Ewch i’r prif gynnwys
Dr George Theodorakopoulos

Dr George Theodorakopoulos


Yr Ysgol Cyfrifiadureg a Gwybodeg

+44 (0)29 2087 4855
Adeiladau'r Frenhines -Adeilad y De, 5 The Parade, Heol Casnewydd, Caerdydd, CF24 3AA
Sylwebydd y cyfryngau


My research interests span privacy, security, and (computational) trust in mobile networks.

Privacy is my main current focus, and these are the questions I try to answer:

  • In what ways do we disclose private information (through smartphone apps, social networks, Internet-enabled devices)?
  • How can we protect our information without going off the grid (by adding some sort of noise)?
  • Most importantly, how can we reason concretely and quantitatively about privacy attacks and defences (e.g. in order to provide privacy guarantees, or to monetize private information appropriately)?

Personal page


George Theodorakopoulos received the Diploma degree from the National Technical University of Athens, Greece, in 2002, and the M.S. and Ph.D. degrees from the University of Maryland, College Park, MD, USA, in 2004 and 2007, all in electrical and computer engineering.

He is a Lecturer at the School of Computer Science & Informatics, Cardiff University, since 2012. From 2007 to 2011, he was a Senior Researcher at the Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland. He is a coauthor (with John Baras) of the book Path Problems in Networks (Morgan & Claypool, 2010).

He received the Best Paper award at the ACM Workshop on Wireless Security, October 2004, for "Trust evaluation in ad-hoc networks" and the 2007 IEEE ComSoc Leonard Abraham prize for "On trust models and trust evaluation metrics for ad hoc networks." He coauthored the paper "Quantifying Location Privacy," which was runner-up for the 2012 PET Award (Award for Outstanding Research in Privacy Enhancing Technologies).

Education and qualifications

  • 2007: PhD in Electrical and Computer Engineering, University of Maryland, College Park, MD, USA
  • 2004: MSc in Electrical and Computer Engineering, University of Maryland, College Park, MD, USA
  • 2002: Diploma (5yr BSc) in Electrical and Computer Engineering, National Technical University of Athens, Greece

Career overview

  • 2012 - present: Lecturer, Cardiff University, School of Computer Science and Informatics
  • 2011 - 2012 Lecturer, University of Derby, School of Computing and Mathematics
  • 2007 - 2011 Senior Researcher, Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland

Anrhydeddau a Dyfarniadau

Pwyllgorau ac adolygu

  • 2015 - present: Deputy Director of Research
  • 2015 - present: Co-leader of Privacy and Security Priority Area
  • 2015 - present: Postgraduate Research Admissions Tutor
  • 2015 - present: Impact coordinator
  • 2014 - present: Member of International Committee
  • 2012 - present: Environmental Compliance Officer









  • Theodorakopoulos, G. 2015. The same-origin attack against location privacy. Presented at: 22nd ACM Conference on Computer and Communications Security, Denver, Colorado, USA, 12-126 October 2015 Presented at Ray, I., Hopper, N. and Jansen, R. eds.WPES '15 Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society. ACM pp. 49-53., (10.1145/2808138.2808150)





  • Shokri, R.et al. 2011. Quantifying location privacy. Presented at: 2011 IEEE Symposium on Security and Privacy (SP), Berkeley, CA, USA, 22-25 May 2011 Presented at O’Conner, L. ed.Proceedings of the 2011 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA: IEEE pp. 247-262., (10.1109/SP.2011.18)






  • Theodorakopoulos, G. and Baras, J. S. 2004. Trust evaluation in ad-hoc networks. Presented at: WiSe '04:3rd ACM workshop on Wireless security, 1 October 2004 Presented at Jakobsson, M. and Perrig, A. eds.WiSe '04 Proceedings of the 3rd ACM workshop on Wireless security. New York, NY: ACM pp. 1-10., (10.1145/1023646.1023648)


  • CMT105 - Security Techniques (Autumn 2013, 2014, 2015, 2016) - redeveloped
  • CM3110 - Security (Autumn 2015, 2016) - redeveloped
  • CM3202 - Emerging Technologies [Privacy] (Spring 2014, 2015) - developed from ground up
  • CM3105 - Security and Forensics [Security] (Autumn 2014)
  • CM2302 - Pervasive Computing (Spring 2014, 2015)
  • CM1205 - Computer Architecture and Operating Systems (Spring 2013)


Goruchwyliaeth gyfredol

Alanoud Subahi

Research student

Peter Davison

Research student

Turki Al Lelah

Research student