Forensic Tools Against Illegal Use of Internet (ForToo)

  • Andriotis, Panagiotis (Researcher)
  • Haghighi, Mo (Researcher)
  • Li, Shancang (Researcher)
  • Oikonomou, George (Researcher)
  • Wojcik, Marcin (Researcher)
  • Tryfonas, Theo (Principal Investigator)

Project Details

Description

The project aims to develop digital forensics tools that will: (i) identify, (ii) analyze and (iii) visualize illegal activities on the Internet. The project places emphasis on emerging networks and technologies, such as smartphones and wireless sensor networks.
StatusFinished
Effective start/end date17/06/1116/10/14

Fingerprint Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.

  • Research Output

    • 6 Conference Contribution (Conference Proceeding)
    • 2 Article (Academic Journal)
    • 1 Conference Poster
    • 1 Special issue (Academic Journal)

    Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method

    Andriotis, P., Tryfonas, T. & Oikonomou, G., 2014, Human Aspects of Information Security, Privacy, and Trust - HAS 2014. Tryfonas, T. & Askoxylakis, I. G. (eds.). Springer Berlin Heidelberg, Vol. 8533. p. 115-126 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

  • Digital Investigations for IPv6-Based Wireless Sensor Networks

    Kumar, V., Oikonomou, G., Tryfonas, T., Page, D. & Phillips, I., Aug 2014, In : Digital Investigation. 11, Supplement 2, p. S66-S75 12 p.

    Research output: Contribution to journalSpecial issue (Academic Journal)

  • 10 Citations (Scopus)

    On the Development of Automated Forensic Analysis Methods for Mobile Devices

    Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., Read, H. & Prevelakis, V., 2014, Trust and Trustworthy Computing - TRUST 2014. Holz, T. & Ioannidis, S. (eds.). Springer Berlin Heidelberg, Vol. 8564. p. 212-213 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Activities

    • 3 Invited talk
    • 1 Participation in conference

    University of Kent Invited Talk

    George Oikonomou (Invited speaker)

    22 Jun 2016

    Activity: Participating in or organising an event typesInvited talk

    Threats and Vulnerabilities in the IoT

    George Oikonomou (Speaker)

    10 Mar 2016

    Activity: Participating in or organising an event typesInvited talk

    City University London Invited Talk

    George Oikonomou (Speaker)

    27 Mar 2014

    Activity: Participating in or organising an event typesInvited talk