Skip navigation

Items where Greenwich Author is "Panaousis, Emmanouil"

Items where Greenwich Author is "Panaousis, Emmanouil"

Group by: Item Type | Date | Funders | Uncontrolled Keywords | No Grouping
Jump to: ABKS; hidden access policy; hidden attribute set; conjunctive keyword search; Cloud storage | AI enabled IoT systems, collaborative filtering, two-way trust recommendation, intelligent recommendation system, sparse decision making | Cyber insurance, Security economics | Cyber security, vehicles, Internet of Things, cyber-physical attacks, cyber-physical security | Data Security, Encryption Switching, Identity-Based Encryption, Attribute-Based Encryption, CPA Security, Standard Model | Honeypots; cyber deception; internet of vehicles; cybersecurity investment; game theory; optimisation; computer security; optimization; Internet of vehicles; investment; connected vehicles; privacy | IoT cyber risk management; cyber risk assessment; cyber risk control; security controls; Internet of Things; survey; IoT | Virtual Reality; cyber-physical attacks; cyber security; privacy taxonomy | adaptive user authentication, risk-based user authentication, risk estimation, novelty detection, outlier detection, mobile passenger ID devices, prototype development | adversarial machine learning, cyber security, artificial intelligence | algorithm substitution attack; extractable signatures; discrete log; arbitrary collection | artificial intelligence, cyber security, AI safety, Internet of Things, smart homes, cyber hygiene | asset discovery; cyber security; network visualization; artificial intelligence; trusted platform module | cCyber security; cyber risk; advanced persistent threats; cyber physical system; attack graph; attack tree; game-theory; stealthy intrusion; attacker-defender games | contract-signing protocol, abuse-freeness, double trusted third parties, trapdoor commitment scheme | cyber forensics, digital forensics, multi-stage attacks, decision support, optimization | cyber forensics; digital forensics; game theory; bayesian game; multi-stage attacks; decision support; optimisation | cyber forensics; digital forensics; multi-stage attacks; anti-forensics; advanced persistent threats; survey; review | cyber hygiene; healthcare; training; awareness | cyber insurance; blockchain; Smart contracts; self-sovereign identity | cyber security, Internet of Things, smart homes, reinforcement learning | cyber security, cyber insurance, game theory | cyber security; Artificial Intelligence (AI); cyber forensics, ATT&CK | cybersecurity, cyber hygiene healthcare, optimization, training and awareness, CIS control, game theory | cybersecurity, intrusion detection system, machine learning, modbus, SCADA, smart grid | cybersecurity, smart-home, threats, control optimisation, risk assessment | cybersecurity; operational research; set covering; knapsack; software weaknesses; control optimisation | cybersecurity; social engineering attacks; human factors; cyber risk assessment; cybersecurity awareness training | decision support systems, security economics | healthcare, cyber risk, assessment, management | indexes, encryption, keyword search, cloud computing, TV | internet of things, IoT offloading, computation offloading, edge computing, cloud computing, decision support, EdgeCloudSim Simulator | internet of things, cryptography | internet of things, cyber security | location privacy, optimization, histograms | malware detection, hybrid analysis, weight distribution, multivariate feature fusion | microgrid, security, machine-to-machine, key management | mobile user authentication; benefits of behavioral biometrics; limitations of behavioral biometrics | post-quantum cryptography, multivariate public key cryptography, general construction, proxy signature, provable security | privacy-preserving; homomorphic encryption; genotype imputation; privacy computing; genetic security | security and privacy, human and societal aspects of security and privacy | security and privacy; human and societal aspects of security and privacy; applied computing; enterprise computing; general and reference; evaluation | security and privacy; mathematics of computing; mathematical analysis; theory of computation; probabilistic computation; | security economics, cyber security | security, economics | smart home security; mathematical optimisation; security controls; IoT; artificial intelligence | wireless sensor networks, anomaly detection
Number of items: 47.

ABKS; hidden access policy; hidden attribute set; conjunctive keyword search; Cloud storage

Chen, Yang, Liu, Yang, Pan, Jin, Gao, Fei and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2023) Privacy-protecting attribute-based conjunctive keyword search scheme in Cloud storage. Journal of Internet Technology, 24 (1):2840. pp. 65-75. ISSN 1607-9264 (Print), 2079-4029 (Online) (doi:10.53106/160792642023012401007)

AI enabled IoT systems, collaborative filtering, two-way trust recommendation, intelligent recommendation system, sparse decision making

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2020.3006066)

Cyber insurance, Security economics

Farao, Aristeidis, Panda, Sakshyam, Menesidou, Sofia Anna, Veliou, Entso, Episkopos, Nikolaos, Kalatzantonakis, George, Mohammadi, Farnaz, Georgopoulos, Nikolaos, Sirivianos, Michael, Salamanos, Nikos, Loizou, Spyros, Pingos, Michalis, Polley, John, Fielder, Andrew, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2020) SECONDO: A platform for cybersecurity investments and cyber insurance decisions. In: Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min and Khalil, Ismail, (eds.) Trust, Privacy and Security in Digital Business: Proceedings of the 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020. Lecture Notes in Computer Science book series (LNCS) (12395). Springer Nature, Cham, Switzerland, pp. 65-74. ISBN 978-3030589851 (doi:10.1007/978-3-030-58986-8_5)

Cyber security, vehicles, Internet of Things, cyber-physical attacks, cyber-physical security

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:10.1016/j.adhoc.2018.10.002)

Data Security, Encryption Switching, Identity-Based Encryption, Attribute-Based Encryption, CPA Security, Standard Model

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2906290)

Honeypots; cyber deception; internet of vehicles; cybersecurity investment; game theory; optimisation; computer security; optimization; Internet of vehicles; investment; connected vehicles; privacy

Panda, Sakshyam, Rass, Stefan, Moschoyiannis, Sotiris, Liang, Kaitai, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2022) HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles. IEEE Access, 10. pp. 104671-104685. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2022.3210117)

IoT cyber risk management; cyber risk assessment; cyber risk control; security controls; Internet of Things; survey; IoT

Parsons, Emily, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700 (2023) A survey on cyber risk management for the Internet of Things. Applied Sciences, 13 (15):9032. pp. 1-44. ISSN 2076-3417 (Online) (doi:10.3390/app13159032)

Virtual Reality; cyber-physical attacks; cyber security; privacy taxonomy

Odeleye, Blessing, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Spyridonis, Fotios (2022) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers and Security, 124:102951. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102951)

adaptive user authentication, risk-based user authentication, risk estimation, novelty detection, outlier detection, mobile passenger ID devices, prototype development

Papaioannou, Maria ORCID logoORCID: https://orcid.org/0000-0003-3830-7190, Zachos, Georgios ORCID logoORCID: https://orcid.org/0000-0001-9130-4605, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Rodriguez, Jonathan (2024) Prototyping a secure and usable user authentication mechanism for mobile passenger ID devices for land/sea border control. Sensors, 24 (16):5193. ISSN 1424-8220 (Online) (doi:10.3390/s24165193)

adversarial machine learning, cyber security, artificial intelligence

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:10.1016/j.cosrev.2019.100199)

algorithm substitution attack; extractable signatures; discrete log; arbitrary collection

Zhao, Yi, Liang, Kaitai, Zhao, Yanqi, Yang, Bo, Ming, Yang and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2022) Practical algorithm substitution attack on extractable signatures. Designs, Codes and Cryptography, 90. pp. 921-937. ISSN 0925-1022 (Print), 1573-7586 (Online) (doi:10.1007/s10623-022-01019-1)

artificial intelligence, cyber security, AI safety, Internet of Things, smart homes, cyber hygiene

Vasalou, Asimina, Benton, Laura, Serta, Ana, Gauthier, Andrea, Besevli, Ceylan, Gill, Rea, Payler, Rachael, Roesch, Etienne, McAreavey, Kevin, Bauters, Kim, Chen, Hsueh-Ju, Ivory, Dennis, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2024) Doing cybersecurity at home: a human-centred approach for mitigating attacks in AI-enabled home devices. Computers and Security, 148:104112. ISSN 0167-4048 (doi:10.1016/j.cose.2024.104112)

asset discovery; cyber security; network visualization; artificial intelligence; trusted platform module

Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103350)

cCyber security; cyber risk; advanced persistent threats; cyber physical system; attack graph; attack tree; game-theory; stealthy intrusion; attacker-defender games

Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:10.1016/j.cose.2023.103328)

contract-signing protocol, abuse-freeness, double trusted third parties, trapdoor commitment scheme

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2952213)

cyber forensics, digital forensics, multi-stage attacks, decision support, optimization

Nisioti, Antonia, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:10.1109/TIFS.2021.3054966)

cyber forensics; digital forensics; game theory; bayesian game; multi-stage attacks; decision support; optimisation

Nisioti, Antonia, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:10.3390/s21165300)

cyber forensics; digital forensics; multi-stage attacks; anti-forensics; advanced persistent threats; survey; review

Nisioti, Antonia, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Mylonas, Alexios and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:10.1016/j.fsidi.2022.301480)

cyber hygiene; healthcare; training; awareness

Argyridou, Elina, Nifakos, Sokratis, Laoudias, Christos, Panda, Sakshyam ORCID logoORCID: https://orcid.org/0000-0001-7274-0073, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Chandramouli, Krishna, Navarro-Llobet, Diana, Zamorano, Juan Mora, Papachristou, Panagiotis and Bonacina, Stefano (2022) Cyber hygiene methodology for raising cybersecurity and data privacy awareness in healthcare organisations. Journal of Medical Internet Research, 25:e41294. ISSN 1438-8871 (Online) (doi:10.2196/41294)

cyber insurance; blockchain; Smart contracts; self-sovereign identity

Farao, Aristeidis, Paparis, Georgios, Panda, Sakshyam ORCID logoORCID: https://orcid.org/0000-0001-7274-0073, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Zarras, Apostolis and Xenakis, Christos (2023) INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain. International Journal of Information Security. ISSN 1615-5262 (Print), 1615-5270 (Online) (doi:10.1007/s10207-023-00741-8)

cyber security, Internet of Things, smart homes, reinforcement learning

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Bezemskij, Anatolij ORCID logoORCID: https://orcid.org/0000-0002-6211-1609 and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)

cyber security, cyber insurance, game theory

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:10.1016/j.cose.2019.101593)

cyber security; Artificial Intelligence (AI); cyber forensics, ATT&CK

Atefi, Soodeh, Panda, Sakshyam, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Laszka, Aron (2023) Principled data-driven decision support for cyber-forensic investigations. In: Thirty-Seventh AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence and The MIT Press (AAAI Press), Palo Alto, California USA, pp. 5010-5017. ISBN 9781577358800 ISSN 2159-5399 (Print), 2374-3468 (Online) (doi:10.1609/aaai.v37i4.25628)

cybersecurity, cyber hygiene healthcare, optimization, training and awareness, CIS control, game theory

Panda, Sakshyam, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:10.1007/978-3-030-41103-9_11)

cybersecurity, intrusion detection system, machine learning, modbus, SCADA, smart grid

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:10.3390/s20185305)

cybersecurity, smart-home, threats, control optimisation, risk assessment

Scott, Emma, Panda, Sakshyam, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:10.1109/DSC54232.2022.9888829)

cybersecurity; operational research; set covering; knapsack; software weaknesses; control optimisation

Tsiodra, Maria, Panda, Sakshyam ORCID logoORCID: https://orcid.org/0000-0001-7274-0073, Chronopoulos, Michail and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2023.3272670)

cybersecurity; social engineering attacks; human factors; cyber risk assessment; cybersecurity awareness training

Nifakos, Sokratis, Chandramouli, Khrisna, Nikolaou, Charoula ORCID logoORCID: https://orcid.org/0000-0001-6519-4174, Papachristou, Panagiotis, Koch, Sabine, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Bonacina, Stefano (2021) Influence of human factors on cyber security within healthcare organisations: a systematic review. Sensors, 21 (15):5119. ISSN 1424-8220 (Print), https://doi.org/10.3390/s21155119 Received: 29 June 2021 / Revised: 15 July 2021 / Accepted: 16 July 2021 / Published: 28 July 2021 (Online) (doi:10.3390/s21155119)

decision support systems, security economics

Fielder, Andrew, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Malacaria, Pasquale, Hankin, Chris and Smeraldi, Fabrizio (2016) Decision support approaches for cyber security investment. Decision Support Systems, 86. pp. 13-23. ISSN 0167-9236 (doi:10.1016/j.dss.2016.02.012)

healthcare, cyber risk, assessment, management

González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:10.3390/s21165493)

indexes, encryption, keyword search, cloud computing, TV

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2020.2996940)

internet of things, IoT offloading, computation offloading, edge computing, cloud computing, decision support, EdgeCloudSim Simulator

Jaddoa, Ali, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:10.1016/j.simpat.2019.102019)

internet of things, cryptography

Ning, Zhenhu, Xu, Guangquan, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Wang, Hao and Liang, Kaitai (2019) TAW: cost-effective threshold authentication with weights for internet of things. IEEE Access, 7. pp. 30112-30125. ISSN 2169-3536 (Print), 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2902226)

internet of things, cyber security

Mavropoulos, Orestis, Mouratidis, Haralambos, Fish, Andrew and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2018) Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks, 92:101743. ISSN 1570-8705 (doi:10.1016/j.adhoc.2018.08.013)

location privacy, optimization, histograms

Theodorakopoulos, George, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing, 19 (1). pp. 566-578. ISSN 1545-5971 (Print), 1941-0018 (Online) (doi:10.1109/TDSC.2020.2980270)

malware detection, hybrid analysis, weight distribution, multivariate feature fusion

Xu, Guangquan, Feng, Meiqi, Jiao, Litao, Liu, Jian, Dai, Hong-Ning, Wang, Ding, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Zheng, Xi (2022) MFF-AMD: multivariate feature fusion for Android malware detection. In: CollaborateCom 2021: Networking, Applications and Worksharing 17th EAI. Virtual Event, October 16-18, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 406), 406 (ch. 10). Springer Link, Cham, pp. 368-385. ISBN 9783030926342 ; 9783030926359

microgrid, security, machine-to-machine, key management

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2019.2941586)

mobile user authentication; benefits of behavioral biometrics; limitations of behavioral biometrics

Papaioannou, Maria, Mantas, Georgios ORCID logoORCID: https://orcid.org/0000-0002-8074-0417, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Essop, Aliyah ORCID logoORCID: https://orcid.org/0000-0002-6978-9359, Rodriguez, Jonathan and Sucasas, Victor (2023) Behavioral biometrics for mobile user authentication: benefits and limitations. In: 2023 IFIP Networking Conference (IFIP Networking). IEEE, Laxenburg, Austria. ISBN 979-8350339383 ISSN 1861-2288 (Online) (doi:10.23919/IFIPNetworking57963.2023.10186419)

post-quantum cryptography, multivariate public key cryptography, general construction, proxy signature, provable security

Chen, Jiahui, Ling, Jie, Ning, Jianting, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Liang, Kaitai and Chen, Jiageng (2020) Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. International Journal of Distributed Sensor Networks, 16 (4). pp. 1-16. ISSN 1550-1329 (Print), 1550-1477 (Online) (doi:10.1177/1550147720914775)

privacy-preserving; homomorphic encryption; genotype imputation; privacy computing; genetic security

Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103386)

security and privacy, human and societal aspects of security and privacy

Parsons, Emily Kate, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2020) How secure is home: assessing human susceptibility to IoT threats. In: PCI 2020: 24th Pan-Hellenic Conference on Informatics. ACM, pp. 64-71. ISBN 978-1450388979 (doi:10.1145/3437120.3437277)

security and privacy; human and societal aspects of security and privacy; applied computing; enterprise computing; general and reference; evaluation

Panda, Sakshyam ORCID logoORCID: https://orcid.org/0000-0001-7274-0073, Panaousis, Manos ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Kentrotis, Konstantinos (2023) Privacy impact assessment of cyber attacks on connected and autonomous vehicles. In: ARES 2023, the 18th International Conference on Availability, Reliability and Security. Proceedings. 29th August 2023 - 1st September 2023. Benevento, Italy. Association for Computing Machinery (ACM), New York, 93:1-93:9. ISBN 979-8400707728 (doi:10.1145/3600160.3605073)

security and privacy; mathematics of computing; mathematical analysis; theory of computation; probabilistic computation;

Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:10.1145/3538969.3544420)

security economics, cyber security

Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Karapistoli, Eirini, Elsemary, Hadeep, Alpcan, Tansu, Khuzani, MHR and Economides, Anastasios A. (2016) Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks, 56. pp. 28-42. ISSN 1570-8705 (doi:10.1016/j.adhoc.2016.11.008)

security, economics

Chronopoulos, Michail, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Grossklags, Jens (2017) An options approach to cybersecurity investment. IEEE Access, 6. pp. 12175-12186. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2773366)

smart home security; mathematical optimisation; security controls; IoT; artificial intelligence

Zhang, Yunxiao, Malacaria, Pasquale, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2023) CROSS: a framework for cyber risk optimisation in smart homes. Computers and Security, 130:103250. pp. 1-15. ISSN 0167-4048 (doi:10.1016/j.cose.2023.103250)

wireless sensor networks, anomaly detection

Li, Xiaoming, Xu, Guangquan, Zheng, Xi, Liang, Kaitai, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062, Li, Tao, Wang, Wei and Shen, Chao (2019) Using sparse representation to detect anomalies in complex WSNs. ACM Transactions on Intelligent Systems and Technology, 10 (6):64. ISSN 2157-6904 (Print), 2157-6912 (Online) (doi:10.1145/3331147)

This list was generated on Sun Dec 22 02:22:39 2024 UTC.