Internet of things security: A review of risks and threats to healthcare sector NS Abouzakhar, A Jones, O Angelopoulou 2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017 | 72 | 2017 |
Assessing identity theft in the Internet of Things S Vidalis, O Angelopoulou Journal of IT Governance Practice, 2014 | 37 | 2014 |
Carfentanil on the darknet: Potential scam or alarming public health threat? A Negri, H Townshend, T McSweeney, O Angelopoulou, H Banayoti, ... International Journal of Drug Policy 91, 103118, 2021 | 24 | 2021 |
Combining digital forensic practices and database analysis as an anti-money laundering strategy for financial institutions DA Flores, O Angelopoulou, RJ Self 2012 Third International Conference on Emerging Intelligent Data and Web …, 2012 | 22 | 2012 |
A hybrid spam detection method based on unstructured datasets Y Shao, M Trovati, Q Shi, O Angelopoulou, E Asimakopoulou, N Bessis Soft Computing 21, 233-243, 2017 | 20 | 2017 |
Challenges of data provenance for cloud forensic investigations VM Katilu, VNL Franqueira, O Angelopoulou 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 20 | 2015 |
A digital forensics profiling methodology for the cyberstalker A Silde, O Angelopoulou 2014 International Conference on Intelligent Networking and Collaborative …, 2014 | 18 | 2014 |
ID Theft: A Computer Forensics' Investigation Framework O Angelopoulou School of Computer and Information Science, Edith Cowan University, Perth …, 2007 | 17 | 2007 |
Survey of data remaining on second hand memory cards in the UK A Jones, O Angelopoulou, L Noriega Computers & Security 84, 239-243, 2019 | 15 | 2019 |
Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR) I Fernandez de Arroyabe, T Watson, O Angelopoulou Journal of Computer Information Systems 63 (3), 716-734, 2023 | 11 | 2023 |
Killing your device via your usb port O Angelopoulou, S Pourmoafi, A Jones, G Sharma Proceedings of the Thirteenth International Symposium on Human Aspects of …, 2019 | 9 | 2019 |
Online ID theft techniques, investigation and response O Angelopoulou, P Thomas, K Xynos, T Tryfonas International Journal of Electronic Security and Digital Forensics 1 (1), 76-88, 2007 | 9 | 2007 |
Towards ‘Crime Specific’Digital Investigation Frameworks O Angelopoulou, S Vidalis | 7 | 2013 |
An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together DA Flores, O Angelopoulou, RJ Self Journal of Internet Services and Information Security (JISIS) 3 (1/2), 101-114, 2013 | 7 | 2013 |
The 2016 hard disk study on information available on the second hand market in the UK A Jones, O Angelopoulou, S Vidalis, H Janicke European Conference on Cyber Warfare and Security, 193-199, 2017 | 6 | 2017 |
An academic approach to digital forensics O Angelopoulou, S Vidalis Journal of Information Warfare 13 (4), 57-VI, 2014 | 5 | 2014 |
A Discussion on the Recovery of Data from a Virtual Machine NJ Healey, O Angelopoulou, D Evans 2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013 | 5 | 2013 |
Who are you today? Profiling the ID theft fraudster O Angelopoulou, S Vidalis, I Robinson European Conference on Cyber Warfare and Security, 25, 2012 | 5 | 2012 |
Analysis of digital evidence in identity theft investigations O Angelopoulou University of Glamorgan, 2010 | 5 | 2010 |
A Study of the Data Remaining on Second-Hand Mobile Devices in the UK O Angelopoulou, A Jones, G Horsman, S Pourmoafi Journal of Digital Forensics, Security and Law 17 (2), 5, 2022 | 4 | 2022 |