Skip navigation

Items where Author is "Loukas, George"

Items where Author is "Loukas, George"

Up a level
Export as [feed] RSS
Group by: Item Type | Uncontrolled Keywords | No Grouping
access Activity recognition ad hoc network connection ad hoc networks adaptation Anomaly detection attack detection attacks autonomous robots autonomous systems Awareness Bayesian network Behaviour-based BLE Bluetooth beacons Bluetooth Low Energy building evacuation case based reasoning Citizen safety Cloud computing cloud storage cognitive packet network collaboration collaborative work Community policing Computation offloading Computational offloading computer computer networks computer security confidentiality Context analysis control critical cyber cyber attack Cyber attacks Cyber crime Cyber security cyber terrorism Cyber trustworthiness cyber-physical attacks Cyber-physical security cyber-physical system security Cyber-physical systems denial of service Detection latency Digital forensics disaster management distributed distributed response DoS educational institutions Emergency management emergency response emergency response operations emergency response robots emergency services Energy efficiency financial government hacker profiling hazardous materials human-as-a-security-sensor Human-as-a-Sensor humans iBeacon industrial Inertial sensors information information security Information trustworthiness insider integrity intelligent networks intelligent robots intelligent systems international Internet Internet history analysis internet of things Intrusion detection Intrusion detection system IoT JADE joining processes Lifelong learning Location spoofing Machine Learning Malicious Spoofing Attacks management mechanisms military minimum spanning tree mobile ad hoc networks mobile communication mobile radio mobile robots Mobile security multi-agent system multi-hop connection multi-robot systems network network performance network flow optimisation problems network modelling network security network topology network-level security and protection nuclear Occupancy Detection Pattern of life pervasive computing phishing physical security physical-cyber attacks Predicting attack susceptibility Privacy Provenance of information Quality of information radio networks rate-limiting rescue robots robot sensing systems Robotic vehicles robotic wireless connection robotic wireless network connection Robotics SAN Security self-aware network Semantic attacks Semantic attacks Semantic social engineering Serious games Session-to-session analysis short course side-channel attacks SimJADE simulation Smartphone security Social engineering Social media Social networks software software framework static wireless sink statistical learning Stuxnet survey system teaching telerobotics terrorist threats trapped civilians uncertainty user profiling Vehicle security Vehicles Vehicular security Wearable devices Wearables wireless ad hoc network wireless networks wireless sensor networks World wide web
Number of items: 270.

access

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Activity recognition

Filippoupolitis, Avgoustinos, Oliff, William, Takand, Babak and Loukas, George (2017) Location-enhanced activity recognition in indoor environments using off the shelf smart watch technology and BLE beacons. Sensors, 17 (6):1230. pp. 1-25. ISSN 1424-8220 (Print), 1424-8220 (Online) (doi:10.3390/s17061230)

Filippoupolitis, Avgoustinos, Takand, Babak and Loukas, George (2017) Activity recognition in a home setting using off the shelf smart watch technology. In: 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 39-44. ISBN 978-1-5090-5567-8 ISSN 978-1-5090-5566-1 (Online) (doi:10.1109/IUCC-CSS.2016.014)

ad hoc network connection

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

ad hoc networks

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

adaptation

Gianni, Daniele, Loukas, George and Gelenbe, Erol (2008) A simulation framework for the investigation of adaptive behaviours in largely populated building evacuation scenarios. In: Seventh International Joint Conference on Autonomous Agents & Multi-Agent Systems (AAMAS 08). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, USA.

Anomaly detection

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

attack detection

Oke, Gulay and Loukas, George (2008) Distributed defence against denial of service attacks: a practical view. In: Proceedings of the 2008 BCS International Conference on Visions of Computer Science. Electronic Workshops in Computing (eWiC) . British Computer Society (BCS), London, UK, pp. 153-162. ISBN 9781906124083 ISSN 1477-9358

attacks

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

autonomous robots

Timotheou, Stelios and Loukas, George (2009) Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios. In: Proceedings of the 2009 ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), New York, NY, USA, pp. 1171-1175. ISBN 9781605581668 (doi:10.1145/1529282.1529542)

autonomous systems

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Awareness

Sorace, Silvio, Quercia, Elisabeth, La Mattina, Ernesto, Patrikakis, Charalampos Z., Bacon, Liz, Loukas, George and MacKinnon, Lachlan (2017) Serious games: an attractive approach to improve awareness of community policing technologies. In: Next Generation Community Policing Conference, 25 October 2017, Crete, Greece. (In Press)

Bayesian network

Bezemskij, Anatolij, Loukas, George, Gan, Diane and Anthony, Richard (2017) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, Exeter, United Kingdom, pp. 1-6. (In Press)

Behaviour-based

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

BLE

Filippoupolitis, Avgoustinos, Oliff, William and Loukas, George (2016) Occupancy detection for building emergency management using BLE beacons. In: Computer and Information Sciences: 31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings. Communications in Computer and Information Science, 659 . Springer International Publishing, Cham, Switzerland, pp. 233-240. ISBN 978-3-319-47216-4 ISSN 1865-0929 (Print), 1865-0937 (Online) (doi:10.1007/978-3-319-47217-1_25)

Bluetooth beacons

Filippoupolitis, Avgoustinos, Oliff, William, Takand, Babak and Loukas, George (2017) Location-enhanced activity recognition in indoor environments using off the shelf smart watch technology and BLE beacons. Sensors, 17 (6):1230. pp. 1-25. ISSN 1424-8220 (Print), 1424-8220 (Online) (doi:10.3390/s17061230)

Bluetooth Low Energy

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems. In: 2017 IEEE 15th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965755)

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (In Press)

Filippoupolitis, Avgoustinos, Oliff, William and Loukas, George (2017) Bluetooth low energy based occupancy detection for emergency management. In: 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 31-38. ISBN 978-1-5090-5567-8 ISSN 978-1-5090-5566-1 (Online) (doi:10.1109/IUCC-CSS.2016.013)

building evacuation

Filippoupolitis, Avgoustinos, Gelenbe, Erol, Gianni, Daniele, Hey, Laurence, Loukas, George and Timotheou, Stelios (2012) Distributed agent-based building evacuation simulator. In: Summer Computer Simulation Conference 2008 (SCSC'08): Part of the 2008 Summer Simulation Multiconference. Curran Associates, Inc., Red Hook, NY, USA, pp. 46-53. ISBN 9781622763597

Gianni, Daniele, Loukas, George and Gelenbe, Erol (2008) A simulation framework for the investigation of adaptive behaviours in largely populated building evacuation scenarios. In: Seventh International Joint Conference on Autonomous Agents & Multi-Agent Systems (AAMAS 08). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, USA.

case based reasoning

Kapetanakis, Stelios, Filippoupolitis, Avgoustinos, Loukas, George and Al Murayziq, Tariq Saad (2014) Profiling cyber attackers using case-based reasoning. In: 19th UK Workshop on Case-Based Reasoning (UKCBR 2014), 9 December 2014, Peterhouse College, Cambridge, UK.

Citizen safety

Sorace, Silvio, Quercia, Elisabeth, La Mattina, Ernesto, Patrikakis, Charalampos Z., Bacon, Liz, Loukas, George and MacKinnon, Lachlan (2017) Serious games: an attractive approach to improve awareness of community policing technologies. In: Next Generation Community Policing Conference, 25 October 2017, Crete, Greece. (In Press)

Cloud computing

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia, Yoon, Yongpil and Gan, Diane (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Sakellari, Georgia and Loukas, George (2013) A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing. Simulation Modelling Practice and Theory, 39. pp. 92-103. ISSN 1569-190X (doi:10.1016/j.simpat.2013.04.002)

cloud storage

Heartfield, Ryan and Loukas, George (2013) On the feasability of automated semantic attacks in the cloud. In: 27th International Symposium on Computer and Information Sciences. Computer and Information Sciences (III). Springer, pp. 343-352. ISBN 9781447145936

cognitive packet network

Lent, Ricardo, Sakellari, Georgia and Loukas, George (2014) Strengthening the security of cognitive packet networks. International Journal of Advanced Intelligence Paradigms, 6 (1). pp. 14-27. ISSN 1755-0386 (Print), 1755-0394 (Online) (doi:10.1504/IJAIP.2014.059584)

collaboration

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

collaborative work

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

Community policing

Sorace, Silvio, Quercia, Elisabeth, La Mattina, Ernesto, Patrikakis, Charalampos Z., Bacon, Liz, Loukas, George and MacKinnon, Lachlan (2017) Serious games: an attractive approach to improve awareness of community policing technologies. In: Next Generation Community Policing Conference, 25 October 2017, Crete, Greece. (In Press)

Patrikakis, Charalampos Z., Kogias, Dimitrios G., Loukas, George, Filippoupolitis, Avgoustinos, Oliff, William, Rahman, Syed Sadiqur, Sorace, Silvio, La Mattina, Ernesto and Quercia, Elisabeth (2017) On the successful deployment of community policing services: the TRILLION project case. In: Proceedings of IEEE International Conference on Consumer Electronics. IEEE, Las Vegas, NV, USA. (In Press)

Computation offloading

Loukas, George, Yoon, Yongpil, Sakellari, Georgia, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)

Computational offloading

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia, Yoon, Yongpil and Gan, Diane (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

computer

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

computer networks

Loukas, George and Patrikakis, Charalampos (2016) Cyber and physical threats to the internet of everything. Cutter IT Journal, 29 (7). pp. 5-11. ISSN 1522-7383

Loukas, George and Öke, Gülay (2010) Protection against denial of service attacks: a survey. The Computer Journal, 53 (7). pp. 1020-1037. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxp078)

computer security

Heartfield, Ryan and Loukas, George (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security. ISSN 0167-4048 (In Press)

confidentiality

Lent, Ricardo, Sakellari, Georgia and Loukas, George (2014) Strengthening the security of cognitive packet networks. International Journal of Advanced Intelligence Paradigms, 6 (1). pp. 14-27. ISSN 1755-0386 (Print), 1755-0394 (Online) (doi:10.1504/IJAIP.2014.059584)

Context analysis

Gresty, David, Gan, Diane, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

control

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

critical

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

cyber

Chadwick, David, Gan, Diane, Loukas, George and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

cyber attack

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Cyber attacks

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)

Cyber crime

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)

Heartfield, Ryan, Loukas, George and Gan, Diane (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)

Cyber security

Heartfield, Ryan and Loukas, George (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security. ISSN 0167-4048 (In Press)

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia, Yoon, Yongpil and Gan, Diane (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Rahman, Syed Sadiqur, Heartfield, Ryan, Oliff, William, Loukas, George and Filippoupolitis, Avgoustinos (2017) Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE, pp. 387-394. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965756)

Heartfield, Ryan, Loukas, George and Gan, Diane (2017) An eye for deception: a case study in utilising the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: Software Engineering Research, Management and Applications, 7-9 June 2017, University of Greenwich. (In Press)

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)

Loukas, George and Patrikakis, Charalampos (2016) Security in the internet of everything era - opening statement. Cutter IT Journal, 29 (7). pp. 3-4. ISSN 1522-7383

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Loukas, George and Patrikakis, Charalampos (2016) Cyber and physical threats to the internet of everything. Cutter IT Journal, 29 (7). pp. 5-11. ISSN 1522-7383

Vuong, Tuan Phan, Loukas, George, Gan, Diane and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

Vuong, Tuan Phan, Loukas, George and Gan, Diane (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

Loukas, George (2015) Cyber-physical attacks: A growing invisible threat. Elsevier Inc., Waltham, MA, USA. ISBN 9780128012901

Loukas, George (2015) Effectively integrating physical and cyber security: WINS International best practice guide 4.11. Technical Report. World Institute for Nuclear Security.

Kapetanakis, Stelios, Filippoupolitis, Avgoustinos, Loukas, George and Al Murayziq, Tariq Saad (2014) Profiling cyber attackers using case-based reasoning. In: 19th UK Workshop on Case-Based Reasoning (UKCBR 2014), 9 December 2014, Peterhouse College, Cambridge, UK.

Filippoupolitis, Avgoustinos, Loukas, George and Kapetanakis, Stelios (2014) Towards real-time profiling of human attackers and bot detection. In: Proceedings of the 7th International Conference on Cybercrime Forensics Education and Training (CFET). Canterbury Christ Church University, UK. ISBN 9781909067158

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George and Gan, Diane (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Loukas, George and Oke, Gulay (2007) A biologically inspired denial of service detector using the random neural network. In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems. IEEE, Piscataway, NJ, US. ISBN 9781424414543 ISSN 2155-6806

Oke, Gulay and Loukas, George (2007) A denial of service detector based on maximum likelihood detection and the random neural network. Computer Journal, 50 (6). pp. 717-727. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxm066)

cyber terrorism

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Cyber trustworthiness

Patrikakis, Charalampos Z., Kogias, Dimitrios G., Loukas, George, Filippoupolitis, Avgoustinos, Oliff, William, Rahman, Syed Sadiqur, Sorace, Silvio, La Mattina, Ernesto and Quercia, Elisabeth (2017) On the successful deployment of community policing services: the TRILLION project case. In: Proceedings of IEEE International Conference on Consumer Electronics. IEEE, Las Vegas, NV, USA. (In Press)

cyber-physical attacks

Loukas, George (2015) Cyber-physical attacks: A growing invisible threat. Elsevier Inc., Waltham, MA, USA. ISBN 9780128012901

Cyber-physical security

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia, Yoon, Yongpil and Gan, Diane (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Bezemskij, Anatolij, Loukas, George, Gan, Diane and Anthony, Richard (2017) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, Exeter, United Kingdom, pp. 1-6. (In Press)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Vuong, Tuan Phan, Loukas, George, Gan, Diane and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

Vuong, Tuan Phan, Loukas, George and Gan, Diane (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

Loukas, George (2015) Effectively integrating physical and cyber security: WINS International best practice guide 4.11. Technical Report. World Institute for Nuclear Security.

cyber-physical system security

Loukas, George (2015) Cyber-physical attacks: A growing invisible threat. Elsevier Inc., Waltham, MA, USA. ISBN 9780128012901

Cyber-physical systems

Loukas, George, Yoon, Yongpil, Sakellari, Georgia, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Vuong, Tuan Phan, Loukas, George, Gan, Diane and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

denial of service

Loukas, George and Öke, Gülay (2010) Protection against denial of service attacks: a survey. The Computer Journal, 53 (7). pp. 1020-1037. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxp078)

Loukas, George, Oke, Gulay and Gelenbe, Erol (2008) Defending against Denial of Service in a self-aware network: a practical approach. In: RTO Information Systems and Technology Panel (IST) Symposium on Information Assurance for Emerging and Future Military Systems, Ljubljana, Slovenia, 13-14 October 2008. North Atlantic Treaty Organization (NATO), Research and Technology Organization (RTO) Science and Technology Organization (STO), Brussels, Belgium.

Oke, Gulay and Loukas, George (2008) Distributed defence against denial of service attacks: a practical view. In: Proceedings of the 2008 BCS International Conference on Visions of Computer Science. Electronic Workshops in Computing (eWiC) . British Computer Society (BCS), London, UK, pp. 153-162. ISBN 9781906124083 ISSN 1477-9358

Oke, Gulay, Loukas, George and Gelenbe, Erol (2007) Detecting denial of service attacks with Bayesian classifiers and the random neural network. In: 2007 IEEE International Conference on Fuzzy Systems. IEEE, London, UK. ISBN 9781424412099 ISSN 1098-7584 (doi:10.1109/FUZZY.2007.4295666)

Loukas, George and Oke, Gulay (2007) A biologically inspired denial of service detector using the random neural network. In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems. IEEE, Piscataway, NJ, US. ISBN 9781424414543 ISSN 2155-6806

Oke, Gulay and Loukas, George (2007) A denial of service detector based on maximum likelihood detection and the random neural network. Computer Journal, 50 (6). pp. 717-727. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxm066)

Gelenbe, Erol and Loukas, George (2007) A self-aware approach to denial of service defence. Computer Networks, 51 (5). pp. 1299-1314. ISSN 1389-1286 (doi:10.1016/j.comnet.2006.09.009)

Loukas, George and Oke, Gulay (2007) Likelihood ratios and recurrent random neural networks in detection of denial of service attacks. In: 2007 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 16-18 July 2007, San Diego, CA, USA.

Gelenbe, Erol, Gellman, Michael and Loukas, George (2004) Defending networks against denial of service attacks. In: Unmanned/Unattended Sensors and Sensor Networks. The International Society for Optical Engineering, pp. 233-243. (doi:10.1117/12.578502)

Detection latency

Loukas, George, Yoon, Yongpil, Sakellari, Georgia, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)

Digital forensics

Gresty, David, Gan, Diane, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

Gresty, David W., Gan, Diane and Loukas, George (2014) Digital forensic analysis of internet history using principal component analysis. In: PGNET Proceedings of the 15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2014). Liverpool John Moores University, Liverpool, UK. ISBN 9781902560281

disaster management

Filippoupolitis, Avgoustinos, Loukas, George, Timotheou, Stelios, Dimakis, Nikolaos and Gelenbe, Erol (2009) Emergency response systems for disaster management in buildings. In: C3I for Crisis, Emergency and Consequence Management: Papers presented at the Information Systems and Technology Panel (IST) Symposium held in Bucharest, Romania, 11 May to 12 May 2009. North Atlantic Treaty Organization (NATO), Research and Technology Organization (RTO), Brussels, Belgium, pp. 15-1. ISBN 9789283700852

Timotheou, Stelios and Loukas, George (2009) Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios. In: Proceedings of the 2009 ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), New York, NY, USA, pp. 1171-1175. ISBN 9781605581668 (doi:10.1145/1529282.1529542)

distributed

Filippoupolitis, Avgoustinos, Gelenbe, Erol, Gianni, Daniele, Hey, Laurence, Loukas, George and Timotheou, Stelios (2012) Distributed agent-based building evacuation simulator. In: Summer Computer Simulation Conference 2008 (SCSC'08): Part of the 2008 Summer Simulation Multiconference. Curran Associates, Inc., Red Hook, NY, USA, pp. 46-53. ISBN 9781622763597

distributed response

Oke, Gulay and Loukas, George (2008) Distributed defence against denial of service attacks: a practical view. In: Proceedings of the 2008 BCS International Conference on Visions of Computer Science. Electronic Workshops in Computing (eWiC) . British Computer Society (BCS), London, UK, pp. 153-162. ISBN 9781906124083 ISSN 1477-9358

DoS

Loukas, George, Oke, Gulay and Gelenbe, Erol (2008) Defending against Denial of Service in a self-aware network: a practical approach. In: RTO Information Systems and Technology Panel (IST) Symposium on Information Assurance for Emerging and Future Military Systems, Ljubljana, Slovenia, 13-14 October 2008. North Atlantic Treaty Organization (NATO), Research and Technology Organization (RTO) Science and Technology Organization (STO), Brussels, Belgium.

Oke, Gulay and Loukas, George (2008) Distributed defence against denial of service attacks: a practical view. In: Proceedings of the 2008 BCS International Conference on Visions of Computer Science. Electronic Workshops in Computing (eWiC) . British Computer Society (BCS), London, UK, pp. 153-162. ISBN 9781906124083 ISSN 1477-9358

educational institutions

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

Emergency management

Filippoupolitis, Avgoustinos, Oliff, William and Loukas, George (2017) Bluetooth low energy based occupancy detection for emergency management. In: 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 31-38. ISBN 978-1-5090-5567-8 ISSN 978-1-5090-5566-1 (Online) (doi:10.1109/IUCC-CSS.2016.013)

Loukas, George, Gan, Diane and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

Filippoupolitis, Avgoustinos, Gelenbe, Erol, Gianni, Daniele, Hey, Laurence, Loukas, George and Timotheou, Stelios (2012) Distributed agent-based building evacuation simulator. In: Summer Computer Simulation Conference 2008 (SCSC'08): Part of the 2008 Summer Simulation Multiconference. Curran Associates, Inc., Red Hook, NY, USA, pp. 46-53. ISBN 9781622763597

emergency response

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George and Gan, Diane (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)

Filippoupolitis, Avgoustinos, Loukas, George, Timotheou, Stelios, Dimakis, Nikolaos and Gelenbe, Erol (2009) Emergency response systems for disaster management in buildings. In: C3I for Crisis, Emergency and Consequence Management: Papers presented at the Information Systems and Technology Panel (IST) Symposium held in Bucharest, Romania, 11 May to 12 May 2009. North Atlantic Treaty Organization (NATO), Research and Technology Organization (RTO), Brussels, Belgium, pp. 15-1. ISBN 9789283700852

Timotheou, Stelios and Loukas, George (2009) Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios. In: Proceedings of the 2009 ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), New York, NY, USA, pp. 1171-1175. ISBN 9781605581668 (doi:10.1145/1529282.1529542)

Filippoupolitis, Avgoustinos, Hey, Laurence, Loukas, George, Gelenbe, Erol and Timotheou, Stelios (2008) Emergency response simulation using wireless sensor networks. In: Proceedings of the 1st International Conference on Ambient Media and Systems (ICST Ambi-Sys '08). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels, Belgium. ISBN 9789639799165

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

emergency response operations

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

emergency response robots

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

emergency services

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

Energy efficiency

Loukas, George, Yoon, Yongpil, Sakellari, Georgia, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)

Sakellari, Georgia and Loukas, George (2013) A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing. Simulation Modelling Practice and Theory, 39. pp. 92-103. ISSN 1569-190X (doi:10.1016/j.simpat.2013.04.002)

financial

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

government

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

hacker profiling

Kapetanakis, Stelios, Filippoupolitis, Avgoustinos, Loukas, George and Al Murayziq, Tariq Saad (2014) Profiling cyber attackers using case-based reasoning. In: 19th UK Workshop on Case-Based Reasoning (UKCBR 2014), 9 December 2014, Peterhouse College, Cambridge, UK.

Filippoupolitis, Avgoustinos, Loukas, George and Kapetanakis, Stelios (2014) Towards real-time profiling of human attackers and bot detection. In: Proceedings of the 7th International Conference on Cybercrime Forensics Education and Training (CFET). Canterbury Christ Church University, UK. ISBN 9781909067158

hazardous materials

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

human-as-a-security-sensor

Heartfield, Ryan and Loukas, George (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security. ISSN 0167-4048 (In Press)

Human-as-a-Sensor

Rahman, Syed Sadiqur, Heartfield, Ryan, Oliff, William, Loukas, George and Filippoupolitis, Avgoustinos (2017) Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE, pp. 387-394. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965756)

Heartfield, Ryan, Loukas, George and Gan, Diane (2017) An eye for deception: a case study in utilising the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: Software Engineering Research, Management and Applications, 7-9 June 2017, University of Greenwich. (In Press)

humans

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

iBeacon

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems. In: 2017 IEEE 15th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965755)

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (In Press)

industrial

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Inertial sensors

Filippoupolitis, Avgoustinos, Oliff, William, Takand, Babak and Loukas, George (2017) Location-enhanced activity recognition in indoor environments using off the shelf smart watch technology and BLE beacons. Sensors, 17 (6):1230. pp. 1-25. ISSN 1424-8220 (Print), 1424-8220 (Online) (doi:10.3390/s17061230)

information

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

information security

Heartfield, Ryan and Loukas, George (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security. ISSN 0167-4048 (In Press)

Information trustworthiness

Rahman, Syed Sadiqur, Heartfield, Ryan, Oliff, William, Loukas, George and Filippoupolitis, Avgoustinos (2017) Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE, pp. 387-394. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965756)

insider

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

integrity

Lent, Ricardo, Sakellari, Georgia and Loukas, George (2014) Strengthening the security of cognitive packet networks. International Journal of Advanced Intelligence Paradigms, 6 (1). pp. 14-27. ISSN 1755-0386 (Print), 1755-0394 (Online) (doi:10.1504/IJAIP.2014.059584)

intelligent networks

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

intelligent robots

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

intelligent systems

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

international

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Internet

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Internet history analysis

Gresty, David, Gan, Diane, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

internet of things

Loukas, George (2015) Cyber-physical attacks: A growing invisible threat. Elsevier Inc., Waltham, MA, USA. ISBN 9780128012901

Intrusion detection

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia, Yoon, Yongpil and Gan, Diane (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Loukas, George, Yoon, Yongpil, Sakellari, Georgia, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Vuong, Tuan Phan, Loukas, George, Gan, Diane and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

Vuong, Tuan Phan, Loukas, George and Gan, Diane (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

Oke, Gulay, Loukas, George and Gelenbe, Erol (2007) Detecting denial of service attacks with Bayesian classifiers and the random neural network. In: 2007 IEEE International Conference on Fuzzy Systems. IEEE, London, UK. ISBN 9781424412099 ISSN 1098-7584 (doi:10.1109/FUZZY.2007.4295666)

Loukas, George and Oke, Gulay (2007) A biologically inspired denial of service detector using the random neural network. In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems. IEEE, Piscataway, NJ, US. ISBN 9781424414543 ISSN 2155-6806

Oke, Gulay and Loukas, George (2007) A denial of service detector based on maximum likelihood detection and the random neural network. Computer Journal, 50 (6). pp. 717-727. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxm066)

Gelenbe, Erol and Loukas, George (2007) A self-aware approach to denial of service defence. Computer Networks, 51 (5). pp. 1299-1314. ISSN 1389-1286 (doi:10.1016/j.comnet.2006.09.009)

Loukas, George and Oke, Gulay (2007) Likelihood ratios and recurrent random neural networks in detection of denial of service attacks. In: 2007 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 16-18 July 2007, San Diego, CA, USA.

Intrusion detection system

Bezemskij, Anatolij, Loukas, George, Gan, Diane and Anthony, Richard (2017) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, Exeter, United Kingdom, pp. 1-6. (In Press)

IoT

Loukas, George and Patrikakis, Charalampos (2016) Security in the internet of everything era - opening statement. Cutter IT Journal, 29 (7). pp. 3-4. ISSN 1522-7383

Loukas, George and Patrikakis, Charalampos (2016) Cyber and physical threats to the internet of everything. Cutter IT Journal, 29 (7). pp. 5-11. ISSN 1522-7383

JADE

Filippoupolitis, Avgoustinos, Gelenbe, Erol, Gianni, Daniele, Hey, Laurence, Loukas, George and Timotheou, Stelios (2012) Distributed agent-based building evacuation simulator. In: Summer Computer Simulation Conference 2008 (SCSC'08): Part of the 2008 Summer Simulation Multiconference. Curran Associates, Inc., Red Hook, NY, USA, pp. 46-53. ISBN 9781622763597

joining processes

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

Lifelong learning

Chadwick, David, Gan, Diane, Loukas, George and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

Location spoofing

Rahman, Syed Sadiqur, Heartfield, Ryan, Oliff, William, Loukas, George and Filippoupolitis, Avgoustinos (2017) Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE, pp. 387-394. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965756)

Machine Learning

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems. In: 2017 IEEE 15th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965755)

Filippoupolitis, Avgoustinos, Oliff, William, Takand, Babak and Loukas, George (2017) Location-enhanced activity recognition in indoor environments using off the shelf smart watch technology and BLE beacons. Sensors, 17 (6):1230. pp. 1-25. ISSN 1424-8220 (Print), 1424-8220 (Online) (doi:10.3390/s17061230)

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (In Press)

Filippoupolitis, Avgoustinos, Oliff, William and Loukas, George (2016) Occupancy detection for building emergency management using BLE beacons. In: Computer and Information Sciences: 31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings. Communications in Computer and Information Science, 659 . Springer International Publishing, Cham, Switzerland, pp. 233-240. ISBN 978-3-319-47216-4 ISSN 1865-0929 (Print), 1865-0937 (Online) (doi:10.1007/978-3-319-47217-1_25)

Malicious Spoofing Attacks

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems. In: 2017 IEEE 15th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965755)

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (In Press)

management

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

mechanisms

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

military

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

minimum spanning tree

Timotheou, Stelios and Loukas, George (2009) Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios. In: Proceedings of the 2009 ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), New York, NY, USA, pp. 1171-1175. ISBN 9781605581668 (doi:10.1145/1529282.1529542)

mobile ad hoc networks

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

mobile communication

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

mobile radio

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

mobile robots

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

Mobile security

Rahman, Syed Sadiqur, Heartfield, Ryan, Oliff, William, Loukas, George and Filippoupolitis, Avgoustinos (2017) Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE, pp. 387-394. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965756)

multi-agent system

Gianni, Daniele, Loukas, George and Gelenbe, Erol (2008) A simulation framework for the investigation of adaptive behaviours in largely populated building evacuation scenarios. In: Seventh International Joint Conference on Autonomous Agents & Multi-Agent Systems (AAMAS 08). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, USA.

multi-hop connection

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

multi-robot systems

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

network

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

network performance

Lent, Ricardo, Sakellari, Georgia and Loukas, George (2014) Strengthening the security of cognitive packet networks. International Journal of Advanced Intelligence Paradigms, 6 (1). pp. 14-27. ISSN 1755-0386 (Print), 1755-0394 (Online) (doi:10.1504/IJAIP.2014.059584)

network flow optimisation problems

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

network modelling

Gelenbe, Erol, Gellman, Michael and Loukas, George (2004) Defending networks against denial of service attacks. In: Unmanned/Unattended Sensors and Sensor Networks. The International Society for Optical Engineering, pp. 233-243. (doi:10.1117/12.578502)

network security

Lent, Ricardo, Sakellari, Georgia and Loukas, George (2014) Strengthening the security of cognitive packet networks. International Journal of Advanced Intelligence Paradigms, 6 (1). pp. 14-27. ISSN 1755-0386 (Print), 1755-0394 (Online) (doi:10.1504/IJAIP.2014.059584)

Loukas, George and Öke, Gülay (2010) Protection against denial of service attacks: a survey. The Computer Journal, 53 (7). pp. 1020-1037. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxp078)

Oke, Gulay, Loukas, George and Gelenbe, Erol (2007) Detecting denial of service attacks with Bayesian classifiers and the random neural network. In: 2007 IEEE International Conference on Fuzzy Systems. IEEE, London, UK. ISBN 9781424412099 ISSN 1098-7584 (doi:10.1109/FUZZY.2007.4295666)

Loukas, George and Oke, Gulay (2007) A biologically inspired denial of service detector using the random neural network. In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems. IEEE, Piscataway, NJ, US. ISBN 9781424414543 ISSN 2155-6806

Oke, Gulay and Loukas, George (2007) A denial of service detector based on maximum likelihood detection and the random neural network. Computer Journal, 50 (6). pp. 717-727. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxm066)

Gelenbe, Erol and Loukas, George (2007) A self-aware approach to denial of service defence. Computer Networks, 51 (5). pp. 1299-1314. ISSN 1389-1286 (doi:10.1016/j.comnet.2006.09.009)

Loukas, George and Oke, Gulay (2007) Likelihood ratios and recurrent random neural networks in detection of denial of service attacks. In: 2007 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 16-18 July 2007, San Diego, CA, USA.

Gelenbe, Erol, Gellman, Michael and Loukas, George (2004) Defending networks against denial of service attacks. In: Unmanned/Unattended Sensors and Sensor Networks. The International Society for Optical Engineering, pp. 233-243. (doi:10.1117/12.578502)

network topology

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

network-level security and protection

Loukas, George, Gan, Diane and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

nuclear

Loukas, George (2015) Effectively integrating physical and cyber security: WINS International best practice guide 4.11. Technical Report. World Institute for Nuclear Security.

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Occupancy Detection

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems. In: 2017 IEEE 15th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965755)

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (In Press)

Filippoupolitis, Avgoustinos, Oliff, William and Loukas, George (2017) Bluetooth low energy based occupancy detection for emergency management. In: 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 31-38. ISBN 978-1-5090-5567-8 ISSN 978-1-5090-5566-1 (Online) (doi:10.1109/IUCC-CSS.2016.013)

Filippoupolitis, Avgoustinos, Oliff, William and Loukas, George (2016) Occupancy detection for building emergency management using BLE beacons. In: Computer and Information Sciences: 31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings. Communications in Computer and Information Science, 659 . Springer International Publishing, Cham, Switzerland, pp. 233-240. ISBN 978-3-319-47216-4 ISSN 1865-0929 (Print), 1865-0937 (Online) (doi:10.1007/978-3-319-47217-1_25)

Pattern of life

Gresty, David, Gan, Diane, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

pervasive computing

Loukas, George, Gan, Diane and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

phishing

Heartfield, Ryan and Loukas, George (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:10.1145/2835375)

Heartfield, Ryan and Loukas, George (2016) Evaluating the reliability of users as human sensors of social media security threats. In: International Conference on Social Media, Wearable and Web Analytics (Social Media 2016) (Book of abstracts). The Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC.ORG).

physical security

Loukas, George (2015) Effectively integrating physical and cyber security: WINS International best practice guide 4.11. Technical Report. World Institute for Nuclear Security.

Loukas, George, Gan, Diane and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

physical-cyber attacks

Loukas, George (2015) Cyber-physical attacks: A growing invisible threat. Elsevier Inc., Waltham, MA, USA. ISBN 9780128012901

Predicting attack susceptibility

Heartfield, Ryan and Loukas, George (2016) Evaluating the reliability of users as human sensors of social media security threats. In: International Conference on Social Media, Wearable and Web Analytics (Social Media 2016) (Book of abstracts). The Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC.ORG).

Privacy

Patrikakis, Charalampos Z. and Loukas, George (2017) Wear it and share it: Wearables and security. Cutter Executive Update. ISSN 2381-8816

Provenance of information

Rahman, Syed Sadiqur, Heartfield, Ryan, Oliff, William, Loukas, George and Filippoupolitis, Avgoustinos (2017) Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE, pp. 387-394. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965756)

Quality of information

Rahman, Syed Sadiqur, Heartfield, Ryan, Oliff, William, Loukas, George and Filippoupolitis, Avgoustinos (2017) Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE, pp. 387-394. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965756)

radio networks

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

rate-limiting

Oke, Gulay and Loukas, George (2008) Distributed defence against denial of service attacks: a practical view. In: Proceedings of the 2008 BCS International Conference on Visions of Computer Science. Electronic Workshops in Computing (eWiC) . British Computer Society (BCS), London, UK, pp. 153-162. ISBN 9781906124083 ISSN 1477-9358

rescue robots

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George and Gan, Diane (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)

robot sensing systems

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

Robotic vehicles

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

robotic wireless connection

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

robotic wireless network connection

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

Robotics

Vuong, Tuan Phan, Loukas, George and Gan, Diane (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

SAN

Loukas, George, Oke, Gulay and Gelenbe, Erol (2008) Defending against Denial of Service in a self-aware network: a practical approach. In: RTO Information Systems and Technology Panel (IST) Symposium on Information Assurance for Emerging and Future Military Systems, Ljubljana, Slovenia, 13-14 October 2008. North Atlantic Treaty Organization (NATO), Research and Technology Organization (RTO) Science and Technology Organization (STO), Brussels, Belgium.

Security

Patrikakis, Charalampos Z. and Loukas, George (2017) Wear it and share it: Wearables and security. Cutter Executive Update. ISSN 2381-8816

Heartfield, Ryan, Loukas, George and Gan, Diane (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)

Heartfield, Ryan and Loukas, George (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:10.1145/2835375)

Filippoupolitis, Avgoustinos, Loukas, George and Kapetanakis, Stelios (2014) Towards real-time profiling of human attackers and bot detection. In: Proceedings of the 7th International Conference on Cybercrime Forensics Education and Training (CFET). Canterbury Christ Church University, UK. ISBN 9781909067158

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Chadwick, David, Gan, Diane, Loukas, George and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

self-aware network

Loukas, George, Oke, Gulay and Gelenbe, Erol (2008) Defending against Denial of Service in a self-aware network: a practical approach. In: RTO Information Systems and Technology Panel (IST) Symposium on Information Assurance for Emerging and Future Military Systems, Ljubljana, Slovenia, 13-14 October 2008. North Atlantic Treaty Organization (NATO), Research and Technology Organization (RTO) Science and Technology Organization (STO), Brussels, Belgium.

Semantic attacks

Heartfield, Ryan, Loukas, George and Gan, Diane (2017) An eye for deception: a case study in utilising the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: Software Engineering Research, Management and Applications, 7-9 June 2017, University of Greenwich. (In Press)

Semantic attacks

Heartfield, Ryan, Loukas, George and Gan, Diane (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)

Heartfield, Ryan and Loukas, George (2013) On the feasability of automated semantic attacks in the cloud. In: 27th International Symposium on Computer and Information Sciences. Computer and Information Sciences (III). Springer, pp. 343-352. ISBN 9781447145936

Semantic social engineering

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)

Heartfield, Ryan and Loukas, George (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:10.1145/2835375)

Heartfield, Ryan and Loukas, George (2016) Evaluating the reliability of users as human sensors of social media security threats. In: International Conference on Social Media, Wearable and Web Analytics (Social Media 2016) (Book of abstracts). The Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC.ORG).

Serious games

Sorace, Silvio, Quercia, Elisabeth, La Mattina, Ernesto, Patrikakis, Charalampos Z., Bacon, Liz, Loukas, George and MacKinnon, Lachlan (2017) Serious games: an attractive approach to improve awareness of community policing technologies. In: Next Generation Community Policing Conference, 25 October 2017, Crete, Greece. (In Press)

Session-to-session analysis

Gresty, David, Gan, Diane, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

short course

Chadwick, David, Gan, Diane, Loukas, George and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

side-channel attacks

Loukas, George (2015) Cyber-physical attacks: A growing invisible threat. Elsevier Inc., Waltham, MA, USA. ISBN 9780128012901

SimJADE

Filippoupolitis, Avgoustinos, Gelenbe, Erol, Gianni, Daniele, Hey, Laurence, Loukas, George and Timotheou, Stelios (2012) Distributed agent-based building evacuation simulator. In: Summer Computer Simulation Conference 2008 (SCSC'08): Part of the 2008 Summer Simulation Multiconference. Curran Associates, Inc., Red Hook, NY, USA, pp. 46-53. ISBN 9781622763597

simulation

Gianni, Daniele, Loukas, George and Gelenbe, Erol (2008) A simulation framework for the investigation of adaptive behaviours in largely populated building evacuation scenarios. In: Seventh International Joint Conference on Autonomous Agents & Multi-Agent Systems (AAMAS 08). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, USA.

Smartphone security

Rahman, Syed Sadiqur, Heartfield, Ryan, Oliff, William, Loukas, George and Filippoupolitis, Avgoustinos (2017) Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE, pp. 387-394. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965756)

Social engineering

Heartfield, Ryan, Loukas, George and Gan, Diane (2017) An eye for deception: a case study in utilising the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: Software Engineering Research, Management and Applications, 7-9 June 2017, University of Greenwich. (In Press)

Heartfield, Ryan, Loukas, George and Gan, Diane (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)

Social media

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)

Social networks

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)

software

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

software framework

Gianni, Daniele, Loukas, George and Gelenbe, Erol (2008) A simulation framework for the investigation of adaptive behaviours in largely populated building evacuation scenarios. In: Seventh International Joint Conference on Autonomous Agents & Multi-Agent Systems (AAMAS 08). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, USA.

static wireless sink

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

statistical learning

Gresty, David W., Gan, Diane and Loukas, George (2014) Digital forensic analysis of internet history using principal component analysis. In: PGNET Proceedings of the 15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2014). Liverpool John Moores University, Liverpool, UK. ISBN 9781902560281

Stuxnet

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

survey

Sakellari, Georgia and Loukas, George (2013) A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing. Simulation Modelling Practice and Theory, 39. pp. 92-103. ISSN 1569-190X (doi:10.1016/j.simpat.2013.04.002)

Loukas, George, Gan, Diane and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

system

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

teaching

Chadwick, David, Gan, Diane, Loukas, George and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

telerobotics

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

terrorist

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

threats

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane, Loukas, George, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

trapped civilians

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

uncertainty

Timotheou, Stelios and Loukas, George (2009) Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios. In: Proceedings of the 2009 ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), New York, NY, USA, pp. 1171-1175. ISBN 9781605581668 (doi:10.1145/1529282.1529542)

user profiling

Filippoupolitis, Avgoustinos, Loukas, George and Kapetanakis, Stelios (2014) Towards real-time profiling of human attackers and bot detection. In: Proceedings of the 7th International Conference on Cybercrime Forensics Education and Training (CFET). Canterbury Christ Church University, UK. ISBN 9781909067158

Vehicle security

Vuong, Tuan Phan, Loukas, George and Gan, Diane (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

Loukas, George (2015) Cyber-physical attacks: A growing invisible threat. Elsevier Inc., Waltham, MA, USA. ISBN 9780128012901

Vehicles

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia, Yoon, Yongpil and Gan, Diane (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Vuong, Tuan Phan, Loukas, George, Gan, Diane and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

Vehicular security

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Loukas, George, Yoon, Yongpil, Sakellari, Georgia, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Wearable devices

Filippoupolitis, Avgoustinos, Oliff, William, Takand, Babak and Loukas, George (2017) Location-enhanced activity recognition in indoor environments using off the shelf smart watch technology and BLE beacons. Sensors, 17 (6):1230. pp. 1-25. ISSN 1424-8220 (Print), 1424-8220 (Online) (doi:10.3390/s17061230)

Wearables

Patrikakis, Charalampos Z. and Loukas, George (2017) Wear it and share it: Wearables and security. Cutter Executive Update. ISSN 2381-8816

Filippoupolitis, Avgoustinos, Takand, Babak and Loukas, George (2017) Activity recognition in a home setting using off the shelf smart watch technology. In: 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 39-44. ISBN 978-1-5090-5567-8 ISSN 978-1-5090-5566-1 (Online) (doi:10.1109/IUCC-CSS.2016.014)

wireless ad hoc network

Loukas, George and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

wireless networks

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

wireless sensor networks

Filippoupolitis, Avgoustinos, Hey, Laurence, Loukas, George, Gelenbe, Erol and Timotheou, Stelios (2008) Emergency response simulation using wireless sensor networks. In: Proceedings of the 1st International Conference on Ambient Media and Systems (ICST Ambi-Sys '08). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels, Belgium. ISBN 9789639799165

Loukas, George, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

World wide web

Gresty, David, Gan, Diane, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

This list was generated on Wed May 23 23:33:33 2018 BST.