Dr Theodoros Spyridopoulos
- Available for postgraduate supervision
Teams and roles for Theodoros Spyridopoulos
Senior Lecturer
Overview
I am a Senior Lecturer at the School of Computer Science and Informatics and have been with the Cybersecurity group since June 2022. My professional journey includes roles at Toshiba Research Europe in Bristol, Airbus in Newport, and the University of the West of England.
My research is centred on the intersection of AI and cybersecurity. I investigate the protective measures AI can offer to cybersecurity and how cybersecurity can reciprocally secure AI. I have a particular focus on decentralised, large-scale systems such as IoT and smart cities. Additionally, I explore cybersecurity modelling for complex systems, utilising techniques like Game Theory, Epidemiology Modelling, Viable System Modelling, and System Dynamics. If these areas match your interests, I'm open to collaboration and discussions.
Outside of my professional remit, I have a passion for photography, partake in 10k runs, and enjoy watching anime.
Publication
2025
- Belarbi, O. et al., 2025. FedHDC-IDS: a hyperdimensional computing based network intrusion detection dystems for IoT networks. Presented at: 2025 IEEE 45th International Conference on Distributed Computing Systems Workshops (ICDCSW) Glasgow, United Kingdom 21-23 July 2025. 2025 IEEE 45th International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE. , pp.677-682. (10.1109/ICDCSW63273.2025.00126)
- Ieropoulos, V. et al. 2025. Collaborative intrusion detection in resource-constrained IoT environments: Challenges, methods, and future directions a review. Journal of Information Security and Applications 93 104127. (10.1016/j.jisa.2025.104127)
2024
- Althunayyan, M. et al. 2024. Hierarchical federated learning-based intrusion detection for in-vehicle networks. Future Internet 16 (12) 451. (10.3390/fi16120451)
- Anthi, E. et al. 2024. Investigating radio frequency vulnerabilities in the Internet of Things (IoT). IoT 5 (2), pp.356-380. (10.3390/iot5020018)
- Mavromatis, I. et al., 2024. Cybersecurity in motion: A survey of challenges and requirements for future test facilities of CAVs. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 10 (4) e5. (10.4108/eetinis.v10i4.4237)
- Pope, J. et al., 2024. Intrusion detection at the IoT edge using federated learning. In: Pitropakis, N. and Sokratis, K. eds. Security and Privacy in Smart Environments. Lecture Notes in Computer Science Springer Nature Switzerland. , pp.98-119. (10.1007/978-3-031-66708-4_5)
- Rana, O. et al. 2024. Hierarchical and decentralised federated learning. Presented at: 2022 Cloud Continuum Conference Los Alamitos, CA, USA 05 February 2022. 2022 Cloud Continuum Proceedings. IEEE. (10.1109/CloudContinuum57429.2022.00008)
2023
- Belarbi, O. et al. 2023. Federated deep learning for intrusion detection in IoT networks. Presented at: GLOBECOM 2023 - 2023 IEEE Global Communications Conference Kuala Lumpur, Malaysia 04-08 December 2023. 2023 IEEE Global Communications Conference Proceedings. IEEE. , pp.237-242. (10.1109/GLOBECOM54140.2023.10437860)
- Erol, U. et al., 2023. Evaluating concept drift detectors on real-world data. Presented at: International Conference on Embedded Wireless Systems and Networks (EWSN 2023) 25-27 September 2023.
- Erol, U. et al., 2023. Multi-sensor, multi-device smart building indoor environmental dataset. Data in Brief 40 109392. (10.1016/j.dib.2023.109392)
- Ooi, M. P. et al., 2023. Measurement and applications: Exploring the challenges and opportunities of hierarchical federated learning in sensor applications. IEEE Instrumentation & Measurement Magazine 26 (9), pp.21-31. (10.1109/MIM.2023.10328671)
2022
- Belarbi, O. et al. 2022. An intrusion detection system based on deep belief networks. Presented at: 4th International Conference on Science of Cyber Security - SciSec 2022 Matsue city, Shimane, Japan 10-12 August 2022. Vol. 13580.Springer. , pp.377-392. (10.1007/978-3-031-17551-0_25)
- Mavromatis, I. et al., 2022. LE3D: A lightweight ensemble framework of data drift detectors for resource-constrained devices. Presented at: IEEE Consumer Communications & Networking Conference 2023 Las Vegas, Nevada, USA 8-11 January 2023.
2017
- Andriotis, P. et al., 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust Vancouver, BC, Canada 9-14 July 2017. Vol. 10292.Lecture Notes in Computer Science , pp.604-622. (10.1007/978-3-319-58460-7_42)
- Fagade, T. et al., 2017. System dynamics approach to malicious insider cyber-threat modelling and analysis. Presented at: 5th International Conference on Human Aspects of Information Security, Privacy and Trust Vancouver, Canada 9th-14th July 2017. Human Aspects of Information Security, Privacy and Trust. Vol. 10292.Lecture Notes in Computer Science Springer. , pp.309-321. (10.1007/978-3-319-58460-7_21)
2015
- Li, S. et al. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust Los Angeles, CA, US 2nd-7th August 2015. Human Aspects of Information Security, Privacy, and Trust. Vol. 9190.Lecture Notes in Computer Science Springer Verlag. , pp.379-390. (10.1007/978-3-319-20376-8_34)
- Spyridopoulos, T. et al. 2015. A game theoretical method for cost-benefit analysis of malware dissemination prevention. Information Security Journal 24 (4-6), pp.164-176. (10.1080/19393555.2015.1092186)
- Spyridopoulos, T. et al. 2015. Application of a game theoretic approach in smart sensor data trustworthiness problems. Presented at: 30th IFIP TC 11 International Information Security and Privacy Conference Hamburg, Germany 26th-28th May 2015. ICT Systems Security and Privacy Protection. Vol. 455.IFIP Advances in Information and Communication Technology Springer New York LLC. , pp.601-615. (10.1007/978-3-319-18467-8_40)
- Spyridopoulos, T. et al. 2015. Applying the ACPO guidelines to building automation systems. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust Los Angeles, CA, US 2nd-7th August 2015. Human Aspects of Information Security, Privacy and Trust. Vol. 9190.Lecture Notes in Computer Science Springer Verlag. , pp.684-692. (10.1007/978-3-319-20376-8_61)
2014
- Craig, R. et al., 2014. Soft systems methodology in net-centric cyber defence system development. Presented at: IEEE International Conference on Systems, Man, and Cybernetics (SMC)MPORTED, MAY BE LINKED San Diego, CA, USA 05-08 October 2014. 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE. , pp.672-677. (10.1109/SMC.2014.6973986)
- Spyridopoulos, T. et al. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering Glenelg, Australia 9th-13th June 2014. 2014 9th International Conference on System of Systems Engineering (SOSE). IEEE. , pp.266-271. (10.1109/SYSOSE.2014.6892499)
- Spyridopoulos, T. et al. 2014. A holistic approach for cyber assurance of critical infrastructure with the viable system model. Presented at: 29th IFIP TC 11 International Conference Marrakesh, Morocco 2nd-4th June 2014. ICT Systems Security and Privacy Protection. Vol. 428.IFIP Advances in Information and Communication Technology , pp.438-445. (10.1007/978-3-642-55415-5_37)
2013
- Polatin-Reuben, D. et al., 2013. A system dynamics model of cyber conflict. Presented at: 2013 IEEE International Conference on Systems, Man, and Cybernetics Manchester, UK 13th-16th October 2013. Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013. IEEE. , pp.303-308. (10.1109/SMC.2013.58)
- Spyridopoulos, T. et al. 2013. A game theoretic defence framework against DoS/DDoS cyber attacks. Computers and Security 38 , pp.39-50. (10.1016/j.cose.2013.03.014)
- Spyridopoulos, T. et al. 2013. Game theoretic approach for cost-benefit analysis of malware proliferation prevention. Presented at: 28th IFIP TC 11 International Conference Auckland, New Zealand 8th-12th July 2013. Security and Privacy Protection in Information Processing Systems. Vol. 405.IFIP Advances in Information and Communication Technology Springer. , pp.28-41. (10.1007/978-3-642-39218-4_3)
- Spyridopoulos, T. , Tryfonas, T. and May, J. 2013. Incident analysis & digital forensics in SCADA and industrial control systems. Presented at: 8th IET International System Safety Conference Incorporating the Cyber Security Conference Cardiff, UK 16th-17th October 2013. 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013. Vol. 2013.IET Conference Publications Vol. 620 CP. IET. , pp.1-6. (10.1049/cp.2013.1720)
2012
- Spyridopoulos, T. and Katos, V. 2012. Data recovery strategies for cloud environments. In: Ruan, K. ed. Cybercrime and Cloud Forensics: Applications for Investigation Processes. IGI Global. , pp.251-265. (10.4018/978-1-4666-2662-1.ch010)
2011
- Spyridopoulos, T. and Katos, V. 2011. Requirements for a forensically ready cloud storage service. International Journal of Digital Crime and Forensics 3 (3), pp.19-36. (10.4018/jdcf.2011070102)
Articles
- Althunayyan, M. et al. 2024. Hierarchical federated learning-based intrusion detection for in-vehicle networks. Future Internet 16 (12) 451. (10.3390/fi16120451)
- Anthi, E. et al. 2024. Investigating radio frequency vulnerabilities in the Internet of Things (IoT). IoT 5 (2), pp.356-380. (10.3390/iot5020018)
- Erol, U. et al., 2023. Multi-sensor, multi-device smart building indoor environmental dataset. Data in Brief 40 109392. (10.1016/j.dib.2023.109392)
- Ieropoulos, V. et al. 2025. Collaborative intrusion detection in resource-constrained IoT environments: Challenges, methods, and future directions a review. Journal of Information Security and Applications 93 104127. (10.1016/j.jisa.2025.104127)
- Mavromatis, I. et al., 2024. Cybersecurity in motion: A survey of challenges and requirements for future test facilities of CAVs. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 10 (4) e5. (10.4108/eetinis.v10i4.4237)
- Ooi, M. P. et al., 2023. Measurement and applications: Exploring the challenges and opportunities of hierarchical federated learning in sensor applications. IEEE Instrumentation & Measurement Magazine 26 (9), pp.21-31. (10.1109/MIM.2023.10328671)
- Spyridopoulos, T. and Katos, V. 2011. Requirements for a forensically ready cloud storage service. International Journal of Digital Crime and Forensics 3 (3), pp.19-36. (10.4018/jdcf.2011070102)
- Spyridopoulos, T. et al. 2015. A game theoretical method for cost-benefit analysis of malware dissemination prevention. Information Security Journal 24 (4-6), pp.164-176. (10.1080/19393555.2015.1092186)
- Spyridopoulos, T. et al. 2013. A game theoretic defence framework against DoS/DDoS cyber attacks. Computers and Security 38 , pp.39-50. (10.1016/j.cose.2013.03.014)
Book sections
- Pope, J. et al., 2024. Intrusion detection at the IoT edge using federated learning. In: Pitropakis, N. and Sokratis, K. eds. Security and Privacy in Smart Environments. Lecture Notes in Computer Science Springer Nature Switzerland. , pp.98-119. (10.1007/978-3-031-66708-4_5)
- Spyridopoulos, T. and Katos, V. 2012. Data recovery strategies for cloud environments. In: Ruan, K. ed. Cybercrime and Cloud Forensics: Applications for Investigation Processes. IGI Global. , pp.251-265. (10.4018/978-1-4666-2662-1.ch010)
Conferences
- Andriotis, P. et al., 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust Vancouver, BC, Canada 9-14 July 2017. Vol. 10292.Lecture Notes in Computer Science , pp.604-622. (10.1007/978-3-319-58460-7_42)
- Belarbi, O. et al. 2022. An intrusion detection system based on deep belief networks. Presented at: 4th International Conference on Science of Cyber Security - SciSec 2022 Matsue city, Shimane, Japan 10-12 August 2022. Vol. 13580.Springer. , pp.377-392. (10.1007/978-3-031-17551-0_25)
- Belarbi, O. et al., 2025. FedHDC-IDS: a hyperdimensional computing based network intrusion detection dystems for IoT networks. Presented at: 2025 IEEE 45th International Conference on Distributed Computing Systems Workshops (ICDCSW) Glasgow, United Kingdom 21-23 July 2025. 2025 IEEE 45th International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE. , pp.677-682. (10.1109/ICDCSW63273.2025.00126)
- Belarbi, O. et al. 2023. Federated deep learning for intrusion detection in IoT networks. Presented at: GLOBECOM 2023 - 2023 IEEE Global Communications Conference Kuala Lumpur, Malaysia 04-08 December 2023. 2023 IEEE Global Communications Conference Proceedings. IEEE. , pp.237-242. (10.1109/GLOBECOM54140.2023.10437860)
- Craig, R. et al., 2014. Soft systems methodology in net-centric cyber defence system development. Presented at: IEEE International Conference on Systems, Man, and Cybernetics (SMC)MPORTED, MAY BE LINKED San Diego, CA, USA 05-08 October 2014. 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE. , pp.672-677. (10.1109/SMC.2014.6973986)
- Erol, U. et al., 2023. Evaluating concept drift detectors on real-world data. Presented at: International Conference on Embedded Wireless Systems and Networks (EWSN 2023) 25-27 September 2023.
- Fagade, T. et al., 2017. System dynamics approach to malicious insider cyber-threat modelling and analysis. Presented at: 5th International Conference on Human Aspects of Information Security, Privacy and Trust Vancouver, Canada 9th-14th July 2017. Human Aspects of Information Security, Privacy and Trust. Vol. 10292.Lecture Notes in Computer Science Springer. , pp.309-321. (10.1007/978-3-319-58460-7_21)
- Li, S. et al. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust Los Angeles, CA, US 2nd-7th August 2015. Human Aspects of Information Security, Privacy, and Trust. Vol. 9190.Lecture Notes in Computer Science Springer Verlag. , pp.379-390. (10.1007/978-3-319-20376-8_34)
- Mavromatis, I. et al., 2022. LE3D: A lightweight ensemble framework of data drift detectors for resource-constrained devices. Presented at: IEEE Consumer Communications & Networking Conference 2023 Las Vegas, Nevada, USA 8-11 January 2023.
- Polatin-Reuben, D. et al., 2013. A system dynamics model of cyber conflict. Presented at: 2013 IEEE International Conference on Systems, Man, and Cybernetics Manchester, UK 13th-16th October 2013. Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013. IEEE. , pp.303-308. (10.1109/SMC.2013.58)
- Rana, O. et al. 2024. Hierarchical and decentralised federated learning. Presented at: 2022 Cloud Continuum Conference Los Alamitos, CA, USA 05 February 2022. 2022 Cloud Continuum Proceedings. IEEE. (10.1109/CloudContinuum57429.2022.00008)
- Spyridopoulos, T. et al. 2015. Application of a game theoretic approach in smart sensor data trustworthiness problems. Presented at: 30th IFIP TC 11 International Information Security and Privacy Conference Hamburg, Germany 26th-28th May 2015. ICT Systems Security and Privacy Protection. Vol. 455.IFIP Advances in Information and Communication Technology Springer New York LLC. , pp.601-615. (10.1007/978-3-319-18467-8_40)
- Spyridopoulos, T. et al. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering Glenelg, Australia 9th-13th June 2014. 2014 9th International Conference on System of Systems Engineering (SOSE). IEEE. , pp.266-271. (10.1109/SYSOSE.2014.6892499)
- Spyridopoulos, T. et al. 2013. Game theoretic approach for cost-benefit analysis of malware proliferation prevention. Presented at: 28th IFIP TC 11 International Conference Auckland, New Zealand 8th-12th July 2013. Security and Privacy Protection in Information Processing Systems. Vol. 405.IFIP Advances in Information and Communication Technology Springer. , pp.28-41. (10.1007/978-3-642-39218-4_3)
- Spyridopoulos, T. et al. 2015. Applying the ACPO guidelines to building automation systems. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust Los Angeles, CA, US 2nd-7th August 2015. Human Aspects of Information Security, Privacy and Trust. Vol. 9190.Lecture Notes in Computer Science Springer Verlag. , pp.684-692. (10.1007/978-3-319-20376-8_61)
- Spyridopoulos, T. et al. 2014. A holistic approach for cyber assurance of critical infrastructure with the viable system model. Presented at: 29th IFIP TC 11 International Conference Marrakesh, Morocco 2nd-4th June 2014. ICT Systems Security and Privacy Protection. Vol. 428.IFIP Advances in Information and Communication Technology , pp.438-445. (10.1007/978-3-642-55415-5_37)
- Spyridopoulos, T. , Tryfonas, T. and May, J. 2013. Incident analysis & digital forensics in SCADA and industrial control systems. Presented at: 8th IET International System Safety Conference Incorporating the Cyber Security Conference Cardiff, UK 16th-17th October 2013. 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013. Vol. 2013.IET Conference Publications Vol. 620 CP. IET. , pp.1-6. (10.1049/cp.2013.1720)
Teaching
Biography
Since June 2022, I have been a Senior Lecturer in the School of Computer Science and Informatics at Cardiff University. I am a member of the Cybersecurity group, where I co-lead the group's industrial engagement. I am also the module leader for the Operating Systems Security module, which is part of Cardiff's new NCSC-accredited Cyber Security and Technology MSc, supported by PwC.
Prior to Cardiff University, I worked as a senior lecturer in the department of Computer Science and Creative Technologies at the University of the West of England in Bristol. My role involved module leadership in a series of modules including Security and Forensic Tools (UGT), Critical Systems Security (PGT) and Final Year Projects (UGT).
I have strong industry experience. I worked for Toshiba Research Europe from February 2020 to June 2022 as a senior research engineer conducting research on the intersection between AI and cybersecurity, as well as research around connected autonomous vehicles. I was responsible for the lab's cyber security research strategy, collaborating with Toshiba's business units, and industrial and academic stakeholders. I was also actively involved in a series of projects, including "CAVShield", a feasibility study funded by Innovate UK (£281,990) on the requirements of a cyber security test and evaluation centre for Connected Autonomous Vehicles (CAVs) and Cooperative Intelligent Transportation Systems (C-ITS), and "SWAN: Secure Wireless Agile Networks", a collaborative project with the University of Bristol funded by EPSRC, GCHQ, Toshiba and Roke. Additionally, I led research project bidding activities including SYNERGIA (Secure bY desigN End to end platfoRm for larGe scale resource-constrained Iot Applications) for which I was the technical leader and system architect. Funded by Innovate UK (£2.2M) under the 2020 "Demonstrators addressing cyber security challenges in the Internet of Things: round 2" call, SYNERGIA focused on the end-to-end security of large-scale resource-constrained IoT applications that rely on Edge processing. The project involved the development and demonstration of cyber security research innovations around: i) AI-based intrusion detection at the Edge, ii) secure communication of sensor devices (Endpoints) with other Endpoints and the Edge, iii) secure configuration management of Endpoints and their dataflows at the Edge and iv) the development of the IoT platform's back end.
I also hold a patent on the "Detection of Model Attacks in Distributed AI", published in May 2022, which focuses on a method to mitigate model attacks in Distributed AI architectures using a decentralised approach.
My industrial experience also includes my employment as a cyber security research engineer at Airbus Group Innovations in Newport in 2015, where I was involved in research around threat detection for Industrial Control Systems.
Honours and awards
Best Teacher of the Year, Department Of Computer Science and Creative Technologies, UWE, Bristol; Academic year: 2018-19.
Best Paper Award, 6th International Workshop on Digital Forensics and Incident Analysis (WDFIA). Title: "Towards a forensically ready cloud storage service", Authors: T. Spyridopoulos, V. Katos
Professional memberships
- Member of PETRAS.
- ISACA Professional Membership.
- Palo Alto Networks Authorised Cybersecurity Academy Instructor.
- Higher Education Academy Fellow (Recognition Reference: PR132452).
- License to practise the profession of Degree holder Engineer, Greek Technical Chamber.
Academic positions
- 2022 - present: Lecturer, Cardiff University
- 2016 - 2020: Senior Lecturer, UWE, Bristol
Committees and reviewing
- Grant reviewer, Dutch Research Council (NWO - Nederlandse Organisatie voor Wetenschappelijk Onderzoek)
- Conference Co-chair, International Conference on Security of Information and Networks
- Programme Committee Member: Globecom CISS
- Journal reviewer, Computers and Security, Journal of Information Security and Applications, Journal of the Operational Research Society
Supervisions
The areas I'm interested in supervising are:
- Cybersecurity for AI and AI for cybersecurity (e.g. distributed AI for cybersecurity)
- Cybersecurity modelling and simulations (epidemiology modelling, systems theory, game theory, attack trees etc.)
Current supervision
Contact Details
+44 29225 14931
Abacws, Room Room 5.67, Senghennydd Road, Cathays, Cardiff, CF24 4AG
Research themes
Specialisms
- Cybersecurity and privacy
- Artificial intelligence
- Modelling and simulation
- System and network security