Dr Theodoros Spyridopoulos
Senior Lecturer
- Available for postgraduate supervision
Overview
I am a Senior Lecturer at the School of Computer Science and Informatics and have been with the Cybersecurity group since June 2022. My professional journey includes roles at Toshiba Research Europe in Bristol, Airbus in Newport, and the University of the West of England.
My research is centred on the intersection of AI and cybersecurity. I investigate the protective measures AI can offer to cybersecurity and how cybersecurity can reciprocally secure AI. I have a particular focus on decentralised, large-scale systems such as IoT and smart cities. Additionally, I explore cybersecurity modelling for complex systems, utilising techniques like Game Theory, Epidemiology Modelling, Viable System Modelling, and System Dynamics. If these areas match your interests, I'm open to collaboration and discussions.
Outside of my professional remit, I have a passion for photography, partake in 10k runs, and enjoy watching anime.
Publication
2024
- Althunayyan, M., Javed, A., Rana, O. and Spyridopoulos, T. 2024. Hierarchical federated learning-based intrusion detection for in-vehicle networks. Future Internet 16(12), article number: 451. (10.3390/fi16120451)
- Pope, J. et al. 2024. Intrusion Detection at the IoT Edge Using Federated Learning. In: Pitropakis, N. and Sokratis, K. eds. Security and Privacy in Smart Environments. Springer Nature Switzerland, pp. 98-119.
- Anthi, E., Williams, L., Ieropoulos, V. and Spyridopoulos, T. 2024. Investigating radio frequency vulnerabilities in the Internet of Things (IoT). IoT 5(2), pp. 356-380. (10.3390/iot5020018)
- Rana, O., Spyridopoulos, T., Hudson, N., Baughman, M., Chard, K., Foster, I. and Khan, A. 2024. Hierarchical and decentralised federated learning. Presented at: 2022 Cloud Continuum Conference, 05 February 20222022 Cloud Continuum Proceedings. IEEE, (10.1109/CloudContinuum57429.2022.00008)
- Mavromatis, I. et al. 2024. Cybersecurity in motion: A survey of challenges and requirements for future test facilities of CAVs. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 10(4), article number: e5. (10.4108/eetinis.v10i4.4237)
2023
- Ooi, M. P. et al. 2023. Measurement and applications: Exploring the challenges and opportunities of hierarchical federated learning in sensor applications. IEEE Instrumentation & Measurement Magazine 26(9), pp. 21-31. (10.1109/MIM.2023.10328671)
- Erol, U. et al. 2023. Multi-sensor, multi-device smart building indoor environmental dataset. Data in Brief 40, article number: 109392. (10.1016/j.dib.2023.109392)
- Belarbi, O., Spyridopoulos, T., Anthi, E., Mavromatis, I., Carnelli, P. and Khan, A. 2023. Federated deep learning for intrusion detection in IoT networks. Presented at: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 04-08 December 20232023 IEEE Global Communications Conference Proceedings. IEEE pp. 237-242., (10.1109/GLOBECOM54140.2023.10437860)
- Erol, U. et al. 2023. Evaluating concept drift detectors on real-world data. Presented at: International Conference on Embedded Wireless Systems and Networks (EWSN 2023), 25-27 September 2023.
2022
- Belarbi, O., Khan, A., Carnelli, P. and Spyridopoulos, T. 2022. An intrusion detection system based on deep belief networks. Presented at: 4th International Conference on Science of Cyber Security - SciSec 2022, Matsue city, Shimane, Japan, 10-12 August 2022, Vol. 13580. Springer pp. 377-392., (10.1007/978-3-031-17551-0_25)
- Mavromatis, I. et al. 2022. LE3D: A lightweight ensemble framework of data drift detectors for resource-constrained devices. Presented at: IEEE Consumer Communications & Networking Conference 2023, Las Vegas, Nevada, USA, 8-11 January 2023.
2017
- Fagade, T., Albishry, N., Tryfonas, T. and Spyridopoulos, T. 2017. System dynamics approach to malicious insider cyber-threat modelling and analysis. Presented at: 5th International Conference on Human Aspects of Information Security, Privacy and Trust, Vancouver, Canada, 9th-14th July 2017Human Aspects of Information Security, Privacy and Trust, Vol. 10292. Lecture Notes in Computer Science Springer pp. 309-321., (10.1007/978-3-319-58460-7_21)
- Andriotis, P., Li, S., Spyridopoulos, T. and Stringhini, G. 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017, Vol. 10292. Lecture Notes in Computer Science pp. 604-622., (10.1007/978-3-319-58460-7_42)
2015
- Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T. and Oikonomou, G. 2015. A game theoretical method for cost-benefit analysis of malware dissemination prevention. Information Security Journal 24(4-6), pp. 164-176. (10.1080/19393555.2015.1092186)
- Spyridopoulos, T., Sutherland, I., Read, H., Jones, A., Sutherland, G. and Burgess, M. 2015. Applying the ACPO guidelines to building automation systems. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy and Trust, Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 684-692., (10.1007/978-3-319-20376-8_61)
- Spyridopoulos, T., Maraslis, K., Oikonomou, G., Tryfonas, T. and Haghighi, M. 2015. Application of a game theoretic approach in smart sensor data trustworthiness problems. Presented at: 30th IFIP TC 11 International Information Security and Privacy Conference, Hamburg, Germany, 26th-28th May 2015ICT Systems Security and Privacy Protection, Vol. 455. IFIP Advances in Information and Communication Technology Springer New York LLC pp. 601-615., (10.1007/978-3-319-18467-8_40)
- Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. and Russell, G. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy, and Trust, Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 379-390., (10.1007/978-3-319-20376-8_34)
2014
- Craig, R., Spyridopoulos, T., Tryfonas, T. and May, J. 2014. Soft systems methodology in net-centric cyber defence system development. Presented at: IEEE International Conference on Systems, Man, and Cybernetics (SMC)MPORTED, MAY BE LINKED, San Diego, CA, USA, 05-08 October 20142014 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE pp. 672-677., (10.1109/SMC.2014.6973986)
- Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. and Li, S. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 20142014 9th International Conference on System of Systems Engineering (SOSE). IEEE pp. 266-271., (10.1109/SYSOSE.2014.6892499)
- Spyridopoulos, T., Topa, I., Tryfonas, T. and Karyda, M. 2014. A holistic approach for cyber assurance of critical infrastructure with the viable system model. Presented at: 29th IFIP TC 11 International Conference, Marrakesh, Morocco, 2nd-4th June 2014ICT Systems Security and Privacy Protection, Vol. 428. IFIP Advances in Information and Communication Technology pp. 438-445., (10.1007/978-3-642-55415-5_37)
2013
- Spyridopoulos, T., Oikonomou, G., Tryfonas, T. and Karanikas, G. 2013. A game theoretic defence framework against DoS/DDoS cyber attacks. Computers and Security 38, pp. 39-50. (10.1016/j.cose.2013.03.014)
- Spyridopoulos, T., Tryfonas, T. and May, J. 2013. Incident analysis & digital forensics in SCADA and industrial control systems. Presented at: 8th IET International System Safety Conference Incorporating the Cyber Security Conference, Cardiff, UK, 16th-17th October 20138th IET International System Safety Conference incorporating the Cyber Security Conference 2013, Vol. 2013. IET Conference Publications Vol. 620 CP. IET pp. 1-6., (10.1049/cp.2013.1720)
- Spyridopoulos, T., Oikonomou, G., Tryfonas, T. and Ge, M. 2013. Game theoretic approach for cost-benefit analysis of malware proliferation prevention. Presented at: 28th IFIP TC 11 International Conference, Auckland, New Zealand, 8th-12th July 2013Security and Privacy Protection in Information Processing Systems, Vol. 405. IFIP Advances in Information and Communication Technology Springer pp. 28-41., (10.1007/978-3-642-39218-4_3)
- Polatin-Reuben, D., Craig, R., Spyridopoulos, T. and Tryfonas, T. 2013. A system dynamics model of cyber conflict. Presented at: 2013 IEEE International Conference on Systems, Man, and Cybernetics, Manchester, UK, 13th-16th October 2013Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013. IEEE pp. 303-308., (10.1109/SMC.2013.58)
2012
- Spyridopoulos, T. and Katos, V. 2012. Data recovery strategies for cloud environments. In: Ruan, K. ed. Cybercrime and Cloud Forensics: Applications for Investigation Processes. IGI Global, pp. 251-265., (10.4018/978-1-4666-2662-1.ch010)
2011
- Spyridopoulos, T. and Katos, V. 2011. Requirements for a forensically ready cloud storage service. International Journal of Digital Crime and Forensics 3(3), pp. 19-36. (10.4018/jdcf.2011070102)
Adrannau llyfrau
- Pope, J. et al. 2024. Intrusion Detection at the IoT Edge Using Federated Learning. In: Pitropakis, N. and Sokratis, K. eds. Security and Privacy in Smart Environments. Springer Nature Switzerland, pp. 98-119.
- Spyridopoulos, T. and Katos, V. 2012. Data recovery strategies for cloud environments. In: Ruan, K. ed. Cybercrime and Cloud Forensics: Applications for Investigation Processes. IGI Global, pp. 251-265., (10.4018/978-1-4666-2662-1.ch010)
Cynadleddau
- Rana, O., Spyridopoulos, T., Hudson, N., Baughman, M., Chard, K., Foster, I. and Khan, A. 2024. Hierarchical and decentralised federated learning. Presented at: 2022 Cloud Continuum Conference, 05 February 20222022 Cloud Continuum Proceedings. IEEE, (10.1109/CloudContinuum57429.2022.00008)
- Belarbi, O., Spyridopoulos, T., Anthi, E., Mavromatis, I., Carnelli, P. and Khan, A. 2023. Federated deep learning for intrusion detection in IoT networks. Presented at: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 04-08 December 20232023 IEEE Global Communications Conference Proceedings. IEEE pp. 237-242., (10.1109/GLOBECOM54140.2023.10437860)
- Erol, U. et al. 2023. Evaluating concept drift detectors on real-world data. Presented at: International Conference on Embedded Wireless Systems and Networks (EWSN 2023), 25-27 September 2023.
- Belarbi, O., Khan, A., Carnelli, P. and Spyridopoulos, T. 2022. An intrusion detection system based on deep belief networks. Presented at: 4th International Conference on Science of Cyber Security - SciSec 2022, Matsue city, Shimane, Japan, 10-12 August 2022, Vol. 13580. Springer pp. 377-392., (10.1007/978-3-031-17551-0_25)
- Mavromatis, I. et al. 2022. LE3D: A lightweight ensemble framework of data drift detectors for resource-constrained devices. Presented at: IEEE Consumer Communications & Networking Conference 2023, Las Vegas, Nevada, USA, 8-11 January 2023.
- Fagade, T., Albishry, N., Tryfonas, T. and Spyridopoulos, T. 2017. System dynamics approach to malicious insider cyber-threat modelling and analysis. Presented at: 5th International Conference on Human Aspects of Information Security, Privacy and Trust, Vancouver, Canada, 9th-14th July 2017Human Aspects of Information Security, Privacy and Trust, Vol. 10292. Lecture Notes in Computer Science Springer pp. 309-321., (10.1007/978-3-319-58460-7_21)
- Andriotis, P., Li, S., Spyridopoulos, T. and Stringhini, G. 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017, Vol. 10292. Lecture Notes in Computer Science pp. 604-622., (10.1007/978-3-319-58460-7_42)
- Spyridopoulos, T., Sutherland, I., Read, H., Jones, A., Sutherland, G. and Burgess, M. 2015. Applying the ACPO guidelines to building automation systems. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy and Trust, Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 684-692., (10.1007/978-3-319-20376-8_61)
- Spyridopoulos, T., Maraslis, K., Oikonomou, G., Tryfonas, T. and Haghighi, M. 2015. Application of a game theoretic approach in smart sensor data trustworthiness problems. Presented at: 30th IFIP TC 11 International Information Security and Privacy Conference, Hamburg, Germany, 26th-28th May 2015ICT Systems Security and Privacy Protection, Vol. 455. IFIP Advances in Information and Communication Technology Springer New York LLC pp. 601-615., (10.1007/978-3-319-18467-8_40)
- Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. and Russell, G. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy, and Trust, Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 379-390., (10.1007/978-3-319-20376-8_34)
- Craig, R., Spyridopoulos, T., Tryfonas, T. and May, J. 2014. Soft systems methodology in net-centric cyber defence system development. Presented at: IEEE International Conference on Systems, Man, and Cybernetics (SMC)MPORTED, MAY BE LINKED, San Diego, CA, USA, 05-08 October 20142014 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE pp. 672-677., (10.1109/SMC.2014.6973986)
- Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. and Li, S. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 20142014 9th International Conference on System of Systems Engineering (SOSE). IEEE pp. 266-271., (10.1109/SYSOSE.2014.6892499)
- Spyridopoulos, T., Topa, I., Tryfonas, T. and Karyda, M. 2014. A holistic approach for cyber assurance of critical infrastructure with the viable system model. Presented at: 29th IFIP TC 11 International Conference, Marrakesh, Morocco, 2nd-4th June 2014ICT Systems Security and Privacy Protection, Vol. 428. IFIP Advances in Information and Communication Technology pp. 438-445., (10.1007/978-3-642-55415-5_37)
- Spyridopoulos, T., Tryfonas, T. and May, J. 2013. Incident analysis & digital forensics in SCADA and industrial control systems. Presented at: 8th IET International System Safety Conference Incorporating the Cyber Security Conference, Cardiff, UK, 16th-17th October 20138th IET International System Safety Conference incorporating the Cyber Security Conference 2013, Vol. 2013. IET Conference Publications Vol. 620 CP. IET pp. 1-6., (10.1049/cp.2013.1720)
- Spyridopoulos, T., Oikonomou, G., Tryfonas, T. and Ge, M. 2013. Game theoretic approach for cost-benefit analysis of malware proliferation prevention. Presented at: 28th IFIP TC 11 International Conference, Auckland, New Zealand, 8th-12th July 2013Security and Privacy Protection in Information Processing Systems, Vol. 405. IFIP Advances in Information and Communication Technology Springer pp. 28-41., (10.1007/978-3-642-39218-4_3)
- Polatin-Reuben, D., Craig, R., Spyridopoulos, T. and Tryfonas, T. 2013. A system dynamics model of cyber conflict. Presented at: 2013 IEEE International Conference on Systems, Man, and Cybernetics, Manchester, UK, 13th-16th October 2013Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013. IEEE pp. 303-308., (10.1109/SMC.2013.58)
Erthyglau
- Althunayyan, M., Javed, A., Rana, O. and Spyridopoulos, T. 2024. Hierarchical federated learning-based intrusion detection for in-vehicle networks. Future Internet 16(12), article number: 451. (10.3390/fi16120451)
- Anthi, E., Williams, L., Ieropoulos, V. and Spyridopoulos, T. 2024. Investigating radio frequency vulnerabilities in the Internet of Things (IoT). IoT 5(2), pp. 356-380. (10.3390/iot5020018)
- Mavromatis, I. et al. 2024. Cybersecurity in motion: A survey of challenges and requirements for future test facilities of CAVs. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 10(4), article number: e5. (10.4108/eetinis.v10i4.4237)
- Ooi, M. P. et al. 2023. Measurement and applications: Exploring the challenges and opportunities of hierarchical federated learning in sensor applications. IEEE Instrumentation & Measurement Magazine 26(9), pp. 21-31. (10.1109/MIM.2023.10328671)
- Erol, U. et al. 2023. Multi-sensor, multi-device smart building indoor environmental dataset. Data in Brief 40, article number: 109392. (10.1016/j.dib.2023.109392)
- Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T. and Oikonomou, G. 2015. A game theoretical method for cost-benefit analysis of malware dissemination prevention. Information Security Journal 24(4-6), pp. 164-176. (10.1080/19393555.2015.1092186)
- Spyridopoulos, T., Oikonomou, G., Tryfonas, T. and Karanikas, G. 2013. A game theoretic defence framework against DoS/DDoS cyber attacks. Computers and Security 38, pp. 39-50. (10.1016/j.cose.2013.03.014)
- Spyridopoulos, T. and Katos, V. 2011. Requirements for a forensically ready cloud storage service. International Journal of Digital Crime and Forensics 3(3), pp. 19-36. (10.4018/jdcf.2011070102)
Teaching
Biography
Since June 2022, I have been a Senior Lecturer in the School of Computer Science and Informatics at Cardiff University. I am a member of the Cybersecurity group, where I co-lead the group's industrial engagement. I am also the module leader for the Operating Systems Security module, which is part of Cardiff's new NCSC-accredited Cyber Security and Technology MSc, supported by PwC.
Prior to Cardiff University, I worked as a senior lecturer in the department of Computer Science and Creative Technologies at the University of the West of England in Bristol. My role involved module leadership in a series of modules including Security and Forensic Tools (UGT), Critical Systems Security (PGT) and Final Year Projects (UGT).
I have strong industry experience. I worked for Toshiba Research Europe from February 2020 to June 2022 as a senior research engineer conducting research on the intersection between AI and cybersecurity, as well as research around connected autonomous vehicles. I was responsible for the lab's cyber security research strategy, collaborating with Toshiba's business units, and industrial and academic stakeholders. I was also actively involved in a series of projects, including "CAVShield", a feasibility study funded by Innovate UK (£281,990) on the requirements of a cyber security test and evaluation centre for Connected Autonomous Vehicles (CAVs) and Cooperative Intelligent Transportation Systems (C-ITS), and "SWAN: Secure Wireless Agile Networks", a collaborative project with the University of Bristol funded by EPSRC, GCHQ, Toshiba and Roke. Additionally, I led research project bidding activities including SYNERGIA (Secure bY desigN End to end platfoRm for larGe scale resource-constrained Iot Applications) for which I was the technical leader and system architect. Funded by Innovate UK (£2.2M) under the 2020 "Demonstrators addressing cyber security challenges in the Internet of Things: round 2" call, SYNERGIA focused on the end-to-end security of large-scale resource-constrained IoT applications that rely on Edge processing. The project involved the development and demonstration of cyber security research innovations around: i) AI-based intrusion detection at the Edge, ii) secure communication of sensor devices (Endpoints) with other Endpoints and the Edge, iii) secure configuration management of Endpoints and their dataflows at the Edge and iv) the development of the IoT platform's back end.
I also hold a patent on the "Detection of Model Attacks in Distributed AI", published in May 2022, which focuses on a method to mitigate model attacks in Distributed AI architectures using a decentralised approach.
My industrial experience also includes my employment as a cyber security research engineer at Airbus Group Innovations in Newport in 2015, where I was involved in research around threat detection for Industrial Control Systems.
Honours and awards
Best Teacher of the Year, Department Of Computer Science and Creative Technologies, UWE, Bristol; Academic year: 2018-19.
Best Paper Award, 6th International Workshop on Digital Forensics and Incident Analysis (WDFIA). Title: "Towards a forensically ready cloud storage service", Authors: T. Spyridopoulos, V. Katos
Professional memberships
- Member of PETRAS.
- ISACA Professional Membership.
- Palo Alto Networks Authorised Cybersecurity Academy Instructor.
- Higher Education Academy Fellow (Recognition Reference: PR132452).
- License to practise the profession of Degree holder Engineer, Greek Technical Chamber.
Academic positions
- 2022 - present: Lecturer, Cardiff University
- 2016 - 2020: Senior Lecturer, UWE, Bristol
Committees and reviewing
- Grant reviewer, Dutch Research Council (NWO - Nederlandse Organisatie voor Wetenschappelijk Onderzoek)
- Conference Co-chair, International Conference on Security of Information and Networks
- Programme Committee Member: Globecom CISS
- Journal reviewer, Computers and Security, Journal of Information Security and Applications, Journal of the Operational Research Society
Supervisions
The areas I'm interested in supervising are:
- Cybersecurity for AI and AI for cybersecurity (e.g. distributed AI for cybersecurity)
- Cybersecurity modelling and simulations (epidemiology modelling, systems theory, game theory, attack trees etc.)
Current supervision
Contact Details
+44 29225 14931
Abacws, Room Room 5.67, Senghennydd Road, Cathays, Cardiff, CF24 4AG
Research themes
Specialisms
- Cybersecurity and privacy
- Artificial intelligence
- Modelling and simulation
- System and network security