Items where Faculty / School / Research Centre / Research Groups is "Internet of Things and Security Research Centre (ISEC)"
- University Structure (18492)
- Faculty of Engineering & Science (7833)
- Internet of Things and Security Research Centre (ISEC) (119)
- Faculty of Engineering & Science (7833)
abuse-freeness
Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2952213)
Ad-hoc networks
Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:10.1007/s11276-013-0685-7)
additive particle tracking
Bojarevics, V. ORCID: https://orcid.org/0000-0002-7326-7748, Pericleous, K. ORCID: https://orcid.org/0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)
Advanced metering infrastructure (AMI)
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2020.2971707)
advanced persistent threats
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Mylonas, Alexios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:10.1016/j.fsidi.2022.301480)
Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:10.1016/j.cose.2023.103328)
adversarial machine learning
Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:10.1016/j.cosrev.2019.100199)
Adversarial Models
Breza, Michael, Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie (2018) Failures from the Environment, a Report on the First FAILSAFE workshop. ACM SIGCOMM Computer Communication Review, 48 (2). pp. 40-45. ISSN 0146-4833 (doi:10.1145/3213232.3213238)
AI enabled IoT systems
Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2020.3006066)
Algorithm design and analysis
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:10.1109/DCOSS.2014.43)
algorithm substitution attack
Zhao, Yi, Liang, Kaitai, Zhao, Yanqi, Yang, Bo, Ming, Yang and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Practical algorithm substitution attack on extractable signatures. Designs, Codes and Cryptography, 90. pp. 921-937. ISSN 0925-1022 (Print), 1573-7586 (Online) (doi:10.1007/s10623-022-01019-1)
alloy microstructure
Bojarevics, V. ORCID: https://orcid.org/0000-0002-7326-7748, Pericleous, K. ORCID: https://orcid.org/0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)
Anomaly detection
Bezemskij, Anatolij, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)
Li, Xiaoming, Xu, Guangquan, Zheng, Xi, Liang, Kaitai, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Li, Tao, Wang, Wei and Shen, Chao (2019) Using sparse representation to detect anomalies in complex WSNs. ACM Transactions on Intelligent Systems and Technology, 10 (6):64. ISSN 2157-6904 (Print), 2157-6912 (Online) (doi:10.1145/3331147)
anti-forensics
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Mylonas, Alexios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:10.1016/j.fsidi.2022.301480)
arbitrary collection
Zhao, Yi, Liang, Kaitai, Zhao, Yanqi, Yang, Bo, Ming, Yang and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Practical algorithm substitution attack on extractable signatures. Designs, Codes and Cryptography, 90. pp. 921-937. ISSN 0925-1022 (Print), 1573-7586 (Online) (doi:10.1007/s10623-022-01019-1)
artificial intelligence
Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103350)
Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:10.1016/j.cosrev.2019.100199)
Artificial Intelligence (AI)
Atefi, Soodeh, Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Laszka, Aron (2023) Principled data-driven decision support for cyber-forensic investigations. In: Thirty-Seventh AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence and The MIT Press (AAAI Press), Palo Alto, California USA, pp. 5010-5017. ISBN 9781577358800 ISSN 2159-5399 (Print), 2374-3468 (Online) (doi:10.1609/aaai.v37i4.25628)
assessment
González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:10.3390/s21165493)
asset discovery
Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103350)
asynchronous sampling
Fu, Anqi, Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)
ATT&CK
Atefi, Soodeh, Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Laszka, Aron (2023) Principled data-driven decision support for cyber-forensic investigations. In: Thirty-Seventh AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence and The MIT Press (AAAI Press), Palo Alto, California USA, pp. 5010-5017. ISBN 9781577358800 ISSN 2159-5399 (Print), 2374-3468 (Online) (doi:10.1609/aaai.v37i4.25628)
attack graph
Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:10.1016/j.cose.2023.103328)
attack tree
Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:10.1016/j.cose.2023.103328)
attacker-defender games
Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:10.1016/j.cose.2023.103328)
Attribute-Based Encryption
He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2906290)
authenticated encryption
Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:10.1109/ISGT49243.2021.9372235)
authentication
Sani, Abubakar Sadiq, Bertino, Elisa, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Computers & Security, 115:102610. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102610)
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE, Piscataway, USA. ISBN 978-1665446303 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM46819.2021.9638015)
Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM40551.2019.8973948)
authorization
Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM40551.2019.8973948)
autoencoder network
Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:10.1109/ISCC50000.2020.9219712)
autonomous systems
Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913
bayesian game
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:10.3390/s21165300)
Bayesian network
Bezemskij, Anatolij, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)
Behaviour-based
Bezemskij, Anatolij, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)
Big data
Bayley, Fletcher and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975
biomedical monitoring
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:10.1109/WiMOB.2018.8589095)
Blockchain
Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2018.2881246)
Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:10.1016/j.segan.2021.100553)
Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:10.1109/MITP.2019.2929503)
Rahman, Md. Abdur, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:10.1145/3323873.3326924)
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:10.1109/ICDCS.2019.00190)
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM41954.2020.9281929)
Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:10.1109/ISGT49243.2021.9372235)
Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:10.1007/978-981-4585-87-3_48-1)
Bluetooth Low Energy
Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:10.1145/3109761.3109776)
Byzantine-robust aggregation
Li, Yanli, Yuan, Dong, Sani, Abubakar Sadiq and Bao, Wei (2023) Enhancing Federated Learning robustness in adversarial environment through clustering Non-IID features. Computers and Security, 132:103319. pp. 1-13. ISSN 0167-4048 (doi:10.1016/j.cose.2023.103319)
calculus
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:10.1109/WF-IoT.2016.7845510)
Calibration-free
Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:10.1016/j.comcom.2015.03.001)
cCyber security
Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:10.1016/j.cose.2023.103328)
CIS control
Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:10.1007/978-3-030-41103-9_11)
cloud computing
Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2020.2996940)
Jaddoa, Ali, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:10.1016/j.simpat.2019.102019)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)
collaborative filtering
Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2020.3006066)
collaborative learning
Gan, D. ORCID: https://orcid.org/0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:10.1109/CSCI.2017.313)
communication
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:10.1109/TIFS.2019.2892005)
communication and application layer attacks
Khan, Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2020.3032968)
communication protocols
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:10.1109/JIOT.2017.2749883)
community detection
Gresty, David W., Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)
computation offloading
Jaddoa, Ali, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:10.1016/j.simpat.2019.102019)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)
computational modeling
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:10.1109/WF-IoT.2016.7845510)
Computational offloading
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)
computer bugs
Liva, Giovanni, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:10.1145/3193992.3193997)
computer crime
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
computer hacking
Serpanos, Dimitrios ORCID: https://orcid.org/0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:10.1109/MDAT.2018.2816943)
computer security
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:10.1016/j.cose.2018.02.020)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
Serpanos, Dimitrios ORCID: https://orcid.org/0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:10.1109/MDAT.2018.2816943)
Context analysis
Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)
contract-signing protocol
Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2952213)
control optimisation
Scott, Emma, Panda, Sakshyam, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:10.1109/DSC54232.2022.9888829)
Tsiodra, Maria, Panda, Sakshyam ORCID: https://orcid.org/0000-0001-7274-0073, Chronopoulos, Michail and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2023.3272670)
control systems
Serpanos, Dimitrios ORCID: https://orcid.org/0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:10.1109/MDAT.2018.2816943)
cooja
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:10.1109/JIOT.2017.2749883)
cooperative control
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:10.1109/CONTROL.2016.7737541)
Correlation
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:10.1109/DCOSS.2014.43)
CPA Security
He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2906290)
cps
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:10.1109/JIOT.2017.2749883)
Cross-disciplinary collaboration
Chadwick, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.
Crowdsourcing
Hossain, A. K. M. Mahtab and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:10.1145/3360774.3360791)
Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:10.1109/MITP.2019.2929503)
cryptography
Ning, Zhenhu, Xu, Guangquan, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Wang, Hao and Liang, Kaitai (2019) TAW: cost-effective threshold authentication with weights for internet of things. IEEE Access, 7. pp. 30112-30125. ISSN 2169-3536 (Print), 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2902226)
Cyber attacks
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)
Cyber crime
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)
cyber enabled fraud
Lawal, Damola (2023) Are we preparing our students for real-world digital forensics? [Video]
cyber forensics
Atefi, Soodeh, Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Laszka, Aron (2023) Principled data-driven decision support for cyber-forensic investigations. In: Thirty-Seventh AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence and The MIT Press (AAAI Press), Palo Alto, California USA, pp. 5010-5017. ISBN 9781577358800 ISSN 2159-5399 (Print), 2374-3468 (Online) (doi:10.1609/aaai.v37i4.25628)
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:10.1109/TIFS.2021.3054966)
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Mylonas, Alexios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:10.1016/j.fsidi.2022.301480)
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:10.3390/s21165300)
cyber fraud
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)
cyber hygiene healthcare
Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:10.1007/978-3-030-41103-9_11)
Cyber insurance
Farao, Aristeidis, Panda, Sakshyam, Menesidou, Sofia Anna, Veliou, Entso, Episkopos, Nikolaos, Kalatzantonakis, George, Mohammadi, Farnaz, Georgopoulos, Nikolaos, Sirivianos, Michael, Salamanos, Nikos, Loizou, Spyros, Pingos, Michalis, Polley, John, Fielder, Andrew, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2020) SECONDO: A platform for cybersecurity investments and cyber insurance decisions. In: Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min and Khalil, Ismail, (eds.) Trust, Privacy and Security in Digital Business: Proceedings of the 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020. Lecture Notes in Computer Science book series (LNCS) (12395). Springer Nature, Cham, Switzerland, pp. 65-74. ISBN 978-3030589851 (doi:10.1007/978-3-030-58986-8_5)
Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:10.1016/j.cose.2019.101593)
cyber physical system
Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:10.1016/j.cose.2023.103328)
cyber physical systems
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:10.1049/cp.2019.0132)
cyber risk
González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:10.3390/s21165493)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 (2022) Towards practical and formal security risk analysis of IoT (Internet of Things) applications. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-4. ISBN 978-1665499965; 978-1665499972 (doi:10.1109/ETFA52439.2022.9921511)
Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:10.1016/j.cose.2023.103328)
Cyber Security
Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2018.2881246)
Atefi, Soodeh, Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Laszka, Aron (2023) Principled data-driven decision support for cyber-forensic investigations. In: Thirty-Seventh AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence and The MIT Press (AAAI Press), Palo Alto, California USA, pp. 5010-5017. ISBN 9781577358800 ISSN 2159-5399 (Print), 2374-3468 (Online) (doi:10.1609/aaai.v37i4.25628)
Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913
Bezemskij, Anatolij, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)
Budimir, S., Fontaine, J., Huijts, N., Haans, A., Loukas, G. ORCID: https://orcid.org/0000-0003-3559-5182, Ras, I. and Roesch, E. (2020) Emotions, personality, and psychopathology of cybersecurity breach victims. Journal of Psychosomatic Research, 133:110059. ISSN 0022-3999 (Print), 1879-1360 (Online) (doi:10.1016/j.jpsychores.2020.110059)
Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103350)
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:10.1016/j.cose.2018.02.020)
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Bezemskij, Anatolij ORCID: https://orcid.org/0000-0002-6211-1609 and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:10.1109/SERA.2017.7965754)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2021) Towards scalable security of real-time applications: a formally certified approach. In: 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, 01-04. ISBN 978-1728129907; 978-1728129891 (doi:10.1109/ETFA45728.2021.9613489)
Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:10.1109/MITP.2019.2929503)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:10.1016/j.adhoc.2018.10.002)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)
Mavropoulos, Orestis, Mouratidis, Haralambos, Fish, Andrew and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2018) Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks, 92:101743. ISSN 1570-8705 (doi:10.1016/j.adhoc.2018.08.013)
Odeleye, Blessing, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Spyridonis, Fotios (2022) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers and Security, 124:102951. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102951)
Odeleye, Blessing, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan and Spyridonis, Fotios ORCID: https://orcid.org/0000-0003-4253-365X (2021) Detecting framerate-oriented cyber attacks on user experience in virtual reality. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. VR4Sec.
Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Karapistoli, Eirini, Elsemary, Hadeep, Alpcan, Tansu, Khuzani, MHR and Economides, Anastasios A. (2016) Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks, 56. pp. 28-42. ISSN 1570-8705 (doi:10.1016/j.adhoc.2016.11.008)
Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:10.1016/j.cose.2019.101593)
Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:10.1016/j.cosrev.2019.100199)
Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:10.1016/j.future.2018.01.029)
Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)
cyber threats spreading
Brett, Terry, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID: https://orcid.org/0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:10.1103/PhysRevE.99.050303)
cyber-physical
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
cyber-physical attacks
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:10.1016/j.adhoc.2018.10.002)
Odeleye, Blessing, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Spyridonis, Fotios (2022) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers and Security, 124:102951. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102951)
cyber-physical security
Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913
Bezemskij, Anatolij, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:10.1016/j.adhoc.2018.10.002)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)
cyber-physical systems
Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913
Bhatia, Laksh, Tomić, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:10.1145/3274783.3275183)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:10.1109/Cybermatics_2018.2018.00138)
cyberattack
Serpanos, Dimitrios ORCID: https://orcid.org/0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:10.1109/MDAT.2018.2816943)
cybercrime
Lawal, Damola (2023) Are we preparing our students for real-world digital forensics? [Video]
cybersecurity
Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:10.1016/j.segan.2021.100553)
Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:10.1007/978-3-030-41103-9_11)
Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:10.3390/s20185305)
Scott, Emma, Panda, Sakshyam, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:10.1109/DSC54232.2022.9888829)
Tsiodra, Maria, Panda, Sakshyam ORCID: https://orcid.org/0000-0001-7274-0073, Chronopoulos, Michail and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2023.3272670)
Cybersecurity breach victims
Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:10.2196/24879)
data access
Sani, Abubakar Sadiq, Bertino, Elisa, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Computers & Security, 115:102610. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102610)
data generation
Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:10.1109/ISCC50000.2020.9219712)
data integrity assessment and control
Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:10.1109/ISGT49243.2021.9372235)
Data Security
He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2906290)
decentralized control
Fu, Anqi, Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)
decision support
Jaddoa, Ali, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:10.1016/j.simpat.2019.102019)
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:10.1109/TIFS.2021.3054966)
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:10.3390/s21165300)
decision support systems
Fielder, Andrew, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Malacaria, Pasquale, Hankin, Chris and Smeraldi, Fabrizio (2016) Decision support approaches for cyber security investment. Decision Support Systems, 86. pp. 13-23. ISSN 0167-9236 (doi:10.1016/j.dss.2016.02.012)
decision-making
Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:10.1007/978-981-4585-87-3_48-1)
Deep learning
Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Patrikakis, Charalampos and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:10.1016/j.asoc.2021.107413)
design methodology
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
Detection latency
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)
Digital artifacts
Bayley, Fletcher and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975
Digital deception
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:10.1109/MITP.2020.2980090)
Digital evidence
Bayley, Fletcher and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975
digital evidence credibility
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)
Digital forensics
Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)
Gresty, David W., Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:10.1109/TIFS.2021.3054966)
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Mylonas, Alexios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:10.1016/j.fsidi.2022.301480)
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:10.3390/s21165300)
digital twin
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 (2023) Challenges in modelling applications for safe and resilient digital twins. In: 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus. 26-29 Sept 2022. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-6. ISBN 978-1665485616; 978-1665485623 ISSN 2687-8860 (Print), 2687-8852 (Online) (doi:10.1109/ISC255366.2022.9921921)
discrete log
Zhao, Yi, Liang, Kaitai, Zhao, Yanqi, Yang, Bo, Ming, Yang and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Practical algorithm substitution attack on extractable signatures. Designs, Codes and Cryptography, 90. pp. 921-937. ISSN 0925-1022 (Print), 1573-7586 (Online) (doi:10.1007/s10623-022-01019-1)
distributed control
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:10.1109/CONTROL.2016.7737530)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:10.1016/j.ifacol.2016.07.500)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:10.1109/CONTROL.2016.7737541)
Distributed Energy Resource (DER)
Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:10.1016/j.segan.2021.100553)
Distributed Ledger Technology (DLT)
Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:10.1016/j.segan.2021.100553)
double trusted third parties
Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2952213)
economics
Chronopoulos, Michail, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Grossklags, Jens (2017) An options approach to cybersecurity investment. IEEE Access, 6. pp. 12175-12186. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2773366)
edge computing
Jaddoa, Ali, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:10.1016/j.simpat.2019.102019)
Edge-disjoint multipath
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:10.1145/2914792)
EdgeCloudSim Simulator
Jaddoa, Ali, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:10.1016/j.simpat.2019.102019)
emergency response
Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)
Emotions
Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:10.2196/24879)
encryption
Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2020.2996940)
Encryption Switching
He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2906290)
Energy efficiency
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)
Energy Internet
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2020.2971707)
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:10.1109/TIFS.2019.2892005)
Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:10.1016/j.future.2018.01.029)
Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:10.1007/978-981-4585-87-3_48-1)
Entropy
Hossain, A. K. M. Mahtab and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:10.1145/3360774.3360791)
Enumeration
Bayley, Fletcher and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975
error handling and recovery
Giovanni, Liva, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering, 47 (11). pp. 2369-2381. ISSN 0098-5589 (doi:10.1109/TSE.2019.2948351)
event-based control
Bhatia, Laksh, Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:10.1145/3418528)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:10.1049/cp.2019.0132)
event-triggered control
Fu, Anqi, Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:10.1109/CONTROL.2018.8516774)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:10.1109/Cybermatics_2018.2018.00138)
experiential learning
Gan, D. ORCID: https://orcid.org/0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:10.1109/CSCI.2017.313)
Expert Witness evidence
Chadwick, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.
extractable signatures
Zhao, Yi, Liang, Kaitai, Zhao, Yanqi, Yang, Bo, Ming, Yang and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Practical algorithm substitution attack on extractable signatures. Designs, Codes and Cryptography, 90. pp. 921-937. ISSN 0925-1022 (Print), 1573-7586 (Online) (doi:10.1007/s10623-022-01019-1)
Federated learning (FL)
Li, Yanli, Yuan, Dong, Sani, Abubakar Sadiq and Bao, Wei (2023) Enhancing Federated Learning robustness in adversarial environment through clustering Non-IID features. Computers and Security, 132:103319. pp. 1-13. ISSN 0167-4048 (doi:10.1016/j.cose.2023.103319)
file tampering attack
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)
forensic analyst
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
forensics
Coppock, Tom and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5
Forensics investigation
Bayley, Fletcher and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975
forensics tools
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
formal analysis
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 (2022) Towards practical and formal security risk analysis of IoT (Internet of Things) applications. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-4. ISBN 978-1665499965; 978-1665499972 (doi:10.1109/ETFA52439.2022.9921511)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2021) Towards scalable security of real-time applications: a formally certified approach. In: 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, 01-04. ISBN 978-1728129907; 978-1728129891 (doi:10.1109/ETFA45728.2021.9613489)
formal methods
Giovanni, Liva, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering, 47 (11). pp. 2369-2381. ISSN 0098-5589 (doi:10.1109/TSE.2019.2948351)
formation control
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:10.1109/CONTROL.2016.7737541)
frameup attack
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
fuzzy cognitive maps
Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:10.1109/ISGT49243.2021.9372235)
game theory
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:10.3390/s21165300)
Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:10.1007/978-3-030-41103-9_11)
Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:10.1016/j.cose.2019.101593)
game-theory
Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:10.1016/j.cose.2023.103328)
GAN network
Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:10.1109/ISCC50000.2020.9219712)
genetic security
Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103386)
genotype imputation
Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103386)
guidelines
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)
hardware attacks
Lawal, Damola (2023) Are we preparing our students for real-world digital forensics? [Video]
healthcare
González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:10.3390/s21165493)
HexaFind
Bayley, Fletcher and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975
histograms
Theodorakopoulos, George, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing, 19 (1). pp. 566-578. ISSN 1545-5971 (Print), 1941-0018 (Online) (doi:10.1109/TDSC.2020.2980270)
homomorphic encryption
Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103386)
honeypots
Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:10.1109/ISCC50000.2020.9219712)
Hop-count
Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:10.1007/s11276-013-0685-7)
human and societal aspects of security and privacy
Parsons, Emily Kate, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2020) How secure is home: assessing human susceptibility to IoT threats. In: PCI 2020: 24th Pan-Hellenic Conference on Informatics. ACM, pp. 64-71. ISBN 978-1450388979 (doi:10.1145/3437120.3437277)
human computer interaction
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
human user
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
human-as-a-security-sensor
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:10.1016/j.cose.2018.02.020)
Human-as-a-Sensor
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:10.1109/SERA.2017.7965754)
hybrid analysis
Xu, Guangquan, Feng, Meiqi, Jiao, Litao, Liu, Jian, Dai, Hong-Ning, Wang, Ding, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Zheng, Xi (2022) MFF-AMD: multivariate feature fusion for Android malware detection. In: CollaborateCom 2021: Networking, Applications and Worksharing 17th EAI. Virtual Event, October 16-18, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 406), 406 (ch. 10). Springer Link, Cham, pp. 368-385. ISBN 9783030926342 ; 9783030926359
I-ICAAAN
Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:10.1016/j.future.2018.01.029)
iBeacon
Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:10.1145/3109761.3109776)
identical baseline configurations
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
identical computers
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
identity management
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM41954.2020.9281929)
Identity-Based Encryption
He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2906290)
image forensics
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
Image similarity
Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Patrikakis, Charalampos and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:10.1016/j.asoc.2021.107413)
indexes
Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2020.2996940)
Indoor Localisation
Hossain, A. K. M. Mahtab and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:10.1145/3360774.3360791)
Indoor positioning system
Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:10.1016/j.comcom.2015.03.001)
industrial control
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:10.1109/WF-IoT.2016.7845510)
Industrial control system
Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM40551.2019.8973948)
Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:10.1109/ISCC50000.2020.9219712)
Industrial Cyber-Physical System (ICPS)
Khan, Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2020.3032968)
industrial internet of things
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:10.1109/ICDCS.2019.00190)
information and communication technology
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
Information cascade
Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Patrikakis, Charalampos and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:10.1016/j.asoc.2021.107413)
Kasnesis, Panagiotis, Heartfield, Ryan, Toumanidis, Lazaros, Liang, Xing, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Patrikakis, Charalampos Z. (2020) A prototype deep learning paraphrase identification service for discovering information cascades in social networks. In: IEEE International Conference on Multimedia and Expo. IEEE, pp. 1-4. ISBN 978-1728114859 (doi:10.1109/ICMEW46912.2020.9106044)
information leakage
Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:10.3390/fi7010067)
information security
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:10.1016/j.cose.2018.02.020)
Information trustworthiness
Kasnesis, Panagiotis, Heartfield, Ryan, Toumanidis, Lazaros, Liang, Xing, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Patrikakis, Charalampos Z. (2020) A prototype deep learning paraphrase identification service for discovering information cascades in social networks. In: IEEE International Conference on Multimedia and Expo. IEEE, pp. 1-4. ISBN 978-1728114859 (doi:10.1109/ICMEW46912.2020.9106044)
insulin
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:10.1109/WiMOB.2018.8589095)
integrated circuits
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
intelligent recommendation system
Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2020.3006066)
interdisciplinary physics
Brett, Terry, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID: https://orcid.org/0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:10.1103/PhysRevE.99.050303)
internet connection records
Gresty, David W., Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)
internet history
Gresty, David W., Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)
Internet history analysis
Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)
Internet of Everything
Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383
internet of things
Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:10.3390/s19235258)
Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2018.2881246)
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Bezemskij, Anatolij ORCID: https://orcid.org/0000-0002-6211-1609 and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:10.1016/j.cose.2018.07.011)
Jaddoa, Ali, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:10.1016/j.simpat.2019.102019)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:10.1016/j.adhoc.2018.10.002)
Mavropoulos, Orestis, Mouratidis, Haralambos, Fish, Andrew and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2018) Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks, 92:101743. ISSN 1570-8705 (doi:10.1016/j.adhoc.2018.08.013)
Ning, Zhenhu, Xu, Guangquan, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Wang, Hao and Liang, Kaitai (2019) TAW: cost-effective threshold authentication with weights for internet of things. IEEE Access, 7. pp. 30112-30125. ISSN 2169-3536 (Print), 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2902226)
Rahman, Md. Abdur, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:10.1145/3323873.3326924)
Internet of Things (IoT)
Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:10.2196/24879)
intrusion detection
Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913
Bezemskij, Anatolij, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)
Odeleye, Blessing, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan and Spyridonis, Fotios ORCID: https://orcid.org/0000-0003-4253-365X (2021) Detecting framerate-oriented cyber attacks on user experience in virtual reality. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. VR4Sec.
Intrusion detection system
Bezemskij, Anatolij, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)
Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:10.3390/s20185305)
IoT
Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:10.1016/j.future.2018.01.029)
IoT applications
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 (2022) Towards practical and formal security risk analysis of IoT (Internet of Things) applications. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-4. ISBN 978-1665499965; 978-1665499972 (doi:10.1109/ETFA52439.2022.9921511)
IoT offloading
Jaddoa, Ali, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:10.1016/j.simpat.2019.102019)
jamming
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:10.1109/Cybermatics_2018.2018.00138)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:10.1049/cp.2019.0132)
Java
Liva, Giovanni, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:10.1145/3193992.3193997)
key bootstrapping
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:10.1109/TIFS.2019.2892005)
key derivation
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE, Piscataway, USA. ISBN 978-1665446303 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM46819.2021.9638015)
key exchange
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2020.2971707)
Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC: Annual Computer Security Applications Conference. ACM, New York, USA, pp. 439-454. ISBN 978-1450385794 (doi:10.1145/3485832.3485920)
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)
key management
Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2019.2941586)
keyword search
Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2020.2996940)
knapsack
Tsiodra, Maria, Panda, Sakshyam ORCID: https://orcid.org/0000-0001-7274-0073, Chronopoulos, Michail and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2023.3272670)
legal counsel
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
linear
Coppock, Tom and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5
linear quadratic regulator
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:10.1016/j.ifacol.2016.07.500)
Linux
Bayley, Fletcher and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975
LOADng
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:10.1145/2914792)
Localization
Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:10.1016/j.comcom.2015.03.001)
Localization algorithm
Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:10.1007/s11276-013-0685-7)
Location fingerprint
Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:10.1016/j.comcom.2015.03.001)
Location Fingerprinting
Hossain, A. K. M. Mahtab and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:10.1145/3360774.3360791)
location privacy
Theodorakopoulos, George, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing, 19 (1). pp. 566-578. ISSN 1545-5971 (Print), 1941-0018 (Online) (doi:10.1109/TDSC.2020.2980270)
LoRaWAN
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:10.1109/CONTROL.2018.8516774)
Low-Power Wide-Area Networks
Bhatia, Laksh, Tomić, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:10.1145/3274783.3275183)
low-speed experimental UAVs
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:10.1109/CONTROL.2016.7737541)
LPWA networks
Bhatia, Laksh, Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:10.1145/3418528)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:10.1109/CONTROL.2018.8516774)
LQR
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:10.1109/CONTROL.2016.7737530)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:10.1109/CONTROL.2016.7737541)
MAC protocol
Bhatia, Laksh, Tomić, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:10.1145/3274783.3275183)
Mac OS X
Coppock, Tom and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5
mach-o
Coppock, Tom and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5
Machine Learning
Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:10.1145/3109761.3109776)
Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:10.3390/s20185305)
machine-to-machine
Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2019.2941586)
magnetically driven flow
Bojarevics, V. ORCID: https://orcid.org/0000-0002-7326-7748, Pericleous, K. ORCID: https://orcid.org/0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)
Malicious Spoofing Attacks
Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:10.1145/3109761.3109776)
malware detection
Xu, Guangquan, Feng, Meiqi, Jiao, Litao, Liu, Jian, Dai, Hong-Ning, Wang, Ding, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Zheng, Xi (2022) MFF-AMD: multivariate feature fusion for Android malware detection. In: CollaborateCom 2021: Networking, Applications and Worksharing 17th EAI. Virtual Event, October 16-18, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 406), 406 (ch. 10). Springer Link, Cham, pp. 368-385. ISBN 9783030926342 ; 9783030926359
management
González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:10.3390/s21165493)
mathematical analysis
Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:10.1145/3538969.3544420)
mathematics of computing
Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:10.1145/3538969.3544420)
Measurement
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:10.1109/DCOSS.2014.43)
medical technologies
Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:10.3390/s19235258)
Mental health
Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:10.2196/24879)
microgrid
Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2019.2941586)
miscarriage of justice
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
misinformation
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:10.1109/MITP.2020.2980090)
Mobile Edge Computing
Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2018.2881246)
modbus
Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:10.3390/s20185305)
model validation
Taimoor, Najma and Rehman, Semeen (2022) Towards Multi-Level Modelling and Monitoring of Real-time Personalised Health Conditions. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, pp. 1-8. ISBN 9781665499972 (doi:10.1109/ETFA52439.2022.9921687)
modeling
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 (2023) Challenges in modelling applications for safe and resilient digital twins. In: 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus. 26-29 Sept 2022. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-6. ISBN 978-1665485616; 978-1665485623 ISSN 2687-8860 (Print), 2687-8852 (Online) (doi:10.1109/ISC255366.2022.9921921)
monitoring
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:10.1109/WiMOB.2018.8589095)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:10.1109/WF-IoT.2016.7845510)
multi-agent system design
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:10.1109/CONTROL.2016.7737530)
multi-agent systems
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:10.1016/j.ifacol.2016.07.500)
multi-level modelling
Taimoor, Najma and Rehman, Semeen (2023) On the Validation of Multi-Level Personalised Health Condition Model. In: 2022 25th Euromicro Conference on Digital System Design (DSD). IEEE, pp. 599-606. ISBN 9781665474054 ISSN 2639-3859 (Print), 2771-2508 (Online) (doi:10.1109/DSD57027.2022.00086)
Taimoor, Najma and Rehman, Semeen (2022) Towards Multi-Level Modelling and Monitoring of Real-time Personalised Health Conditions. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, pp. 1-8. ISBN 9781665499972 (doi:10.1109/ETFA52439.2022.9921687)
multi-stage attacks
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:10.1109/TIFS.2021.3054966)
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Mylonas, Alexios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:10.1016/j.fsidi.2022.301480)
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:10.3390/s21165300)
multivariate feature fusion
Xu, Guangquan, Feng, Meiqi, Jiao, Litao, Liu, Jian, Dai, Hong-Ning, Wang, Ding, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Zheng, Xi (2022) MFF-AMD: multivariate feature fusion for Android malware detection. In: CollaborateCom 2021: Networking, Applications and Worksharing 17th EAI. Virtual Event, October 16-18, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 406), 406 (ch. 10). Springer Link, Cham, pp. 368-385. ISBN 9783030926342 ; 9783030926359
mutual authentication
Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:10.1109/ISGT49243.2021.9372211)
mutual authentication and key derivation
Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC: Annual Computer Security Applications Conference. ACM, New York, USA, pp. 439-454. ISBN 978-1450385794 (doi:10.1145/3485832.3485920)
Neighbour disjoint multipath (NDM)
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:10.1145/2914792)
Network
Bayley, Fletcher and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975
network layer attacks
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:10.1109/JIOT.2017.2749883)
Network topology
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:10.1109/DCOSS.2014.43)
network visualization
Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103350)
networks
Brett, Terry, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID: https://orcid.org/0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:10.1103/PhysRevE.99.050303)
Node-disjoint multipath
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:10.1145/2914792)
non-independent and identically distributed (Non-IID)
Li, Yanli, Yuan, Dong, Sani, Abubakar Sadiq and Bao, Wei (2023) Enhancing Federated Learning robustness in adversarial environment through clustering Non-IID features. Computers and Security, 132:103319. pp. 1-13. ISSN 0167-4048 (doi:10.1016/j.cose.2023.103319)
nonlinear dynamics
Brett, Terry, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID: https://orcid.org/0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:10.1103/PhysRevE.99.050303)
O.MG Cable
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)
Occupancy Detection
Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:10.1145/3109761.3109776)
operational research
Tsiodra, Maria, Panda, Sakshyam ORCID: https://orcid.org/0000-0001-7274-0073, Chronopoulos, Michail and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2023.3272670)
Operational Technology
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)
optimisation
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:10.3390/s21165300)
optimization
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:10.1109/TIFS.2021.3054966)
Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:10.1007/978-3-030-41103-9_11)
Theodorakopoulos, George, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing, 19 (1). pp. 566-578. ISSN 1545-5971 (Print), 1941-0018 (Online) (doi:10.1109/TDSC.2020.2980270)
Optimized link state routing (OLSR)
Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:10.1007/s11276-013-0685-7)
Participatory Sensing
Hossain, A. K. M. Mahtab and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:10.1145/3360774.3360791)
Pattern of life
Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)
PBL
Gan, D. ORCID: https://orcid.org/0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:10.1109/CSCI.2017.313)
Peer Assisted Learning
Chadwick, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.
peer-assessment
Chadwick, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.
peer-group learning
Gan, D. ORCID: https://orcid.org/0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:10.1109/CSCI.2017.313)
performance cost
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:10.1016/j.ifacol.2016.07.500)
personalised healthcare
Taimoor, Najma and Rehman, Semeen (2023) On the Validation of Multi-Level Personalised Health Condition Model. In: 2022 25th Euromicro Conference on Digital System Design (DSD). IEEE, pp. 599-606. ISBN 9781665474054 ISSN 2639-3859 (Print), 2771-2508 (Online) (doi:10.1109/DSD57027.2022.00086)
Taimoor, Najma and Rehman, Semeen (2021) Reliable and resilient AI and IoT-based personalised healthcare services: A survey. IEEE Access, 10. pp. 535-563. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2021.3137364)
Personality
Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:10.2196/24879)
phishing
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:10.1145/2835375)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:10.1109/MITP.2020.2980090)
Positioning system
Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:10.1007/s11276-013-0685-7)
power systems
Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:10.1016/j.segan.2021.100553)
privacy
Sani, Abubakar Sadiq, Bertino, Elisa, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Computers & Security, 115:102610. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102610)
Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:10.1109/ISGT49243.2021.9372211)
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:10.1109/ICDCS.2019.00190)
privacy computing
Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103386)
privacy taxonomy
Odeleye, Blessing, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Spyridonis, Fotios (2022) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers and Security, 124:102951. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102951)
privacy-preserving
Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103386)
probabilistic computation
Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:10.1145/3538969.3544420)
Problem-based Learning
Chadwick, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.
process control
Serpanos, Dimitrios ORCID: https://orcid.org/0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:10.1109/MDAT.2018.2816943)
program verification
Liva, Giovanni ORCID: https://orcid.org/0000-0002-9337-5762, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:10.1007/s10664-019-09699-5)
programmable USB
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)
programmable USB device
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
prototypes
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:10.1109/WF-IoT.2016.7845510)
Proximity based localization
Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:10.1007/s11276-013-0685-7)
psychology
Budimir, S., Fontaine, J., Huijts, N., Haans, A., Loukas, G. ORCID: https://orcid.org/0000-0003-3559-5182, Ras, I. and Roesch, E. (2020) Emotions, personality, and psychopathology of cybersecurity breach victims. Journal of Psychosomatic Research, 133:110059. ISSN 0022-3999 (Print), 1879-1360 (Online) (doi:10.1016/j.jpsychores.2020.110059)
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:10.1016/j.cose.2018.07.011)
RAM Dump
Coppock, Tom and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5
real-time security
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2021) Towards scalable security of real-time applications: a formally certified approach. In: 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, 01-04. ISBN 978-1728129907; 978-1728129891 (doi:10.1109/ETFA45728.2021.9613489)
real-time systems
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:10.1109/WF-IoT.2016.7845510)
reinforcement learning
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Bezemskij, Anatolij ORCID: https://orcid.org/0000-0002-6211-1609 and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)
relay resilience
Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC: Annual Computer Security Applications Conference. ACM, New York, USA, pp. 439-454. ISBN 978-1450385794 (doi:10.1145/3485832.3485920)
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE, Piscataway, USA. ISBN 978-1665446303 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM46819.2021.9638015)
reliable healthcare
Taimoor, Najma and Rehman, Semeen (2021) Reliable and resilient AI and IoT-based personalised healthcare services: A survey. IEEE Access, 10. pp. 535-563. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2021.3137364)
rescue robots
Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)
Resilience
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:10.1109/DCOSS.2014.43)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 (2023) Challenges in modelling applications for safe and resilient digital twins. In: 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus. 26-29 Sept 2022. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-6. ISBN 978-1665485616; 978-1665485623 ISSN 2687-8860 (Print), 2687-8852 (Online) (doi:10.1109/ISC255366.2022.9921921)
review
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Mylonas, Alexios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:10.1016/j.fsidi.2022.301480)
risk assessment
Scott, Emma, Panda, Sakshyam, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:10.1109/DSC54232.2022.9888829)
risk-based security assessment
Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM40551.2019.8973948)
robotic vehicles
Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913
Bezemskij, Anatolij, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)
robustness
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:10.1016/j.ifacol.2016.07.500)
RPL
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:10.1145/2914792)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:10.1109/JIOT.2017.2749883)
Rubber Ducky
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)
run-time monitoring
Khan, Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2020.3032968)
runtime
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
Liva, Giovanni, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:10.1145/3193992.3193997)
safe and secure healthcare
Taimoor, Najma and Rehman, Semeen (2023) On the Validation of Multi-Level Personalised Health Condition Model. In: 2022 25th Euromicro Conference on Digital System Design (DSD). IEEE, pp. 599-606. ISBN 9781665474054 ISSN 2639-3859 (Print), 2771-2508 (Online) (doi:10.1109/DSD57027.2022.00086)
Taimoor, Najma and Rehman, Semeen (2022) Towards Multi-Level Modelling and Monitoring of Real-time Personalised Health Conditions. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, pp. 1-8. ISBN 9781665499972 (doi:10.1109/ETFA52439.2022.9921687)
safety
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:10.1109/WiMOB.2018.8589095)
Mohsin, Ali, Aurangzeb, Sana, Aleem, Muhammad and Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 (2022) On the performance and scalability of simulators for improving security and safety of smart cities. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-8. ISBN 978-1665499965; 978-1665499972 (doi:10.1109/ETFA52439.2022.9921600)
Serpanos, Dimitrios ORCID: https://orcid.org/0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:10.1109/MDAT.2018.2816943)
SCADA
Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:10.3390/s20185305)
Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:10.1109/ISCC50000.2020.9219712)
secure and safe healthcare
Taimoor, Najma and Rehman, Semeen (2021) Reliable and resilient AI and IoT-based personalised healthcare services: A survey. IEEE Access, 10. pp. 535-563. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2021.3137364)
secure communication
Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:10.1109/ISGT49243.2021.9372211)
Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:10.1016/j.future.2018.01.029)
Secure therapy
Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2018.2881246)
security
Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:10.3390/s19235258)
Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2019.2941586)
Chronopoulos, Michail, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Grossklags, Jens (2017) An options approach to cybersecurity investment. IEEE Access, 6. pp. 12175-12186. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2773366)
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:10.1145/2835375)
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:10.1016/j.cose.2018.07.011)
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:10.1109/WiMOB.2018.8589095)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:10.1109/WF-IoT.2016.7845510)
Khan, Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2020.3032968)
Mohsin, Ali, Aurangzeb, Sana, Aleem, Muhammad and Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 (2022) On the performance and scalability of simulators for improving security and safety of smart cities. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-8. ISBN 978-1665499965; 978-1665499972 (doi:10.1109/ETFA52439.2022.9921600)
Sani, Abubakar Sadiq, Bertino, Elisa, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Computers & Security, 115:102610. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102610)
Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:10.1109/ISGT49243.2021.9372211)
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2020.2971707)
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:10.1109/TIFS.2019.2892005)
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:10.1109/ICDCS.2019.00190)
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:10.1109/Cybermatics_2018.2018.00138)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:10.1049/cp.2019.0132)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:10.1145/3286978.3287029)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:10.1109/JIOT.2017.2749883)
security and privacy
Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:10.1145/3538969.3544420)
Parsons, Emily Kate, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2020) How secure is home: assessing human susceptibility to IoT threats. In: PCI 2020: 24th Pan-Hellenic Conference on Informatics. ACM, pp. 64-71. ISBN 978-1450388979 (doi:10.1145/3437120.3437277)
security and safety
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 (2023) Challenges in modelling applications for safe and resilient digital twins. In: 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus. 26-29 Sept 2022. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-6. ISBN 978-1665485616; 978-1665485623 ISSN 2687-8860 (Print), 2687-8852 (Online) (doi:10.1109/ISC255366.2022.9921921)
Security economics
Farao, Aristeidis, Panda, Sakshyam, Menesidou, Sofia Anna, Veliou, Entso, Episkopos, Nikolaos, Kalatzantonakis, George, Mohammadi, Farnaz, Georgopoulos, Nikolaos, Sirivianos, Michael, Salamanos, Nikos, Loizou, Spyros, Pingos, Michalis, Polley, John, Fielder, Andrew, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2020) SECONDO: A platform for cybersecurity investments and cyber insurance decisions. In: Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min and Khalil, Ismail, (eds.) Trust, Privacy and Security in Digital Business: Proceedings of the 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020. Lecture Notes in Computer Science book series (LNCS) (12395). Springer Nature, Cham, Switzerland, pp. 65-74. ISBN 978-3030589851 (doi:10.1007/978-3-030-58986-8_5)
Fielder, Andrew, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Malacaria, Pasquale, Hankin, Chris and Smeraldi, Fabrizio (2016) Decision support approaches for cyber security investment. Decision Support Systems, 86. pp. 13-23. ISSN 0167-9236 (doi:10.1016/j.dss.2016.02.012)
Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Karapistoli, Eirini, Elsemary, Hadeep, Alpcan, Tansu, Khuzani, MHR and Economides, Anastasios A. (2016) Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks, 56. pp. 28-42. ISSN 1570-8705 (doi:10.1016/j.adhoc.2016.11.008)
security protocols
Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM40551.2019.8973948)
self-healing
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:10.1145/3286978.3287029)
Semantic attacks
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:10.1109/SERA.2017.7965754)
Semantic attacks
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)
Semantic social engineering
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:10.1145/2835375)
Semantic textual similarity
Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Patrikakis, Charalampos and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:10.1016/j.asoc.2021.107413)
semantics
Liva, Giovanni, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:10.1145/3193992.3193997)
sensors
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:10.1109/WiMOB.2018.8589095)
Session-to-session analysis
Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)
Gresty, David W., Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)
set covering
Tsiodra, Maria, Panda, Sakshyam ORCID: https://orcid.org/0000-0001-7274-0073, Chronopoulos, Michail and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2023.3272670)
Shared economy
Rahman, Md. Abdur, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:10.1145/3323873.3326924)
simulated learning
Gan, D. ORCID: https://orcid.org/0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:10.1109/CSCI.2017.313)
Site-survey-free
Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:10.1016/j.comcom.2015.03.001)
situational awareness
Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:10.1007/978-981-4585-87-3_48-1)
smart cities
Mohsin, Ali, Aurangzeb, Sana, Aleem, Muhammad and Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 (2022) On the performance and scalability of simulators for improving security and safety of smart cities. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-8. ISBN 978-1665499965; 978-1665499972 (doi:10.1109/ETFA52439.2022.9921600)
smart communities
Sani, Abubakar Sadiq, Bertino, Elisa, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Computers & Security, 115:102610. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102610)
smart contracts
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM41954.2020.9281929)
smart grid
Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:10.1016/j.segan.2021.100553)
Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:10.3390/s20185305)
Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:10.1109/ISGT49243.2021.9372211)
Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:10.1109/ISGT49243.2021.9372235)
smart grids
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM41954.2020.9281929)
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE, Piscataway, USA. ISBN 978-1665446303 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM46819.2021.9638015)
Smart homes
Budimir, S., Fontaine, J., Huijts, N., Haans, A., Loukas, G. ORCID: https://orcid.org/0000-0003-3559-5182, Ras, I. and Roesch, E. (2020) Emotions, personality, and psychopathology of cybersecurity breach victims. Journal of Psychosomatic Research, 133:110059. ISSN 0022-3999 (Print), 1879-1360 (Online) (doi:10.1016/j.jpsychores.2020.110059)
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Bezemskij, Anatolij ORCID: https://orcid.org/0000-0002-6211-1609 and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)
smart vehicles
Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC: Annual Computer Security Applications Conference. ACM, New York, USA, pp. 439-454. ISBN 978-1450385794 (doi:10.1145/3485832.3485920)
smart-home
Scott, Emma, Panda, Sakshyam, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:10.1109/DSC54232.2022.9888829)
Social Engineering
Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)
Heartfield, Ryan, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:10.1109/SERA.2017.7965754)
Social media
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)
Social networks
Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:10.3390/fi7010067)
Heartfield, Ryan and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)
software
Liva, Giovanni, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:10.1145/3193992.3193997)
software weaknesses
Tsiodra, Maria, Panda, Sakshyam ORCID: https://orcid.org/0000-0001-7274-0073, Chronopoulos, Michail and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2023.3272670)
software/program verification
Giovanni, Liva, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering, 47 (11). pp. 2369-2381. ISSN 0098-5589 (doi:10.1109/TSE.2019.2948351)
solidification
Bojarevics, V. ORCID: https://orcid.org/0000-0002-7326-7748, Pericleous, K. ORCID: https://orcid.org/0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)
sparse decision making
Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2020.3006066)
stalking
Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:10.3390/fi7010067)
Standard Model
He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2906290)
standards
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)
stealthy intrusion
Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:10.1016/j.cose.2023.103328)
STEM teaching
Chadwick, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.
sugar
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:10.1109/WiMOB.2018.8589095)
supply chain attacks
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM41954.2020.9281929)
survey
Nisioti, Antonia, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Mylonas, Alexios and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:10.1016/j.fsidi.2022.301480)
systems
Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)
Taxonomy
Breza, Michael, Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie (2018) Failures from the Environment, a Report on the First FAILSAFE workshop. ACM SIGCOMM Computer Communication Review, 48 (2). pp. 40-45. ISSN 0146-4833 (doi:10.1145/3213232.3213238)
teaching digital forensics
Lawal, Damola (2023) Are we preparing our students for real-world digital forensics? [Video]
theory of computation
Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:10.1145/3538969.3544420)
threats
Scott, Emma, Panda, Sakshyam, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:10.1109/DSC54232.2022.9888829)
time semantics
Liva, Giovanni ORCID: https://orcid.org/0000-0002-9337-5762, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:10.1007/s10664-019-09699-5)
time-based zero knowledge proof of knowledge
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:10.1109/ICDCS.2019.00190)
Time-varying networks
Brett, Terry, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID: https://orcid.org/0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:10.1103/PhysRevE.99.050303)
timed automata
Liva, Giovanni ORCID: https://orcid.org/0000-0002-9337-5762, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:10.1007/s10664-019-09699-5)
tools
Liva, Giovanni, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:10.1145/3193992.3193997)
training and awareness
Panda, Sakshyam, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:10.1007/978-3-030-41103-9_11)
trapdoor commitment scheme
Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2952213)
trust
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:10.1145/3286978.3287029)
trusted platform module
Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:10.1016/j.jisa.2022.103350)
tutorials
Serpanos, Dimitrios ORCID: https://orcid.org/0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: https://orcid.org/0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:10.1109/MDAT.2018.2816943)
TV
Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2020.2996940)
two-way trust recommendation
Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2020.3006066)
UAVs
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:10.1109/CONTROL.2016.7737530)
universal composability
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2020.2971707)
Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:10.1109/TIFS.2019.2892005)
Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC: Annual Computer Security Applications Conference. ACM, New York, USA, pp. 439-454. ISBN 978-1450385794 (doi:10.1145/3485832.3485920)
Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE, Piscataway, USA. ISBN 978-1665446303 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:10.1109/PESGM46819.2021.9638015)
UNIX
Bayley, Fletcher and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975
untargeted model attack
Li, Yanli, Yuan, Dong, Sani, Abubakar Sadiq and Bao, Wei (2023) Enhancing Federated Learning robustness in adversarial environment through clustering Non-IID features. Computers and Security, 132:103319. pp. 1-13. ISSN 0167-4048 (doi:10.1016/j.cose.2023.103319)
vehicles
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:10.1016/j.adhoc.2018.10.002)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)
vehicular security
Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913
Bezemskij, Anatolij, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)
Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:10.1016/j.simpat.2016.08.005)
Virtual Reality
Odeleye, Blessing, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan, Sakellari, Georgia ORCID: https://orcid.org/0000-0001-7238-8700, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Spyridonis, Fotios (2022) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers and Security, 124:102951. ISSN 0167-4048 (doi:10.1016/j.cose.2022.102951)
Odeleye, Blessing, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182, Heartfield, Ryan and Spyridonis, Fotios ORCID: https://orcid.org/0000-0003-4253-365X (2021) Detecting framerate-oriented cyber attacks on user experience in virtual reality. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. VR4Sec.
Volafox
Coppock, Tom and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5
VolaGUI
Coppock, Tom and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5
weight distribution
Xu, Guangquan, Feng, Meiqi, Jiao, Litao, Liu, Jian, Dai, Hong-Ning, Wang, Ding, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062 and Zheng, Xi (2022) MFF-AMD: multivariate feature fusion for Android malware detection. In: CollaborateCom 2021: Networking, Applications and Worksharing 17th EAI. Virtual Event, October 16-18, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 406), 406 (ch. 10). Springer Link, Cham, pp. 368-385. ISBN 9783030926342 ; 9783030926359
Wi-Fi
Hossain, A. K. M. Mahtab and Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:10.1145/3360774.3360791)
wide area systems
Bhatia, Laksh, Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:10.1145/3418528)
wireless networked control systems
Fu, Anqi, Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:10.1109/CONTROL.2018.8516774)
wireless sensor and actuator networks
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:10.1109/CONTROL.2018.8516774)
Wireless sensor networks
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:10.1145/2914792)
Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:10.1109/DCOSS.2014.43)
Li, Xiaoming, Xu, Guangquan, Zheng, Xi, Liang, Kaitai, Panaousis, Emmanouil ORCID: https://orcid.org/0000-0001-7306-4062, Li, Tao, Wang, Wei and Shen, Chao (2019) Using sparse representation to detect anomalies in complex WSNs. ACM Transactions on Intelligent Systems and Technology, 10 (6):64. ISSN 2157-6904 (Print), 2157-6912 (Online) (doi:10.1145/3331147)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:10.1145/3286978.3287029)
wireless sensor/actuator networks
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:10.1109/Cybermatics_2018.2018.00138)
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:10.1049/cp.2019.0132)
wireless sensors and actuators
Bhatia, Laksh, Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980, Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:10.1145/3418528)
World wide web
Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)
wsn
Tomic, Ivana ORCID: https://orcid.org/0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:10.1109/JIOT.2017.2749883)