Skip navigation

Items where Greenwich Author is "Loukas, Professor George"

Items where Greenwich Author is "Loukas, Professor George"

Group by: Item Type | Date | Funders | Uncontrolled Keywords | No Grouping
Jump to: Activity recognition; Wearable devices; Inertial sensors; Bluetooth beacons; Machine learning | Blockchain, Internet of Things, Shared economy | Blockchain, Mobile Edge Computing, Secure therapy, Internet of Things, Cyber Security | Citizen safety, Serious games, Community policing, Awareness | Community policing, Cyber trustworthiness | Computation offloading; Intrusion detection; Energy efficiency; Detection latency; Cyber-physical systems; Vehicular security | Cyber security, Cyber-physical security, Robotics, Vehicle security, Intrusion detection | Cyber security, Robotic vehicles, Vehicular security, Intrusion detection, Behaviour-based, Anomaly detection | Cyber security, cyber-physical security, cyber-physical systems, autonomous systems, robotic vehicles, vehicular security, intrusion detection | Cyber security, hacker profiling, case based reasoning | Cyber security, human-as-a-security-sensor, information security, computer security | Cyber security, smart home security, cyber-physical security, cyber-physical attacks, cyber psychology | Cyber security, vehicles, Internet of Things, cyber-physical attacks, cyber-physical security | Cyber security; IoT | Cyber security; IoT; computer networks | Cyber security; Semantic social engineering; Cyber attacks; Cyber crime; Social media; Social networks | Cyber-physical security, Intrusion detection system, Bayesian network | Cyber-physical security, Vehicles, Intrusion detection, Cyber security, Cloud computing, Computational offloading | Cybersecurity breach victims, Emotions, Personality, Mental health, Internet of Things (IoT) | Data Security, Encryption Switching, Identity-Based Encryption, Attribute-Based Encryption, CPA Security, Standard Model | Denial of Service, DoS, attack detection, rate-limiting, distributed response | Denial of service, Cyber security, Network security, Intrusion detection | Digital deception, misinformation, phishing | Digital forensics, statistical learning | Digital forensics; World wide web; Session-to-session analysis; Context analysis; Pattern of life; Internet history analysis | Honeypots; cyber deception; internet of vehicles; cybersecurity investment; game theory; optimisation; computer security; optimization; Internet of vehicles; investment; connected vehicles; privacy | Human-as-a-Sensor, Information trustworthiness, Cyber security, Provenance of information, Quality of information, Mobile security, Location spoofing, Smartphone security | Human-as-a-Sensor; Social engineering; Semantic attacks; Cyber security | Indoor Localisation, Location Fingerprinting, Crowdsourcing, Entropy, Wi-Fi, Participatory Sensing. | Information cascade; Semantic textual similarity; Image similarity; Deep learning | Information trustworthiness, information cascade | Internet of Things, IoT Security, HaaSS, intrusion detection | Internet of Things, Security, Psychology | IoT cyber risk management; cyber risk assessment; cyber risk control; security controls; Internet of Things; survey; IoT | Lifelong learning, cyber, security, short course, teaching | Occupancy Detection, Bluetooth low energy, Emergency management | Occupancy detection; BLE; Machine learning | Predicting attack susceptibility, phishing, semantic social engineering | Security, hacker profiling, user profiling, cyber security | Security; Cyber crime; Social Engineering; Semantic attacks | Semantic social engineering, phishing, security | Smart Grids, sustainability, dispositional and situational security awareness, fuzzy cognitive map, security | Smart energy; heating; home; households; AI; everyday; embodied competencies | Smart homes, cyber security, psychology | Time-varying networks, cyber threats spreading, nonlinear dynamics, interdisciplinary physics, networks | Virtual Reality; cyber-physical attacks; cyber security; privacy taxonomy | Virtual reality, cyber security, intrusion detection | Wearables; Activity recognition | Wearables; Security; Privacy | access, attacks, computer, control, critical, cyber attack, cyber security, cyber terrorism, financial, government, industrial, information, insider, international, Internet, management, mechanisms, military, network, nuclear, security, software, Stuxnet, system, terrorist, threats | adversarial machine learning, cyber security, artificial intelligence | artificial intelligence, cyber security, AI safety, Internet of Things, smart homes, cyber hygiene | autonomous robots, emergency response, minimum spanning tree, uncertainty, disaster management | blockchain, crowdsourcing, cyber security | building evacuation, emergency management, distributed, JADE, SimJADE | building evacuation, simulation, software framework, adaptation, multi-agent system | cloud computing, energy efficiency, survey | cyber forensics, digital forensics, multi-stage attacks, decision support, optimization | cyber forensics; digital forensics; game theory; bayesian game; multi-stage attacks; decision support; optimisation | cyber forensics; digital forensics; multi-stage attacks; anti-forensics; advanced persistent threats; survey; review | cyber security, Internet of Things, smart homes, reinforcement learning | cyber security, smart homes, applied psychology | cyber-physical attacks, cyber security, physical-cyber attacks, cyber-physical system security, side-channel attacks, vehicle security, internet of things, | cyber-physical security, cyber security, cyber-physical systems, vehicles, intrusion detection | cybersecurity, cyber hygiene healthcare, optimization, training and awareness, CIS control, game theory | cybersecurity, smart-home, threats, control optimisation, risk assessment | data awareness, energy internet, privacy, security, universal composability, data privacy, data models, smart grids, Internet, elliptic curve cryptography, computational modeling, solid modeling, smart contracts, data awareness, privacy, security, universal composability | denial of service, DoS, self-aware network, SAN | denial of service, computer networks, network security | denial of service, network security | denial of service, network security, intrusion detection | denial of service, network security, intrusion detection, cyber security | digital forensics, internet history, session-to-session analysis, internet connection records, community detection | disaster management, emergency response | emergency response robots, trapped civilians, ad hoc networks, educational institutions, humans, intelligent networks, intelligent robots, intelligent systems, joining processes, mobile ad hoc networks, mobile communication, mobile robots, emergency services, multi-robot systems, radio networks, , wireless ad hoc network | emergency response, cyber security, rescue robots | emergency response, robotic wireless connection, ad hoc networks, collaboration, collaborative work, hazardous materials, humans, mobile robots, network topology, robot sensing systems, wireless networks, wireless sensor networks, ad hoc networks, mobile radio, telerobotics, ad hoc network connection, emergency response operations, multi-hop connection, network flow optimisation problems, robotic wireless network connection, static wireless sink | emergency response, wireless sensor networks | iBeacon, Bluetooth Low Energy, Occupancy Detection, Machine Learning, Malicious Spoofing Attacks | industrial control system, SCADA, honeypots, GAN network, autoencoder network, data generation | internet of things, IoT offloading, computation offloading, edge computing, cloud computing, decision support, EdgeCloudSim Simulator | intrusion detection, denial of service, network security | location privacy, optimization, histograms | malware; Android; cyber attacks | network security, cognitive packet network, network performance, integrity, confidentiality | network security, denial of service, network modelling | network security, intrusion detection, denial of service | nuclear, cyber security, cyber-physical security, physical security | post-quantum cryptography, multivariate public key cryptography, general construction, proxy signature, provable security | security and privacy, human and societal aspects of security and privacy | security and privacy; human and societal aspects of security and privacy; applied computing; enterprise computing; general and reference; evaluation | security, internet of things, medical technologies | semantic attacks, cloud storage | smart home security; mathematical optimisation; security controls; IoT; artificial intelligence | survey, pervasive computing, network-level security and protection, physical security, emergency management
Number of items: 96.

Activity recognition; Wearable devices; Inertial sensors; Bluetooth beacons; Machine learning

Filippoupolitis, Avgoustinos, Oliff, William, Takand, Babak and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2017) Location-enhanced activity recognition in indoor environments using off the shelf smart watch technology and BLE beacons. Sensors, 17 (6):1230. pp. 1-25. ISSN 1424-8220 (Print), 1424-8220 (Online) (doi:10.3390/s17061230)

Blockchain, Internet of Things, Shared economy

Rahman, Md. Abdur, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:10.1145/3323873.3326924)

Blockchain, Mobile Edge Computing, Secure therapy, Internet of Things, Cyber Security

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2018.2881246)

Citizen safety, Serious games, Community policing, Awareness

Sorace, Silvio, Quercia, Elisabeth, La Mattina, Ernesto, Patrikakis, Charalampos Z., Bacon, Liz, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and MacKinnon, Lachlan (2018) Serious games: an attractive approach to improve awareness of community policing technologies. In: Leventakis, Georgios and Haberfeld, M. R., (eds.) Community-Oriented Policing and Technological Innovations. SpringerBriefs in Criminology book series (BRIEFSCRIMINOL) . Springer, Cham, pp. 1-9. ISBN 978-3319892931 (doi:10.1007/978-3-319-89294-8_1)

Community policing, Cyber trustworthiness

Patrikakis, Charalampos Z., Kogias, Dimitrios G., Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Filippoupolitis, Avgoustinos, Oliff, William, Rahman, Syed Sadiqur, Sorace, Silvio, La Mattina, Ernesto and Quercia, Elisabeth (2018) On the successful deployment of community policing services: the TRILLION project case. In: Proceedings of 2018 IEEE International Conference on Consumer Electronics (ICCE). IEEE. ISBN 978-1538630266 ISSN 2158-4001 (Online) (doi:10.1109/ICCE.2018.8326149)

Computation offloading; Intrusion detection; Energy efficiency; Detection latency; Cyber-physical systems; Vehicular security

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)

Cyber security, Cyber-physical security, Robotics, Vehicle security, Intrusion detection

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

Cyber security, Robotic vehicles, Vehicular security, Intrusion detection, Behaviour-based, Anomaly detection

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Cyber security, cyber-physical security, cyber-physical systems, autonomous systems, robotic vehicles, vehicular security, intrusion detection

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Cyber security, hacker profiling, case based reasoning

Kapetanakis, Stelios, Filippoupolitis, Avgoustinos, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Al Murayziq, Tariq Saad (2014) Profiling cyber attackers using case-based reasoning. In: 19th UK Workshop on Case-Based Reasoning (UKCBR 2014), 9 December 2014, Peterhouse College, Cambridge, UK.

Cyber security, human-as-a-security-sensor, information security, computer security

Heartfield, Ryan and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:10.1016/j.cose.2018.02.020)

Cyber security, smart home security, cyber-physical security, cyber-physical attacks, cyber psychology

Huijts, N. M. A. ORCID logoORCID: https://orcid.org/0000-0003-3729-8392, Haans, A., Budimir, S., Fontaine, J. R. J., Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Bezemskij, Anatolij ORCID logoORCID: https://orcid.org/0000-0002-6211-1609, Oostveen, A., Filippoupolitis, Avgoustinos, Ras, I., IJsselsteijn, W. A. and Roesch, E. B. (2023) User experiences with simulated cyber-physical attacks on smart home IoT. Personal and Ubiquitous Computing. ISSN 1617-4909 (Print), 1617-4917 (Online) (doi:10.1007/s00779-023-01774-5)

Cyber security, vehicles, Internet of Things, cyber-physical attacks, cyber-physical security

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:10.1016/j.adhoc.2018.10.002)

Cyber security; IoT

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Patrikakis, Charalampos (2016) Security in the internet of everything era - opening statement. Cutter IT Journal, 29 (7). pp. 3-4. ISSN 1522-7383

Cyber security; IoT; computer networks

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Patrikakis, Charalampos (2016) Cyber and physical threats to the internet of everything. Cutter IT Journal, 29 (7). pp. 5-11. ISSN 1522-7383

Cyber security; Semantic social engineering; Cyber attacks; Cyber crime; Social media; Social networks

Heartfield, Ryan and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)

Cyber-physical security, Intrusion detection system, Bayesian network

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Cyber-physical security, Vehicles, Intrusion detection, Cyber security, Cloud computing, Computational offloading

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Cybersecurity breach victims, Emotions, Personality, Mental health, Internet of Things (IoT)

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:10.2196/24879)

Data Security, Encryption Switching, Identity-Based Encryption, Attribute-Based Encryption, CPA Security, Standard Model

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2906290)

Denial of Service, DoS, attack detection, rate-limiting, distributed response

Oke, Gulay and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2008) Distributed defence against denial of service attacks: a practical view. In: Proceedings of the 2008 BCS International Conference on Visions of Computer Science. Electronic Workshops in Computing (eWiC) . British Computer Society (BCS), London, UK, pp. 153-162. ISBN 9781906124083 ISSN 1477-9358

Denial of service, Cyber security, Network security, Intrusion detection

Oke, Gulay and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2007) A denial of service detector based on maximum likelihood detection and the random neural network. Computer Journal, 50 (6). pp. 717-727. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxm066)

Digital deception, misinformation, phishing

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:10.1109/MITP.2020.2980090)

Digital forensics, statistical learning

Gresty, David W., Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2014) Digital forensic analysis of internet history using principal component analysis. In: PGNET Proceedings of the 15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2014). Liverpool John Moores University, Liverpool, UK. ISBN 9781902560281

Digital forensics; World wide web; Session-to-session analysis; Context analysis; Pattern of life; Internet history analysis

Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

Honeypots; cyber deception; internet of vehicles; cybersecurity investment; game theory; optimisation; computer security; optimization; Internet of vehicles; investment; connected vehicles; privacy

Panda, Sakshyam, Rass, Stefan, Moschoyiannis, Sotiris, Liang, Kaitai, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2022) HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles. IEEE Access, 10. pp. 104671-104685. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2022.3210117)

Human-as-a-Sensor, Information trustworthiness, Cyber security, Provenance of information, Quality of information, Mobile security, Location spoofing, Smartphone security

Rahman, Syed Sadiqur, Heartfield, Ryan, Oliff, William, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Filippoupolitis, Avgoustinos (2017) Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE, pp. 387-394. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965756)

Human-as-a-Sensor; Social engineering; Semantic attacks; Cyber security

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:10.1109/SERA.2017.7965754)

Indoor Localisation, Location Fingerprinting, Crowdsourcing, Entropy, Wi-Fi, Participatory Sensing.

Hossain, A. K. M. Mahtab and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:10.1145/3360774.3360791)

Information cascade; Semantic textual similarity; Image similarity; Deep learning

Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Patrikakis, Charalampos and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:10.1016/j.asoc.2021.107413)

Information trustworthiness, information cascade

Kasnesis, Panagiotis, Heartfield, Ryan, Toumanidis, Lazaros, Liang, Xing, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Patrikakis, Charalampos Z. (2020) A prototype deep learning paraphrase identification service for discovering information cascades in social networks. In: IEEE International Conference on Multimedia and Expo. IEEE, pp. 1-4. ISBN 978-1728114859 (doi:10.1109/ICMEW46912.2020.9106044)

Internet of Things, IoT Security, HaaSS, intrusion detection

Ivory, Dennis, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2024) Enabling the Human-as-a-security-sensor paradigm in the Internet of Things. In: Pitropakis, Nikolaos and Katsikas, Sokratis, (eds.) Security and Privacy in Smart Environments. Lecture Notes in Computer Science (LNCS), 14800 . Springer, Cham. ISBN 978-3031667077; 978-3031667084 (In Press)

Internet of Things, Security, Psychology

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:10.1016/j.cose.2018.07.011)

IoT cyber risk management; cyber risk assessment; cyber risk control; security controls; Internet of Things; survey; IoT

Parsons, Emily, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700 (2023) A survey on cyber risk management for the Internet of Things. Applied Sciences, 13 (15):9032. pp. 1-44. ISSN 2076-3417 (Online) (doi:10.3390/app13159032)

Lifelong learning, cyber, security, short course, teaching

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

Occupancy Detection, Bluetooth low energy, Emergency management

Filippoupolitis, Avgoustinos, Oliff, William and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2017) Bluetooth low energy based occupancy detection for emergency management. In: 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 31-38. ISBN 978-1-5090-5567-8 ISSN 978-1-5090-5566-1 (Online) (doi:10.1109/IUCC-CSS.2016.013)

Occupancy detection; BLE; Machine learning

Filippoupolitis, Avgoustinos, Oliff, William and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2016) Occupancy detection for building emergency management using BLE beacons. In: Computer and Information Sciences: 31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings. Communications in Computer and Information Science, 659 . Springer International Publishing, Cham, Switzerland, pp. 233-240. ISBN 978-3-319-47216-4 ISSN 1865-0929 (Print), 1865-0937 (Online) (doi:10.1007/978-3-319-47217-1_25)

Predicting attack susceptibility, phishing, semantic social engineering

Heartfield, Ryan and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2016) Evaluating the reliability of users as human sensors of social media security threats. In: International Conference on Social Media, Wearable and Web Analytics (Social Media 2016) (Book of abstracts). The Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC.ORG).

Security, hacker profiling, user profiling, cyber security

Filippoupolitis, Avgoustinos, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Kapetanakis, Stelios (2014) Towards real-time profiling of human attackers and bot detection. In: Proceedings of the 7th International Conference on Cybercrime Forensics Education and Training (CFET). Canterbury Christ Church University, UK. ISBN 9781909067158

Security; Cyber crime; Social Engineering; Semantic attacks

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)

Semantic social engineering, phishing, security

Heartfield, Ryan and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:10.1145/2835375)

Smart Grids, sustainability, dispositional and situational security awareness, fuzzy cognitive map, security

Sani, Abubakar Sadiq, Yuan, Dong, Lawal, Yahaya, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Dong, Zhao Yang (2024) A sustainable dispositional and situational security awareness model for Smart Grids. In: IEEE Global Energy Conference 2024. Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey. (In Press)

Smart energy; heating; home; households; AI; everyday; embodied competencies

Vasalou, Asimina, Gauthier, Andrea, Serta, Ana, Beşevli, Ceylan, Turner, Sarah, Payler, Rachael, Gill, Rea, McAreavey, Kevin, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Liu, Weiru and Beneito-Montagu, Roser (2024) In pursuit of thermal comfort: an exploration of Smart Heating in everyday life. International Journal of Human-Computer Studies, 186:103245. pp. 1-14. ISSN 1071-5819 (doi:10.1016/j.ijhcs.2024.103245)

Smart homes, cyber security, psychology

Budimir, S., Fontaine, J., Huijts, N., Haans, A., Loukas, G. ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Ras, I. and Roesch, E. (2020) Emotions, personality, and psychopathology of cybersecurity breach victims. Journal of Psychosomatic Research, 133:110059. ISSN 0022-3999 (Print), 1879-1360 (Online) (doi:10.1016/j.jpsychores.2020.110059)

Time-varying networks, cyber threats spreading, nonlinear dynamics, interdisciplinary physics, networks

Brett, Terry, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID logoORCID: https://orcid.org/0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:10.1103/PhysRevE.99.050303)

Virtual Reality; cyber-physical attacks; cyber security; privacy taxonomy

Odeleye, Blessing, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Spyridonis, Fotios (2022) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers and Security, 124:102951. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102951)

Virtual reality, cyber security, intrusion detection

Odeleye, Blessing, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan and Spyridonis, Fotios ORCID logoORCID: https://orcid.org/0000-0003-4253-365X (2021) Detecting framerate-oriented cyber attacks on user experience in virtual reality. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. VR4Sec.

Wearables; Activity recognition

Filippoupolitis, Avgoustinos, Takand, Babak and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2017) Activity recognition in a home setting using off the shelf smart watch technology. In: 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 39-44. ISBN 978-1-5090-5567-8 ISSN 978-1-5090-5566-1 (Online) (doi:10.1109/IUCC-CSS.2016.014)

Wearables; Security; Privacy

Patrikakis, Charalampos Z. and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2017) Wear it and share it: Wearables and security. Cutter Executive Update. ISSN 2381-8816

access, attacks, computer, control, critical, cyber attack, cyber security, cyber terrorism, financial, government, industrial, information, insider, international, Internet, management, mechanisms, military, network, nuclear, security, software, Stuxnet, system, terrorist, threats

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

adversarial machine learning, cyber security, artificial intelligence

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:10.1016/j.cosrev.2019.100199)

artificial intelligence, cyber security, AI safety, Internet of Things, smart homes, cyber hygiene

Vasalou, Asimina, Benton, Laura, Serta, Ana, Gauthier, Andrea, Besevli, Ceylan, Gill, Rea, Payler, Rachael, Roesch, Etienne, McAreavey, Kevin, Bauters, Kim, Chen, Hsueh-Ju, Ivory, Dennis, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2024) Doing cybersecurity at home: a human-centred approach for mitigating attacks in AI-enabled home devices. Computers and Security, 148:104112. ISSN 0167-4048 (doi:10.1016/j.cose.2024.104112)

autonomous robots, emergency response, minimum spanning tree, uncertainty, disaster management

Timotheou, Stelios and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2009) Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios. In: Proceedings of the 2009 ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), New York, NY, USA, pp. 1171-1175. ISBN 9781605581668 (doi:10.1145/1529282.1529542)

blockchain, crowdsourcing, cyber security

Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:10.1109/MITP.2019.2929503)

building evacuation, emergency management, distributed, JADE, SimJADE

Filippoupolitis, Avgoustinos, Gelenbe, Erol, Gianni, Daniele, Hey, Laurence, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Timotheou, Stelios (2012) Distributed agent-based building evacuation simulator. In: Summer Computer Simulation Conference 2008 (SCSC'08): Part of the 2008 Summer Simulation Multiconference. Curran Associates, Inc., Red Hook, NY, USA, pp. 46-53. ISBN 9781622763597

building evacuation, simulation, software framework, adaptation, multi-agent system

Gianni, Daniele, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gelenbe, Erol (2008) A simulation framework for the investigation of adaptive behaviours in largely populated building evacuation scenarios. In: Seventh International Joint Conference on Autonomous Agents & Multi-Agent Systems (AAMAS 08). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, USA.

cloud computing, energy efficiency, survey

Sakellari, Georgia and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2013) A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing. Simulation Modelling Practice and Theory, 39. pp. 92-103. ISSN 1569-190X (doi:10.1016/j.simpat.2013.04.002)

cyber forensics, digital forensics, multi-stage attacks, decision support, optimization

Nisioti, Antonia, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:10.1109/TIFS.2021.3054966)

cyber forensics; digital forensics; game theory; bayesian game; multi-stage attacks; decision support; optimisation

Nisioti, Antonia, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:10.3390/s21165300)

cyber forensics; digital forensics; multi-stage attacks; anti-forensics; advanced persistent threats; survey; review

Nisioti, Antonia, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Mylonas, Alexios and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:10.1016/j.fsidi.2022.301480)

cyber security, Internet of Things, smart homes, reinforcement learning

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Bezemskij, Anatolij ORCID logoORCID: https://orcid.org/0000-0002-6211-1609 and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)

cyber security, smart homes, applied psychology

Budimir, Sanja, Fontaine, Johnny R.J., Huijts, Nicole M.A., Haans, Antal, IJsselsteijn, Wijnand, Oostveen, Anne-Marie, Stahl, Frederic, Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Bezemskij, Anatolij ORCID logoORCID: https://orcid.org/0000-0002-6211-1609, Filippoupolitis, Avgoustinos, Ras, Ivano and Roesch, Etienne B. (2024) We are not equipped to identify the first signs of cyber-physical attacks: emotional reactions to cybersecurity breaches on domestic Internet of Things devices. Applied Sciences. ISSN 2076-3417 (Online) (In Press)

cyber-physical attacks, cyber security, physical-cyber attacks, cyber-physical system security, side-channel attacks, vehicle security, internet of things,

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2015) Cyber-physical attacks: A growing invisible threat. Elsevier Inc., Waltham, MA, USA. ISBN 9780128012901

cyber-physical security, cyber security, cyber-physical systems, vehicles, intrusion detection

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

cybersecurity, cyber hygiene healthcare, optimization, training and awareness, CIS control, game theory

Panda, Sakshyam, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:10.1007/978-3-030-41103-9_11)

cybersecurity, smart-home, threats, control optimisation, risk assessment

Scott, Emma, Panda, Sakshyam, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:10.1109/DSC54232.2022.9888829)

data awareness, energy internet, privacy, security, universal composability, data privacy, data models, smart grids, Internet, elliptic curve cryptography, computational modeling, solid modeling, smart contracts, data awareness, privacy, security, universal composability

Sani, Abubakar Sadiq, Yuan, Dong, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Dong, Zhao Yang (2024) UReum: a universally composable blockchain-enabled model for secure and privacy-preserving data awareness in energy internet. IEEE Access. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2024.3496258)

denial of service, DoS, self-aware network, SAN

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Oke, Gulay and Gelenbe, Erol (2008) Defending against Denial of Service in a self-aware network: a practical approach. In: RTO Information Systems and Technology Panel (IST) Symposium on Information Assurance for Emerging and Future Military Systems, Ljubljana, Slovenia, 13-14 October 2008. North Atlantic Treaty Organization (NATO), Research and Technology Organization (RTO) Science and Technology Organization (STO), Brussels, Belgium.

denial of service, computer networks, network security

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Öke, Gülay (2010) Protection against denial of service attacks: a survey. The Computer Journal, 53 (7). pp. 1020-1037. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxp078)

denial of service, network security

Gelenbe, E., Gellman, M. ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Loukas, G. ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2005) An autonomic approach to denial of service defence. In: International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE, Piscataway, NJ, US. ISBN 0769523420 (doi:10.1109/WOWMOM.2005.24)

denial of service, network security, intrusion detection

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Oke, Gulay (2007) Likelihood ratios and recurrent random neural networks in detection of denial of service attacks. In: 2007 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 16-18 July 2007, San Diego, CA, USA.

denial of service, network security, intrusion detection, cyber security

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Oke, Gulay (2007) A biologically inspired denial of service detector using the random neural network. In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems. IEEE, Piscataway, NJ, US. ISBN 9781424414543 ISSN 2155-6806

digital forensics, internet history, session-to-session analysis, internet connection records, community detection

Gresty, David W., Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

disaster management, emergency response

Filippoupolitis, Avgoustinos, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Timotheou, Stelios, Dimakis, Nikolaos and Gelenbe, Erol (2009) Emergency response systems for disaster management in buildings. In: C3I for Crisis, Emergency and Consequence Management: Papers presented at the Information Systems and Technology Panel (IST) Symposium held in Bucharest, Romania, 11 May to 12 May 2009. North Atlantic Treaty Organization (NATO), Research and Technology Organization (RTO), Brussels, Belgium, pp. 15-1. ISBN 9789283700852

emergency response robots, trapped civilians, ad hoc networks, educational institutions, humans, intelligent networks, intelligent robots, intelligent systems, joining processes, mobile ad hoc networks, mobile communication, mobile robots, emergency services, multi-robot systems, radio networks, , wireless ad hoc network

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Timotheou, Stelios (2009) Connecting trapped civilians to a wireless ad hoc network of emergency response robots. In: 11th IEEE International Conference on Communications Systems (ICCS 2008), pp. 599-603, Guangzhou, China, November 2008. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 599-603. ISBN 9781424424238 (Print), 9781424424245 (Electronic) (doi:10.1109/ICCS.2008.4737254)

emergency response, cyber security, rescue robots

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)

emergency response, robotic wireless connection, ad hoc networks, collaboration, collaborative work, hazardous materials, humans, mobile robots, network topology, robot sensing systems, wireless networks, wireless sensor networks, ad hoc networks, mobile radio, telerobotics, ad hoc network connection, emergency response operations, multi-hop connection, network flow optimisation problems, robotic wireless network connection, static wireless sink

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Timotheou, Stelios and Gelenbe, Erol (2008) Robotic wireless network connection of civilians for emergency response operations. In: 23rd IEEE International Symposium on Computer and Information Sciences. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA. ISBN 9781424428809 (doi:10.1109/ISCIS.2008.4717943)

emergency response, wireless sensor networks

Filippoupolitis, Avgoustinos, Hey, Laurence, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gelenbe, Erol and Timotheou, Stelios (2008) Emergency response simulation using wireless sensor networks. In: Proceedings of the 1st International Conference on Ambient Media and Systems (ICST Ambi-Sys '08). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels, Belgium. ISBN 9789639799165

iBeacon, Bluetooth Low Energy, Occupancy Detection, Machine Learning, Malicious Spoofing Attacks

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:10.1145/3109761.3109776)

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2017) Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems. In: 2017 IEEE 15th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2017). IEEE. ISBN 978-1-5090-5757-3 ISSN 978-1-5090-5756-6 (Online) (doi:10.1109/SERA.2017.7965755)

industrial control system, SCADA, honeypots, GAN network, autoencoder network, data generation

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:10.1109/ISCC50000.2020.9219712)

internet of things, IoT offloading, computation offloading, edge computing, cloud computing, decision support, EdgeCloudSim Simulator

Jaddoa, Ali, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:10.1016/j.simpat.2019.102019)

intrusion detection, denial of service, network security

Oke, Gulay, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gelenbe, Erol (2007) Detecting denial of service attacks with Bayesian classifiers and the random neural network. In: 2007 IEEE International Conference on Fuzzy Systems. IEEE, London, UK. ISBN 9781424412099 ISSN 1098-7584 (doi:10.1109/FUZZY.2007.4295666)

location privacy, optimization, histograms

Theodorakopoulos, George, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing, 19 (1). pp. 566-578. ISSN 1545-5971 (Print), 1941-0018 (Online) (doi:10.1109/TDSC.2020.2980270)

malware; Android; cyber attacks

Aurangzeb, Sana, Aleem, Muhammad, Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700 (2024) AndroDex: Android Dex images of obfuscated malware. Scientific Data, 11 (212). pp. 1-10. ISSN 2052-4463 (Online) (doi:10.1038/s41597-024-03027-3)

network security, cognitive packet network, network performance, integrity, confidentiality

Lent, Ricardo, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2014) Strengthening the security of cognitive packet networks. International Journal of Advanced Intelligence Paradigms, 6 (1). pp. 14-27. ISSN 1755-0386 (Print), 1755-0394 (Online) (doi:10.1504/IJAIP.2014.059584)

network security, denial of service, network modelling

Gelenbe, Erol, Gellman, Michael and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2004) Defending networks against denial of service attacks. In: Unmanned/Unattended Sensors and Sensor Networks. The International Society for Optical Engineering, pp. 233-243. (doi:10.1117/12.578502)

network security, intrusion detection, denial of service

Gelenbe, Erol and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2007) A self-aware approach to denial of service defence. Computer Networks, 51 (5). pp. 1299-1314. ISSN 1389-1286 (doi:10.1016/j.comnet.2006.09.009)

nuclear, cyber security, cyber-physical security, physical security

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2015) Effectively integrating physical and cyber security: WINS International best practice guide 4.11. Technical Report. World Institute for Nuclear Security.

post-quantum cryptography, multivariate public key cryptography, general construction, proxy signature, provable security

Chen, Jiahui, Ling, Jie, Ning, Jianting, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Liang, Kaitai and Chen, Jiageng (2020) Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. International Journal of Distributed Sensor Networks, 16 (4). pp. 1-16. ISSN 1550-1329 (Print), 1550-1477 (Online) (doi:10.1177/1550147720914775)

security and privacy, human and societal aspects of security and privacy

Parsons, Emily Kate, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2020) How secure is home: assessing human susceptibility to IoT threats. In: PCI 2020: 24th Pan-Hellenic Conference on Informatics. ACM, pp. 64-71. ISBN 978-1450388979 (doi:10.1145/3437120.3437277)

security and privacy; human and societal aspects of security and privacy; applied computing; enterprise computing; general and reference; evaluation

Panda, Sakshyam ORCID logoORCID: https://orcid.org/0000-0001-7274-0073, Panaousis, Manos ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Kentrotis, Konstantinos (2023) Privacy impact assessment of cyber attacks on connected and autonomous vehicles. In: ARES 2023, the 18th International Conference on Availability, Reliability and Security. Proceedings. 29th August 2023 - 1st September 2023. Benevento, Italy. Association for Computing Machinery (ACM), New York, 93:1-93:9. ISBN 979-8400707728 (doi:10.1145/3600160.3605073)

security, internet of things, medical technologies

Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:10.3390/s19235258)

semantic attacks, cloud storage

Heartfield, Ryan and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2013) On the feasability of automated semantic attacks in the cloud. In: 27th International Symposium on Computer and Information Sciences. Computer and Information Sciences (III). Springer, pp. 343-352. ISBN 9781447145936

smart home security; mathematical optimisation; security controls; IoT; artificial intelligence

Zhang, Yunxiao, Malacaria, Pasquale, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2023) CROSS: a framework for cyber risk optimisation in smart homes. Computers and Security, 130:103250. pp. 1-15. ISSN 0167-4048 (doi:10.1016/j.cose.2023.103250)

survey, pervasive computing, network-level security and protection, physical security, emergency management

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

This list was generated on Sun Dec 22 02:56:24 2024 UTC.