Maria Bada:
Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination. Cyber Security 2019: 1-4 - [c16]Pierre Jourdan, Eliana Stavrou:
Towards Designing Advanced Password Cracking Toolkits: Optimizing the Password Cracking Process. UMAP (Adjunct Publication) 2019: 203-208 - 2018
- [c15]Eliana Stavrou:
Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools. CyberSA 2018: 1-4 - [c14]Pieris Tsokkis, Eliana Stavrou:
A password generator tool to increase users' awareness on bad password construction strategies. ISNCC 2018: 1-5 - [c13]Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique M. Dinis Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Susana Mendes Pereira, Eliana Stavrou:
Global perspectives on cybersecurity education for 2030: a case for a meta-discipline. ITiCSE (Companion) 2018: 36-54 - [c12]Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique M. Dinis Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Susana Mendes Pereira, Vítor J. Sá, Eliana Stavrou:
Global perspectives on cybersecurity education. ITiCSE 2018: 340-341 - 2017
- [j2]Alberto Bullo, Eliana Stavrou, Stavros Stavrou:
Transparent password policies: A case study of investigating end-user situational awareness. Int. J. Cyber Situational Aware. 2(1): 85-99 (2017) - [c11]Eliana Stavrou:
A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architecture. CyberSA 2017: 1-6 - [c10]Eliana Stavrou, Stavros Stavrou:
Intrusion recovery in NLOS WSNs with a varying network density. ICT 2017: 1-5 - [c9]Eliana Stavrou, Nearchos Paspallis:
A Classification Platform for Security Protocols in WSNs. ISD 2017 - 2016
- [c8]Eliana Stavrou, Andreas Pitsillides:
Situation aware intrusion recovery policy in WSNs. CyberSA 2016: 1-8 - [c7]Eliana Stavrou, Andreas Pitsillides:
WSN operability during persistent attack execution. ICT 2016: 1-5 - 2014
- [c6]Eliana Stavrou, Andreas Pitsillides:
Recovering from the selective forwarding attack in WSNs - enhancing the recovery benefits of blacklisting and rerouting using directional antennas. IWCMC 2014: 299-303 - 2012
- [c5]Eliana Stavrou, Andreas Pitsillides:
Security evaluation methodology for intrusion recovery protocols in wireless sensor networks. MSWiM 2012: 167-170 - 2011
- [c4]Eliana Stavrou, Andreas Pitsillides:
Combating persistent adversaries in wireless sensor networks using directional antennas. ICT 2011: 433-438 - [c3]Eliana Stavrou, Andreas Pitsillides:
Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks. ISCC 2011: 706-712 - 2010
- [j1]Eliana Stavrou, Andreas Pitsillides:
A survey on secure multipath routing protocols in WSNs. Comput. Networks 54(13): 2215-2238 (2010) - [c2]Eliana Stavrou, Andreas Pitsillides, George C. Hadjichristofi, Christoforos N. Hadjicostis:
Security in Future Mobile Sensor Networks - Issues and Challenges. SECRYPT 2010: 278-286
2000 – 2009
- 2006
- [c1]Eliana Stavrou, Andreas Pitsillides:
Securing Mobile Healthcare Systems Based on Information Classification: DITIS Case Study. WOSIS 2006: 67-79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint