Skip navigation

Items where Faculty / School / Research Centre / Research Groups is "Internet of Things and Security Research Centre (ISEC)"

Items where Faculty / School / Research Centre / Research Groups is "Internet of Things and Security Research Centre (ISEC)"

Up a level
Export as [feed] RSS
Group by: Date | Creators | Item Type | Uncontrolled Keywords | No Grouping
abuse-freeness Ad-hoc networks additive particle tracking Advanced metering infrastructure (AMI) advanced persistent threats adversarial machine learning Adversarial Models AI enabled IoT systems Algorithm design and analysis algorithm substitution attack alloy microstructure Anomaly detection anti-forensics arbitrary collection artificial intelligence Artificial Intelligence (AI) assessment asset discovery asynchronous sampling ATT&CK attack graph attack tree attacker-defender games Attribute-Based Encryption authenticated encryption authentication authorization autoencoder network autonomous systems bayesian game Bayesian network Behaviour-based Big data biomedical monitoring Blockchain Bluetooth Low Energy Byzantine-robust aggregation calculus Calibration-free cCyber security CIS control cloud computing collaborative filtering collaborative learning communication communication and application layer attacks communication protocols community detection computation offloading computational modeling Computational offloading computer bugs computer crime computer hacking computer security Context analysis contract-signing protocol control optimisation control systems cooja cooperative control Correlation CPA Security cps Cross-disciplinary collaboration Crowdsourcing cryptography Cyber attacks Cyber crime cyber enabled fraud cyber forensics cyber fraud cyber hygiene healthcare Cyber insurance cyber physical system cyber physical systems cyber risk Cyber Security cyber threats spreading cyber-physical cyber-physical attacks cyber-physical security cyber-physical systems cyberattack cybercrime cybersecurity Cybersecurity breach victims data access data generation data integrity assessment and control Data Security decentralized control decision support decision support systems decision-making Deep learning design methodology Detection latency Digital artifacts Digital deception Digital evidence digital evidence credibility Digital forensics digital twin discrete log distributed control Distributed Energy Resource (DER) Distributed Ledger Technology (DLT) double trusted third parties economics edge computing Edge-disjoint multipath EdgeCloudSim Simulator emergency response Emotions encryption Encryption Switching Energy efficiency Energy Internet Entropy Enumeration error handling and recovery event-based control event-triggered control experiential learning Expert Witness evidence extractable signatures Federated learning (FL) file tampering attack forensic analyst forensics Forensics investigation forensics tools formal analysis formal methods formation control frameup attack fuzzy cognitive maps game theory game-theory GAN network genetic security genotype imputation guidelines hardware attacks healthcare HexaFind histograms homomorphic encryption honeypots Hop-count human and societal aspects of security and privacy human computer interaction human user human-as-a-security-sensor Human-as-a-Sensor hybrid analysis I-ICAAAN iBeacon identical baseline configurations identical computers identity management Identity-Based Encryption image forensics Image similarity indexes Indoor Localisation Indoor positioning system industrial control Industrial control system Industrial Cyber-Physical System (ICPS) industrial internet of things information and communication technology Information cascade information leakage information security Information trustworthiness insulin integrated circuits intelligent recommendation system interdisciplinary physics internet connection records internet history Internet history analysis Internet of Everything internet of things Internet of Things (IoT) intrusion detection Intrusion detection system IoT IoT applications IoT offloading jamming Java key bootstrapping key derivation key exchange key management keyword search knapsack legal counsel linear linear quadratic regulator Linux LOADng Localization Localization algorithm Location fingerprint Location Fingerprinting location privacy LoRaWAN Low-Power Wide-Area Networks low-speed experimental UAVs LPWA networks LQR MAC protocol Mac OS X mach-o Machine Learning machine-to-machine magnetically driven flow Malicious Spoofing Attacks malware detection management mathematical analysis mathematics of computing Measurement medical technologies Mental health microgrid miscarriage of justice misinformation Mobile Edge Computing modbus model validation modeling monitoring multi-agent system design multi-agent systems multi-level modelling multi-stage attacks multivariate feature fusion mutual authentication mutual authentication and key derivation Neighbour disjoint multipath (NDM) Network network layer attacks Network topology network visualization networks Node-disjoint multipath non-independent and identically distributed (Non-IID) nonlinear dynamics O.MG Cable Occupancy Detection operational research Operational Technology optimisation optimization Optimized link state routing (OLSR) Participatory Sensing Pattern of life PBL Peer Assisted Learning peer-assessment peer-group learning performance cost personalised healthcare Personality phishing Positioning system power systems privacy privacy computing privacy taxonomy privacy-preserving probabilistic computation Problem-based Learning process control program verification programmable USB programmable USB device prototypes Proximity based localization psychology RAM Dump real-time security real-time systems reinforcement learning relay resilience reliable healthcare rescue robots Resilience review risk assessment risk-based security assessment robotic vehicles robustness RPL Rubber Ducky run-time monitoring runtime safe and secure healthcare safety SCADA secure and safe healthcare secure communication Secure therapy security security and privacy security and safety Security economics security protocols self-healing Semantic attacks Semantic attacks Semantic social engineering Semantic textual similarity semantics sensors Session-to-session analysis set covering Shared economy simulated learning Site-survey-free situational awareness smart cities smart communities smart contracts smart grid smart grids Smart homes smart vehicles smart-home Social Engineering Social media Social networks software software weaknesses software/program verification solidification sparse decision making stalking Standard Model standards stealthy intrusion STEM teaching sugar supply chain attacks survey systems Taxonomy teaching digital forensics theory of computation threats time semantics time-based zero knowledge proof of knowledge Time-varying networks timed automata tools training and awareness trapdoor commitment scheme trust trusted platform module tutorials TV two-way trust recommendation UAVs universal composability UNIX untargeted model attack vehicles vehicular security Virtual Reality Volafox VolaGUI weight distribution Wi-Fi wide area systems wireless networked control systems wireless sensor and actuator networks Wireless sensor networks wireless sensor/actuator networks wireless sensors and actuators World wide web wsn
Number of items at this level: 552.

abuse-freeness

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

Ad-hoc networks

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

additive particle tracking

Bojarevics, V. ORCID: 0000-0002-7326-7748 , Pericleous, K. ORCID: 0000-0002-7426-9999 , Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

Advanced metering infrastructure (AMI)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.2971707)

advanced persistent threats

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Mylonas, Alexios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:https://doi.org/10.1016/j.fsidi.2022.301480)

Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:https://doi.org/10.1016/j.cose.2023.103328)

adversarial machine learning

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:https://doi.org/10.1016/j.cosrev.2019.100199)

Adversarial Models

Breza, Michael, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie (2018) Failures from the Environment, a Report on the First FAILSAFE workshop. ACM SIGCOMM Computer Communication Review, 48 (2). pp. 40-45. ISSN 0146-4833 (doi:https://doi.org/10.1145/3213232.3213238)

AI enabled IoT systems

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2020.3006066)

Algorithm design and analysis

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

algorithm substitution attack

Zhao, Yi, Liang, Kaitai, Zhao, Yanqi, Yang, Bo, Ming, Yang and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Practical algorithm substitution attack on extractable signatures. Designs, Codes and Cryptography, 90. pp. 921-937. ISSN 0925-1022 (Print), 1573-7586 (Online) (doi:https://doi.org/10.1007/s10623-022-01019-1)

alloy microstructure

Bojarevics, V. ORCID: 0000-0002-7326-7748 , Pericleous, K. ORCID: 0000-0002-7426-9999 , Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

Anomaly detection

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182 , Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Li, Xiaoming, Xu, Guangquan, Zheng, Xi, Liang, Kaitai, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Li, Tao, Wang, Wei and Shen, Chao (2019) Using sparse representation to detect anomalies in complex WSNs. ACM Transactions on Intelligent Systems and Technology, 10 (6):64. ISSN 2157-6904 (Print), 2157-6912 (Online) (doi:https://doi.org/10.1145/3331147)

anti-forensics

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Mylonas, Alexios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:https://doi.org/10.1016/j.fsidi.2022.301480)

arbitrary collection

Zhao, Yi, Liang, Kaitai, Zhao, Yanqi, Yang, Bo, Ming, Yang and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Practical algorithm substitution attack on extractable signatures. Designs, Codes and Cryptography, 90. pp. 921-937. ISSN 0925-1022 (Print), 1573-7586 (Online) (doi:https://doi.org/10.1007/s10623-022-01019-1)

artificial intelligence

Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:https://doi.org/10.1016/j.jisa.2022.103350)

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:https://doi.org/10.1016/j.cosrev.2019.100199)

Artificial Intelligence (AI)

Atefi, Soodeh, Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Laszka, Aron (2023) Principled data-driven decision support for cyber-forensic investigations. In: Thirty-Seventh AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence and The MIT Press (AAAI Press), Palo Alto, California USA, pp. 5010-5017. ISBN 9781577358800 ISSN 2159-5399 (Print), 2374-3468 (Online) (doi:https://doi.org/10.1609/aaai.v37i4.25628)

assessment

González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165493)

asset discovery

Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:https://doi.org/10.1016/j.jisa.2022.103350)

asynchronous sampling

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

ATT&CK

Atefi, Soodeh, Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Laszka, Aron (2023) Principled data-driven decision support for cyber-forensic investigations. In: Thirty-Seventh AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence and The MIT Press (AAAI Press), Palo Alto, California USA, pp. 5010-5017. ISBN 9781577358800 ISSN 2159-5399 (Print), 2374-3468 (Online) (doi:https://doi.org/10.1609/aaai.v37i4.25628)

attack graph

Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:https://doi.org/10.1016/j.cose.2023.103328)

attack tree

Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:https://doi.org/10.1016/j.cose.2023.103328)

attacker-defender games

Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:https://doi.org/10.1016/j.cose.2023.103328)

Attribute-Based Encryption

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

authenticated encryption

Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372235)

authentication

Sani, Abubakar Sadiq, Bertino, Elisa, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Computers & Security, 115:102610. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2022.102610)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE, Piscataway, USA. ISBN 978-1665446303 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM46819.2021.9638015)

Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM40551.2019.8973948)

authorization

Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM40551.2019.8973948)

autoencoder network

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

autonomous systems

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

bayesian game

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

Bayesian network

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182 , Gan, Diane ORCID: 0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Behaviour-based

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182 , Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Big data

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

biomedical monitoring

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Blockchain

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: 0000-0003-3559-5182 , Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:https://doi.org/10.1016/j.segan.2021.100553)

Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George ORCID: 0000-0003-3559-5182 , Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2019.2929503)

Rahman, Md. Abdur, Loukas, George ORCID: 0000-0003-3559-5182 , Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:https://doi.org/10.1145/3323873.3326924)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:https://doi.org/10.1109/ICDCS.2019.00190)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM41954.2020.9281929)

Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372235)

Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:https://doi.org/10.1007/978-981-4585-87-3_48-1)

Bluetooth Low Energy

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: 0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

Byzantine-robust aggregation

Li, Yanli, Yuan, Dong, Sani, Abubakar Sadiq and Bao, Wei (2023) Enhancing Federated Learning robustness in adversarial environment through clustering Non-IID features. Computers and Security, 132:103319. pp. 1-13. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2023.103319)

calculus

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Calibration-free

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

cCyber security

Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:https://doi.org/10.1016/j.cose.2023.103328)

CIS control

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

cloud computing

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2996940)

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Loukas, George ORCID: 0000-0003-3559-5182 , Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

collaborative filtering

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2020.3006066)

collaborative learning

Gan, D. ORCID: 0000-0002-0920-7572 , Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

communication

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:https://doi.org/10.1109/TIFS.2019.2892005)

communication and application layer attacks

Khan, Taimoor ORCID: 0000-0002-5752-6420 and Tomic, Ivana ORCID: 0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.3032968)

communication protocols

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

community detection

Gresty, David W., Loukas, George ORCID: 0000-0003-3559-5182 , Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

computation offloading

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Loukas, George ORCID: 0000-0003-3559-5182 , Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

computational modeling

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Computational offloading

Loukas, George ORCID: 0000-0003-3559-5182 , Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

computer bugs

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

computer crime

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

computer hacking

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113 , Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

computer security

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113 , Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

Context analysis

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

contract-signing protocol

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

control optimisation

Scott, Emma, Panda, Sakshyam, Loukas, George ORCID: 0000-0003-3559-5182 and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:https://doi.org/10.1109/DSC54232.2022.9888829)

Tsiodra, Maria, Panda, Sakshyam ORCID: 0000-0001-7274-0073 , Chronopoulos, Michail and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2023.3272670)

control systems

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113 , Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

cooja

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

cooperative control

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

Correlation

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

CPA Security

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

cps

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

Cross-disciplinary collaboration

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

Crowdsourcing

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George ORCID: 0000-0003-3559-5182 , Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2019.2929503)

cryptography

Ning, Zhenhu, Xu, Guangquan, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Wang, Hao and Liang, Kaitai (2019) TAW: cost-effective threshold authentication with weights for internet of things. IEEE Access, 7. pp. 30112-30125. ISSN 2169-3536 (Print), 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2902226)

Cyber attacks

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Cyber crime

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

cyber enabled fraud

Lawal, Damola (2023) Are we preparing our students for real-world digital forensics? [Video]

cyber forensics

Atefi, Soodeh, Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Laszka, Aron (2023) Principled data-driven decision support for cyber-forensic investigations. In: Thirty-Seventh AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence and The MIT Press (AAAI Press), Palo Alto, California USA, pp. 5010-5017. ISBN 9781577358800 ISSN 2159-5399 (Print), 2374-3468 (Online) (doi:https://doi.org/10.1609/aaai.v37i4.25628)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Laszka, Aron and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:https://doi.org/10.1109/TIFS.2021.3054966)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Mylonas, Alexios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:https://doi.org/10.1016/j.fsidi.2022.301480)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

cyber fraud

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

cyber hygiene healthcare

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

Cyber insurance

Farao, Aristeidis, Panda, Sakshyam, Menesidou, Sofia Anna, Veliou, Entso, Episkopos, Nikolaos, Kalatzantonakis, George, Mohammadi, Farnaz, Georgopoulos, Nikolaos, Sirivianos, Michael, Salamanos, Nikos, Loizou, Spyros, Pingos, Michalis, Polley, John, Fielder, Andrew, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2020) SECONDO: A platform for cybersecurity investments and cyber insurance decisions. In: Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min and Khalil, Ismail, (eds.) Trust, Privacy and Security in Digital Business: Proceedings of the 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020. Lecture Notes in Computer Science book series (LNCS) (12395). Springer Nature, Cham, Switzerland, pp. 65-74. ISBN 978-3030589851 (doi:https://doi.org/10.1007/978-3-030-58986-8_5)

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2019.101593)

cyber physical system

Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:https://doi.org/10.1016/j.cose.2023.103328)

cyber physical systems

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

cyber risk

González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165493)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 (2022) Towards practical and formal security risk analysis of IoT (Internet of Things) applications. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-4. ISBN 978-1665499965; 978-1665499972 (doi:https://doi.org/10.1109/ETFA52439.2022.9921511)

Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:https://doi.org/10.1016/j.cose.2023.103328)

Cyber Security

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: 0000-0003-3559-5182 , Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

Atefi, Soodeh, Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Laszka, Aron (2023) Principled data-driven decision support for cyber-forensic investigations. In: Thirty-Seventh AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence and The MIT Press (AAAI Press), Palo Alto, California USA, pp. 5010-5017. ISBN 9781577358800 ISSN 2159-5399 (Print), 2374-3468 (Online) (doi:https://doi.org/10.1609/aaai.v37i4.25628)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182 , Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Budimir, S., Fontaine, J., Huijts, N., Haans, A., Loukas, G. ORCID: 0000-0003-3559-5182 , Ras, I. and Roesch, E. (2020) Emotions, personality, and psychopathology of cybersecurity breach victims. Journal of Psychosomatic Research, 133:110059. ISSN 0022-3999 (Print), 1879-1360 (Online) (doi:https://doi.org/10.1016/j.jpsychores.2020.110059)

Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:https://doi.org/10.1016/j.jisa.2022.103350)

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 , Bezemskij, Anatolij ORCID: 0000-0002-6211-1609 and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2021) Towards scalable security of real-time applications: a formally certified approach. In: 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, 01-04. ISBN 978-1728129907; 978-1728129891 (doi:https://doi.org/10.1109/ETFA45728.2021.9613489)

Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George ORCID: 0000-0003-3559-5182 , Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2019.2929503)

Loukas, George ORCID: 0000-0003-3559-5182 , Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Loukas, George ORCID: 0000-0003-3559-5182 , Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

Mavropoulos, Orestis, Mouratidis, Haralambos, Fish, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2018) Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks, 92:101743. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.08.013)

Odeleye, Blessing, Loukas, George ORCID: 0000-0003-3559-5182 , Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Spyridonis, Fotios (2022) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers and Security, 124:102951. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2022.102951)

Odeleye, Blessing, Loukas, George ORCID: 0000-0003-3559-5182 , Heartfield, Ryan and Spyridonis, Fotios ORCID: 0000-0003-4253-365X (2021) Detecting framerate-oriented cyber attacks on user experience in virtual reality. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. VR4Sec.

Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Karapistoli, Eirini, Elsemary, Hadeep, Alpcan, Tansu, Khuzani, MHR and Economides, Anastasios A. (2016) Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks, 56. pp. 28-42. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2016.11.008)

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2019.101593)

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:https://doi.org/10.1016/j.cosrev.2019.100199)

Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:https://doi.org/10.1016/j.future.2018.01.029)

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:https://doi.org/10.1109/PerComW.2014.6815228)

cyber threats spreading

Brett, Terry, Loukas, George ORCID: 0000-0003-3559-5182 , Moreno, Yamir and Perra, Nicola ORCID: 0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:https://doi.org/10.1103/PhysRevE.99.050303)

cyber-physical

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

cyber-physical attacks

Loukas, George ORCID: 0000-0003-3559-5182 , Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Odeleye, Blessing, Loukas, George ORCID: 0000-0003-3559-5182 , Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Spyridonis, Fotios (2022) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers and Security, 124:102951. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2022.102951)

cyber-physical security

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182 , Gan, Diane ORCID: 0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Loukas, George ORCID: 0000-0003-3559-5182 , Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Loukas, George ORCID: 0000-0003-3559-5182 , Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

cyber-physical systems

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bhatia, Laksh, Tomić, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:https://doi.org/10.1145/3274783.3275183)

Loukas, George ORCID: 0000-0003-3559-5182 , Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

cyberattack

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113 , Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

cybercrime

Lawal, Damola (2023) Are we preparing our students for real-world digital forensics? [Video]

cybersecurity

Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:https://doi.org/10.1016/j.segan.2021.100553)

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

Scott, Emma, Panda, Sakshyam, Loukas, George ORCID: 0000-0003-3559-5182 and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:https://doi.org/10.1109/DSC54232.2022.9888829)

Tsiodra, Maria, Panda, Sakshyam ORCID: 0000-0001-7274-0073 , Chronopoulos, Michail and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2023.3272670)

Cybersecurity breach victims

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: 0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:https://doi.org/10.2196/24879)

data access

Sani, Abubakar Sadiq, Bertino, Elisa, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Computers & Security, 115:102610. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2022.102610)

data generation

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

data integrity assessment and control

Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372235)

Data Security

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

decentralized control

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

decision support

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Laszka, Aron and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:https://doi.org/10.1109/TIFS.2021.3054966)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

decision support systems

Fielder, Andrew, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Malacaria, Pasquale, Hankin, Chris and Smeraldi, Fabrizio (2016) Decision support approaches for cyber security investment. Decision Support Systems, 86. pp. 13-23. ISSN 0167-9236 (doi:https://doi.org/10.1016/j.dss.2016.02.012)

decision-making

Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:https://doi.org/10.1007/978-981-4585-87-3_48-1)

Deep learning

Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Patrikakis, Charalampos and Loukas, George ORCID: 0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:https://doi.org/10.1016/j.asoc.2021.107413)

design methodology

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Detection latency

Loukas, George ORCID: 0000-0003-3559-5182 , Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Digital artifacts

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

Digital deception

Loukas, George ORCID: 0000-0003-3559-5182 , Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2020.2980090)

Digital evidence

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

digital evidence credibility

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

Digital forensics

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

Gresty, David W., Loukas, George ORCID: 0000-0003-3559-5182 , Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Laszka, Aron and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:https://doi.org/10.1109/TIFS.2021.3054966)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Mylonas, Alexios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:https://doi.org/10.1016/j.fsidi.2022.301480)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

digital twin

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 (2023) Challenges in modelling applications for safe and resilient digital twins. In: 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus. 26-29 Sept 2022. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-6. ISBN 978-1665485616; 978-1665485623 ISSN 2687-8860 (Print), 2687-8852 (Online) (doi:https://doi.org/10.1109/ISC255366.2022.9921921)

discrete log

Zhao, Yi, Liang, Kaitai, Zhao, Yanqi, Yang, Bo, Ming, Yang and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Practical algorithm substitution attack on extractable signatures. Designs, Codes and Cryptography, 90. pp. 921-937. ISSN 0925-1022 (Print), 1573-7586 (Online) (doi:https://doi.org/10.1007/s10623-022-01019-1)

distributed control

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

Distributed Energy Resource (DER)

Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:https://doi.org/10.1016/j.segan.2021.100553)

Distributed Ledger Technology (DLT)

Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:https://doi.org/10.1016/j.segan.2021.100553)

double trusted third parties

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

economics

Chronopoulos, Michail, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Grossklags, Jens (2017) An options approach to cybersecurity investment. IEEE Access, 6. pp. 12175-12186. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2773366)

edge computing

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Edge-disjoint multipath

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

EdgeCloudSim Simulator

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

emergency response

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:https://doi.org/10.1109/PerComW.2014.6815228)

Emotions

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: 0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:https://doi.org/10.2196/24879)

encryption

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2996940)

Encryption Switching

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

Energy efficiency

Loukas, George ORCID: 0000-0003-3559-5182 , Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Energy Internet

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.2971707)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:https://doi.org/10.1109/TIFS.2019.2892005)

Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:https://doi.org/10.1016/j.future.2018.01.029)

Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:https://doi.org/10.1007/978-981-4585-87-3_48-1)

Entropy

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Enumeration

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

error handling and recovery

Giovanni, Liva, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering, 47 (11). pp. 2369-2381. ISSN 0098-5589 (doi:https://doi.org/10.1109/TSE.2019.2948351)

event-based control

Bhatia, Laksh, Tomic, Ivana ORCID: 0000-0003-3502-5980 , Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:https://doi.org/10.1145/3418528)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

event-triggered control

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

experiential learning

Gan, D. ORCID: 0000-0002-0920-7572 , Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

Expert Witness evidence

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

extractable signatures

Zhao, Yi, Liang, Kaitai, Zhao, Yanqi, Yang, Bo, Ming, Yang and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Practical algorithm substitution attack on extractable signatures. Designs, Codes and Cryptography, 90. pp. 921-937. ISSN 0925-1022 (Print), 1573-7586 (Online) (doi:https://doi.org/10.1007/s10623-022-01019-1)

Federated learning (FL)

Li, Yanli, Yuan, Dong, Sani, Abubakar Sadiq and Bao, Wei (2023) Enhancing Federated Learning robustness in adversarial environment through clustering Non-IID features. Computers and Security, 132:103319. pp. 1-13. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2023.103319)

file tampering attack

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

forensic analyst

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

forensics

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Forensics investigation

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

forensics tools

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

formal analysis

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 (2022) Towards practical and formal security risk analysis of IoT (Internet of Things) applications. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-4. ISBN 978-1665499965; 978-1665499972 (doi:https://doi.org/10.1109/ETFA52439.2022.9921511)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2021) Towards scalable security of real-time applications: a formally certified approach. In: 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, 01-04. ISBN 978-1728129907; 978-1728129891 (doi:https://doi.org/10.1109/ETFA45728.2021.9613489)

formal methods

Giovanni, Liva, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering, 47 (11). pp. 2369-2381. ISSN 0098-5589 (doi:https://doi.org/10.1109/TSE.2019.2948351)

formation control

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

frameup attack

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

fuzzy cognitive maps

Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372235)

game theory

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2019.101593)

game-theory

Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:https://doi.org/10.1016/j.cose.2023.103328)

GAN network

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

genetic security

Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:https://doi.org/10.1016/j.jisa.2022.103386)

genotype imputation

Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:https://doi.org/10.1016/j.jisa.2022.103386)

guidelines

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)

hardware attacks

Lawal, Damola (2023) Are we preparing our students for real-world digital forensics? [Video]

healthcare

González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165493)

HexaFind

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

histograms

Theodorakopoulos, George, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai and Loukas, George ORCID: 0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing, 19 (1). pp. 566-578. ISSN 1545-5971 (Print), 1941-0018 (Online) (doi:https://doi.org/10.1109/TDSC.2020.2980270)

homomorphic encryption

Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:https://doi.org/10.1016/j.jisa.2022.103386)

honeypots

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

Hop-count

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

human and societal aspects of security and privacy

Parsons, Emily Kate, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2020) How secure is home: assessing human susceptibility to IoT threats. In: PCI 2020: 24th Pan-Hellenic Conference on Informatics. ACM, pp. 64-71. ISBN 978-1450388979 (doi:https://doi.org/10.1145/3437120.3437277)

human computer interaction

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

human user

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

human-as-a-security-sensor

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Human-as-a-Sensor

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

hybrid analysis

Xu, Guangquan, Feng, Meiqi, Jiao, Litao, Liu, Jian, Dai, Hong-Ning, Wang, Ding, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Zheng, Xi (2022) MFF-AMD: multivariate feature fusion for Android malware detection. In: CollaborateCom 2021: Networking, Applications and Worksharing 17th EAI. Virtual Event, October 16-18, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 406), 406 (ch. 10). Springer Link, Cham, pp. 368-385. ISBN 9783030926342 ; 9783030926359

I-ICAAAN

Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:https://doi.org/10.1016/j.future.2018.01.029)

iBeacon

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: 0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

identical baseline configurations

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

identical computers

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

identity management

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM41954.2020.9281929)

Identity-Based Encryption

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

image forensics

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

Image similarity

Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Patrikakis, Charalampos and Loukas, George ORCID: 0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:https://doi.org/10.1016/j.asoc.2021.107413)

indexes

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2996940)

Indoor Localisation

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Indoor positioning system

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

industrial control

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Industrial control system

Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM40551.2019.8973948)

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

Industrial Cyber-Physical System (ICPS)

Khan, Taimoor ORCID: 0000-0002-5752-6420 and Tomic, Ivana ORCID: 0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.3032968)

industrial internet of things

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:https://doi.org/10.1109/ICDCS.2019.00190)

information and communication technology

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Information cascade

Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Patrikakis, Charalampos and Loukas, George ORCID: 0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:https://doi.org/10.1016/j.asoc.2021.107413)

Kasnesis, Panagiotis, Heartfield, Ryan, Toumanidis, Lazaros, Liang, Xing, Loukas, George ORCID: 0000-0003-3559-5182 and Patrikakis, Charalampos Z. (2020) A prototype deep learning paraphrase identification service for discovering information cascades in social networks. In: IEEE International Conference on Multimedia and Expo. IEEE, pp. 1-4. ISBN 978-1728114859 (doi:https://doi.org/10.1109/ICMEW46912.2020.9106044)

information leakage

Gan, Diane ORCID: 0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:https://doi.org/10.3390/fi7010067)

information security

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Information trustworthiness

Kasnesis, Panagiotis, Heartfield, Ryan, Toumanidis, Lazaros, Liang, Xing, Loukas, George ORCID: 0000-0003-3559-5182 and Patrikakis, Charalampos Z. (2020) A prototype deep learning paraphrase identification service for discovering information cascades in social networks. In: IEEE International Conference on Multimedia and Expo. IEEE, pp. 1-4. ISBN 978-1728114859 (doi:https://doi.org/10.1109/ICMEW46912.2020.9106044)

insulin

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

integrated circuits

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

intelligent recommendation system

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2020.3006066)

interdisciplinary physics

Brett, Terry, Loukas, George ORCID: 0000-0003-3559-5182 , Moreno, Yamir and Perra, Nicola ORCID: 0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:https://doi.org/10.1103/PhysRevE.99.050303)

internet connection records

Gresty, David W., Loukas, George ORCID: 0000-0003-3559-5182 , Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

internet history

Gresty, David W., Loukas, George ORCID: 0000-0003-3559-5182 , Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Internet history analysis

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

Internet of Everything

Gan, Diane ORCID: 0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383

internet of things

Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George ORCID: 0000-0003-3559-5182 and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:https://doi.org/10.3390/s19235258)

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: 0000-0003-3559-5182 , Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 , Bezemskij, Anatolij ORCID: 0000-0002-6211-1609 and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 , Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.07.011)

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Loukas, George ORCID: 0000-0003-3559-5182 , Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Mavropoulos, Orestis, Mouratidis, Haralambos, Fish, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2018) Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks, 92:101743. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.08.013)

Ning, Zhenhu, Xu, Guangquan, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Wang, Hao and Liang, Kaitai (2019) TAW: cost-effective threshold authentication with weights for internet of things. IEEE Access, 7. pp. 30112-30125. ISSN 2169-3536 (Print), 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2902226)

Rahman, Md. Abdur, Loukas, George ORCID: 0000-0003-3559-5182 , Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:https://doi.org/10.1145/3323873.3326924)

Internet of Things (IoT)

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: 0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:https://doi.org/10.2196/24879)

intrusion detection

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182 , Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Loukas, George ORCID: 0000-0003-3559-5182 , Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

Loukas, George ORCID: 0000-0003-3559-5182 , Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Odeleye, Blessing, Loukas, George ORCID: 0000-0003-3559-5182 , Heartfield, Ryan and Spyridonis, Fotios ORCID: 0000-0003-4253-365X (2021) Detecting framerate-oriented cyber attacks on user experience in virtual reality. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. VR4Sec.

Intrusion detection system

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182 , Gan, Diane ORCID: 0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

IoT

Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:https://doi.org/10.1016/j.future.2018.01.029)

IoT applications

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 (2022) Towards practical and formal security risk analysis of IoT (Internet of Things) applications. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-4. ISBN 978-1665499965; 978-1665499972 (doi:https://doi.org/10.1109/ETFA52439.2022.9921511)

IoT offloading

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

jamming

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

Java

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

key bootstrapping

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:https://doi.org/10.1109/TIFS.2019.2892005)

key derivation

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE, Piscataway, USA. ISBN 978-1665446303 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM46819.2021.9638015)

key exchange

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.2971707)

Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC: Annual Computer Security Applications Conference. ACM, New York, USA, pp. 439-454. ISBN 978-1450385794 (doi:https://doi.org/10.1145/3485832.3485920)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)

key management

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

keyword search

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2996940)

knapsack

Tsiodra, Maria, Panda, Sakshyam ORCID: 0000-0001-7274-0073 , Chronopoulos, Michail and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2023.3272670)

legal counsel

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

linear

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

linear quadratic regulator

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

Linux

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

LOADng

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Localization

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

Localization algorithm

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

Location fingerprint

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

Location Fingerprinting

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

location privacy

Theodorakopoulos, George, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai and Loukas, George ORCID: 0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing, 19 (1). pp. 566-578. ISSN 1545-5971 (Print), 1941-0018 (Online) (doi:https://doi.org/10.1109/TDSC.2020.2980270)

LoRaWAN

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

Low-Power Wide-Area Networks

Bhatia, Laksh, Tomić, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:https://doi.org/10.1145/3274783.3275183)

low-speed experimental UAVs

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

LPWA networks

Bhatia, Laksh, Tomic, Ivana ORCID: 0000-0003-3502-5980 , Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:https://doi.org/10.1145/3418528)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

LQR

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

MAC protocol

Bhatia, Laksh, Tomić, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:https://doi.org/10.1145/3274783.3275183)

Mac OS X

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

mach-o

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Machine Learning

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: 0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

machine-to-machine

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

magnetically driven flow

Bojarevics, V. ORCID: 0000-0002-7326-7748 , Pericleous, K. ORCID: 0000-0002-7426-9999 , Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

Malicious Spoofing Attacks

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: 0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

malware detection

Xu, Guangquan, Feng, Meiqi, Jiao, Litao, Liu, Jian, Dai, Hong-Ning, Wang, Ding, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Zheng, Xi (2022) MFF-AMD: multivariate feature fusion for Android malware detection. In: CollaborateCom 2021: Networking, Applications and Worksharing 17th EAI. Virtual Event, October 16-18, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 406), 406 (ch. 10). Springer Link, Cham, pp. 368-385. ISBN 9783030926342 ; 9783030926359

management

González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165493)

mathematical analysis

Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:https://doi.org/10.1145/3538969.3544420)

mathematics of computing

Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:https://doi.org/10.1145/3538969.3544420)

Measurement

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

medical technologies

Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George ORCID: 0000-0003-3559-5182 and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:https://doi.org/10.3390/s19235258)

Mental health

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: 0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:https://doi.org/10.2196/24879)

microgrid

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

miscarriage of justice

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

misinformation

Loukas, George ORCID: 0000-0003-3559-5182 , Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2020.2980090)

Mobile Edge Computing

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: 0000-0003-3559-5182 , Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

modbus

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

model validation

Taimoor, Najma and Rehman, Semeen (2022) Towards Multi-Level Modelling and Monitoring of Real-time Personalised Health Conditions. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, pp. 1-8. ISBN 9781665499972 (doi:https://doi.org/10.1109/ETFA52439.2022.9921687)

modeling

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 (2023) Challenges in modelling applications for safe and resilient digital twins. In: 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus. 26-29 Sept 2022. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-6. ISBN 978-1665485616; 978-1665485623 ISSN 2687-8860 (Print), 2687-8852 (Online) (doi:https://doi.org/10.1109/ISC255366.2022.9921921)

monitoring

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

multi-agent system design

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

multi-agent systems

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

multi-level modelling

Taimoor, Najma and Rehman, Semeen (2023) On the Validation of Multi-Level Personalised Health Condition Model. In: 2022 25th Euromicro Conference on Digital System Design (DSD). IEEE, pp. 599-606. ISBN 9781665474054 ISSN 2639-3859 (Print), 2771-2508 (Online) (doi:https://doi.org/10.1109/DSD57027.2022.00086)

Taimoor, Najma and Rehman, Semeen (2022) Towards Multi-Level Modelling and Monitoring of Real-time Personalised Health Conditions. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, pp. 1-8. ISBN 9781665499972 (doi:https://doi.org/10.1109/ETFA52439.2022.9921687)

multi-stage attacks

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Laszka, Aron and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:https://doi.org/10.1109/TIFS.2021.3054966)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Mylonas, Alexios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:https://doi.org/10.1016/j.fsidi.2022.301480)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

multivariate feature fusion

Xu, Guangquan, Feng, Meiqi, Jiao, Litao, Liu, Jian, Dai, Hong-Ning, Wang, Ding, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Zheng, Xi (2022) MFF-AMD: multivariate feature fusion for Android malware detection. In: CollaborateCom 2021: Networking, Applications and Worksharing 17th EAI. Virtual Event, October 16-18, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 406), 406 (ch. 10). Springer Link, Cham, pp. 368-385. ISBN 9783030926342 ; 9783030926359

mutual authentication

Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372211)

mutual authentication and key derivation

Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC: Annual Computer Security Applications Conference. ACM, New York, USA, pp. 439-454. ISBN 978-1450385794 (doi:https://doi.org/10.1145/3485832.3485920)

Neighbour disjoint multipath (NDM)

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Network

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

network layer attacks

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

Network topology

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

network visualization

Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:https://doi.org/10.1016/j.jisa.2022.103350)

networks

Brett, Terry, Loukas, George ORCID: 0000-0003-3559-5182 , Moreno, Yamir and Perra, Nicola ORCID: 0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:https://doi.org/10.1103/PhysRevE.99.050303)

Node-disjoint multipath

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

non-independent and identically distributed (Non-IID)

Li, Yanli, Yuan, Dong, Sani, Abubakar Sadiq and Bao, Wei (2023) Enhancing Federated Learning robustness in adversarial environment through clustering Non-IID features. Computers and Security, 132:103319. pp. 1-13. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2023.103319)

nonlinear dynamics

Brett, Terry, Loukas, George ORCID: 0000-0003-3559-5182 , Moreno, Yamir and Perra, Nicola ORCID: 0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:https://doi.org/10.1103/PhysRevE.99.050303)

O.MG Cable

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

Occupancy Detection

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: 0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

operational research

Tsiodra, Maria, Panda, Sakshyam ORCID: 0000-0001-7274-0073 , Chronopoulos, Michail and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2023.3272670)

Operational Technology

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)

optimisation

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

optimization

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Laszka, Aron and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:https://doi.org/10.1109/TIFS.2021.3054966)

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

Theodorakopoulos, George, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai and Loukas, George ORCID: 0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing, 19 (1). pp. 566-578. ISSN 1545-5971 (Print), 1941-0018 (Online) (doi:https://doi.org/10.1109/TDSC.2020.2980270)

Optimized link state routing (OLSR)

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

Participatory Sensing

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Pattern of life

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

PBL

Gan, D. ORCID: 0000-0002-0920-7572 , Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

Peer Assisted Learning

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

peer-assessment

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

peer-group learning

Gan, D. ORCID: 0000-0002-0920-7572 , Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

performance cost

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

personalised healthcare

Taimoor, Najma and Rehman, Semeen (2023) On the Validation of Multi-Level Personalised Health Condition Model. In: 2022 25th Euromicro Conference on Digital System Design (DSD). IEEE, pp. 599-606. ISBN 9781665474054 ISSN 2639-3859 (Print), 2771-2508 (Online) (doi:https://doi.org/10.1109/DSD57027.2022.00086)

Taimoor, Najma and Rehman, Semeen (2021) Reliable and resilient AI and IoT-based personalised healthcare services: A survey. IEEE Access, 10. pp. 535-563. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2021.3137364)

Personality

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: 0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:https://doi.org/10.2196/24879)

phishing

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:https://doi.org/10.1145/2835375)

Loukas, George ORCID: 0000-0003-3559-5182 , Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2020.2980090)

Positioning system

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

power systems

Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:https://doi.org/10.1016/j.segan.2021.100553)

privacy

Sani, Abubakar Sadiq, Bertino, Elisa, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Computers & Security, 115:102610. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2022.102610)

Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372211)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:https://doi.org/10.1109/ICDCS.2019.00190)

privacy computing

Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:https://doi.org/10.1016/j.jisa.2022.103386)

privacy taxonomy

Odeleye, Blessing, Loukas, George ORCID: 0000-0003-3559-5182 , Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Spyridonis, Fotios (2022) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers and Security, 124:102951. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2022.102951)

privacy-preserving

Zhou, Junwei, Lei, Botian, Lang, Huile, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai and Xiang, Jianwen (2022) Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications, 72:103386. ISSN 2214-2126 (Online) (doi:https://doi.org/10.1016/j.jisa.2022.103386)

probabilistic computation

Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:https://doi.org/10.1145/3538969.3544420)

Problem-based Learning

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

process control

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113 , Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

program verification

Liva, Giovanni ORCID: 0000-0002-9337-5762 , Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:https://doi.org/10.1007/s10664-019-09699-5)

programmable USB

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

programmable USB device

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

prototypes

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Proximity based localization

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

psychology

Budimir, S., Fontaine, J., Huijts, N., Haans, A., Loukas, G. ORCID: 0000-0003-3559-5182 , Ras, I. and Roesch, E. (2020) Emotions, personality, and psychopathology of cybersecurity breach victims. Journal of Psychosomatic Research, 133:110059. ISSN 0022-3999 (Print), 1879-1360 (Online) (doi:https://doi.org/10.1016/j.jpsychores.2020.110059)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 , Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.07.011)

RAM Dump

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

real-time security

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2021) Towards scalable security of real-time applications: a formally certified approach. In: 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, 01-04. ISBN 978-1728129907; 978-1728129891 (doi:https://doi.org/10.1109/ETFA45728.2021.9613489)

real-time systems

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

reinforcement learning

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 , Bezemskij, Anatolij ORCID: 0000-0002-6211-1609 and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)

relay resilience

Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC: Annual Computer Security Applications Conference. ACM, New York, USA, pp. 439-454. ISBN 978-1450385794 (doi:https://doi.org/10.1145/3485832.3485920)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE, Piscataway, USA. ISBN 978-1665446303 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM46819.2021.9638015)

reliable healthcare

Taimoor, Najma and Rehman, Semeen (2021) Reliable and resilient AI and IoT-based personalised healthcare services: A survey. IEEE Access, 10. pp. 535-563. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2021.3137364)

rescue robots

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:https://doi.org/10.1109/PerComW.2014.6815228)

Resilience

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 (2023) Challenges in modelling applications for safe and resilient digital twins. In: 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus. 26-29 Sept 2022. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-6. ISBN 978-1665485616; 978-1665485623 ISSN 2687-8860 (Print), 2687-8852 (Online) (doi:https://doi.org/10.1109/ISC255366.2022.9921921)

review

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Mylonas, Alexios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:https://doi.org/10.1016/j.fsidi.2022.301480)

risk assessment

Scott, Emma, Panda, Sakshyam, Loukas, George ORCID: 0000-0003-3559-5182 and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:https://doi.org/10.1109/DSC54232.2022.9888829)

risk-based security assessment

Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM40551.2019.8973948)

robotic vehicles

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182 , Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

robustness

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

RPL

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

Rubber Ducky

Lawal, Damola, Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:https://doi.org/10.23919/MIPRO52101.2021.9596889)

run-time monitoring

Khan, Taimoor ORCID: 0000-0002-5752-6420 and Tomic, Ivana ORCID: 0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.3032968)

runtime

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

safe and secure healthcare

Taimoor, Najma and Rehman, Semeen (2023) On the Validation of Multi-Level Personalised Health Condition Model. In: 2022 25th Euromicro Conference on Digital System Design (DSD). IEEE, pp. 599-606. ISBN 9781665474054 ISSN 2639-3859 (Print), 2771-2508 (Online) (doi:https://doi.org/10.1109/DSD57027.2022.00086)

Taimoor, Najma and Rehman, Semeen (2022) Towards Multi-Level Modelling and Monitoring of Real-time Personalised Health Conditions. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, pp. 1-8. ISBN 9781665499972 (doi:https://doi.org/10.1109/ETFA52439.2022.9921687)

safety

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Mohsin, Ali, Aurangzeb, Sana, Aleem, Muhammad and Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 (2022) On the performance and scalability of simulators for improving security and safety of smart cities. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-8. ISBN 978-1665499965; 978-1665499972 (doi:https://doi.org/10.1109/ETFA52439.2022.9921600)

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113 , Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

SCADA

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

secure and safe healthcare

Taimoor, Najma and Rehman, Semeen (2021) Reliable and resilient AI and IoT-based personalised healthcare services: A survey. IEEE Access, 10. pp. 535-563. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2021.3137364)

secure communication

Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372211)

Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:https://doi.org/10.1016/j.future.2018.01.029)

Secure therapy

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: 0000-0003-3559-5182 , Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

security

Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George ORCID: 0000-0003-3559-5182 and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:https://doi.org/10.3390/s19235258)

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

Chronopoulos, Michail, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Grossklags, Jens (2017) An options approach to cybersecurity investment. IEEE Access, 6. pp. 12175-12186. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2773366)

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:https://doi.org/10.1145/2835375)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 , Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.07.011)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Khan, Taimoor ORCID: 0000-0002-5752-6420 and Tomic, Ivana ORCID: 0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.3032968)

Mohsin, Ali, Aurangzeb, Sana, Aleem, Muhammad and Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 (2022) On the performance and scalability of simulators for improving security and safety of smart cities. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-8. ISBN 978-1665499965; 978-1665499972 (doi:https://doi.org/10.1109/ETFA52439.2022.9921600)

Sani, Abubakar Sadiq, Bertino, Elisa, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Computers & Security, 115:102610. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2022.102610)

Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372211)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.2971707)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:https://doi.org/10.1109/TIFS.2019.2892005)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:https://doi.org/10.1109/ICDCS.2019.00190)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

security and privacy

Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:https://doi.org/10.1145/3538969.3544420)

Parsons, Emily Kate, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2020) How secure is home: assessing human susceptibility to IoT threats. In: PCI 2020: 24th Pan-Hellenic Conference on Informatics. ACM, pp. 64-71. ISBN 978-1450388979 (doi:https://doi.org/10.1145/3437120.3437277)

security and safety

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 (2023) Challenges in modelling applications for safe and resilient digital twins. In: 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus. 26-29 Sept 2022. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-6. ISBN 978-1665485616; 978-1665485623 ISSN 2687-8860 (Print), 2687-8852 (Online) (doi:https://doi.org/10.1109/ISC255366.2022.9921921)

Security economics

Farao, Aristeidis, Panda, Sakshyam, Menesidou, Sofia Anna, Veliou, Entso, Episkopos, Nikolaos, Kalatzantonakis, George, Mohammadi, Farnaz, Georgopoulos, Nikolaos, Sirivianos, Michael, Salamanos, Nikos, Loizou, Spyros, Pingos, Michalis, Polley, John, Fielder, Andrew, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2020) SECONDO: A platform for cybersecurity investments and cyber insurance decisions. In: Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min and Khalil, Ismail, (eds.) Trust, Privacy and Security in Digital Business: Proceedings of the 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020. Lecture Notes in Computer Science book series (LNCS) (12395). Springer Nature, Cham, Switzerland, pp. 65-74. ISBN 978-3030589851 (doi:https://doi.org/10.1007/978-3-030-58986-8_5)

Fielder, Andrew, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Malacaria, Pasquale, Hankin, Chris and Smeraldi, Fabrizio (2016) Decision support approaches for cyber security investment. Decision Support Systems, 86. pp. 13-23. ISSN 0167-9236 (doi:https://doi.org/10.1016/j.dss.2016.02.012)

Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Karapistoli, Eirini, Elsemary, Hadeep, Alpcan, Tansu, Khuzani, MHR and Economides, Anastasios A. (2016) Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks, 56. pp. 28-42. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2016.11.008)

security protocols

Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM40551.2019.8973948)

self-healing

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

Semantic attacks

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

Semantic attacks

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

Semantic social engineering

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:https://doi.org/10.1145/2835375)

Semantic textual similarity

Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Patrikakis, Charalampos and Loukas, George ORCID: 0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:https://doi.org/10.1016/j.asoc.2021.107413)

semantics

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

sensors

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Session-to-session analysis

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

Gresty, David W., Loukas, George ORCID: 0000-0003-3559-5182 , Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

set covering

Tsiodra, Maria, Panda, Sakshyam ORCID: 0000-0001-7274-0073 , Chronopoulos, Michail and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2023.3272670)

Shared economy

Rahman, Md. Abdur, Loukas, George ORCID: 0000-0003-3559-5182 , Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:https://doi.org/10.1145/3323873.3326924)

simulated learning

Gan, D. ORCID: 0000-0002-0920-7572 , Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

Site-survey-free

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

situational awareness

Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:https://doi.org/10.1007/978-981-4585-87-3_48-1)

smart cities

Mohsin, Ali, Aurangzeb, Sana, Aleem, Muhammad and Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 (2022) On the performance and scalability of simulators for improving security and safety of smart cities. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-8. ISBN 978-1665499965; 978-1665499972 (doi:https://doi.org/10.1109/ETFA52439.2022.9921600)

smart communities

Sani, Abubakar Sadiq, Bertino, Elisa, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Computers & Security, 115:102610. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2022.102610)

smart contracts

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM41954.2020.9281929)

smart grid

Gourisetti, Sri Nikhil Gupta, Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth, Gorog, Christopher, Lee, Annabelle, Mylrea, Michael, Pasetti, Marco, Rahimi, Farrokh, Reddi, Ramesh and Sani, Abubakar Sadiq (2021) Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553. ISSN 2352-4677 (Print), 2352-4677 (Online) (doi:https://doi.org/10.1016/j.segan.2021.100553)

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372211)

Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372235)

smart grids

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM41954.2020.9281929)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE, Piscataway, USA. ISBN 978-1665446303 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM46819.2021.9638015)

Smart homes

Budimir, S., Fontaine, J., Huijts, N., Haans, A., Loukas, G. ORCID: 0000-0003-3559-5182 , Ras, I. and Roesch, E. (2020) Emotions, personality, and psychopathology of cybersecurity breach victims. Journal of Psychosomatic Research, 133:110059. ISSN 0022-3999 (Print), 1879-1360 (Online) (doi:https://doi.org/10.1016/j.jpsychores.2020.110059)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 , Bezemskij, Anatolij ORCID: 0000-0002-6211-1609 and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)

smart vehicles

Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC: Annual Computer Security Applications Conference. ACM, New York, USA, pp. 439-454. ISBN 978-1450385794 (doi:https://doi.org/10.1145/3485832.3485920)

smart-home

Scott, Emma, Panda, Sakshyam, Loukas, George ORCID: 0000-0003-3559-5182 and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:https://doi.org/10.1109/DSC54232.2022.9888829)

Social Engineering

Gan, Diane ORCID: 0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

Social media

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Social networks

Gan, Diane ORCID: 0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:https://doi.org/10.3390/fi7010067)

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

software

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

software weaknesses

Tsiodra, Maria, Panda, Sakshyam ORCID: 0000-0001-7274-0073 , Chronopoulos, Michail and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Cyber risk assessment and optimization: a small business case study. IEEE Access, 11. pp. 44467-44481. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2023.3272670)

software/program verification

Giovanni, Liva, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering, 47 (11). pp. 2369-2381. ISSN 0098-5589 (doi:https://doi.org/10.1109/TSE.2019.2948351)

solidification

Bojarevics, V. ORCID: 0000-0002-7326-7748 , Pericleous, K. ORCID: 0000-0002-7426-9999 , Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

sparse decision making

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2020.3006066)

stalking

Gan, Diane ORCID: 0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:https://doi.org/10.3390/fi7010067)

Standard Model

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

standards

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2022) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)

stealthy intrusion

Rass, Stefan, Konig, Sandra, Wachter, Jasmin, Mayoral-Vilches, Victor and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2023) Game-theoretic APT defense: an experimental study on robotics. Computers and Security, 132:103328. pp. 1-19. ISSN 0167-4048 (Print), 1872-6208 (Online) (doi:https://doi.org/10.1016/j.cose.2023.103328)

STEM teaching

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

sugar

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

supply chain attacks

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM41954.2020.9281929)

survey

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182 , Mylonas, Alexios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Forensics for multi-stage cyber incidents: survey and future directions. Forensic Science International: Digital Investigation, 44:301480. ISSN 2666-2817 (Online) (doi:https://doi.org/10.1016/j.fsidi.2022.301480)

systems

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Taxonomy

Breza, Michael, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie (2018) Failures from the Environment, a Report on the First FAILSAFE workshop. ACM SIGCOMM Computer Communication Review, 48 (2). pp. 40-45. ISSN 0146-4833 (doi:https://doi.org/10.1145/3213232.3213238)

teaching digital forensics

Lawal, Damola (2023) Are we preparing our students for real-world digital forensics? [Video]

theory of computation

Ahmed, Mohamed, Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2022) MITRE ATT&CK-driven cyber risk assessment. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Vienna, Austria, August 23 - 26, 2022. Association for Computing Machinery (ACM), New York, pp. 1-10. ISBN 978-1450396707 ISSN https://doi.org/10.1145/3538969.3544420 (Online) (doi:https://doi.org/10.1145/3538969.3544420)

threats

Scott, Emma, Panda, Sakshyam, Loukas, George ORCID: 0000-0003-3559-5182 and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2022) Optimising user security recommendations for AI-powered smart-homes. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE. ISBN 9781665421416 (doi:https://doi.org/10.1109/DSC54232.2022.9888829)

time semantics

Liva, Giovanni ORCID: 0000-0002-9337-5762 , Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:https://doi.org/10.1007/s10664-019-09699-5)

time-based zero knowledge proof of knowledge

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:https://doi.org/10.1109/ICDCS.2019.00190)

Time-varying networks

Brett, Terry, Loukas, George ORCID: 0000-0003-3559-5182 , Moreno, Yamir and Perra, Nicola ORCID: 0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:https://doi.org/10.1103/PhysRevE.99.050303)

timed automata

Liva, Giovanni ORCID: 0000-0002-9337-5762 , Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:https://doi.org/10.1007/s10664-019-09699-5)

tools

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 , Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

training and awareness

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

trapdoor commitment scheme

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

trust

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

trusted platform module

Diaz-Honrubia, Antonio Jesus, Herranz, Alberto Blázquez, Santamaría, Lucía Prieto, Ruiz, Ernestina Menasalvas, Rodríguez-González, Alejandro, Gonzalez-Granadillo, Gustavo, Diaz, Rodrigo, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2022) A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications, 71:103350. ISSN 2214-2126 (Online) (doi:https://doi.org/10.1016/j.jisa.2022.103350)

tutorials

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113 , Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

TV

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2996940)

two-way trust recommendation

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2020.3006066)

UAVs

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

universal composability

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.2971707)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:https://doi.org/10.1109/TIFS.2019.2892005)

Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC: Annual Computer Security Applications Conference. ACM, New York, USA, pp. 439-454. ISBN 978-1450385794 (doi:https://doi.org/10.1145/3485832.3485920)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE, Piscataway, USA. ISBN 978-1665446303 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM46819.2021.9638015)

UNIX

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

untargeted model attack

Li, Yanli, Yuan, Dong, Sani, Abubakar Sadiq and Bao, Wei (2023) Enhancing Federated Learning robustness in adversarial environment through clustering Non-IID features. Computers and Security, 132:103319. pp. 1-13. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2023.103319)

vehicles

Loukas, George ORCID: 0000-0003-3559-5182 , Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Loukas, George ORCID: 0000-0003-3559-5182 , Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

vehicular security

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182 , Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Loukas, George ORCID: 0000-0003-3559-5182 , Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Virtual Reality

Odeleye, Blessing, Loukas, George ORCID: 0000-0003-3559-5182 , Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700 , Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Spyridonis, Fotios (2022) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers and Security, 124:102951. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2022.102951)

Odeleye, Blessing, Loukas, George ORCID: 0000-0003-3559-5182 , Heartfield, Ryan and Spyridonis, Fotios ORCID: 0000-0003-4253-365X (2021) Detecting framerate-oriented cyber attacks on user experience in virtual reality. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. VR4Sec.

Volafox

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

VolaGUI

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

weight distribution

Xu, Guangquan, Feng, Meiqi, Jiao, Litao, Liu, Jian, Dai, Hong-Ning, Wang, Ding, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Zheng, Xi (2022) MFF-AMD: multivariate feature fusion for Android malware detection. In: CollaborateCom 2021: Networking, Applications and Worksharing 17th EAI. Virtual Event, October 16-18, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 406), 406 (ch. 10). Springer Link, Cham, pp. 368-385. ISBN 9783030926342 ; 9783030926359

Wi-Fi

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

wide area systems

Bhatia, Laksh, Tomic, Ivana ORCID: 0000-0003-3502-5980 , Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:https://doi.org/10.1145/3418528)

wireless networked control systems

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

wireless sensor and actuator networks

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

Wireless sensor networks

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

Li, Xiaoming, Xu, Guangquan, Zheng, Xi, Liang, Kaitai, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 , Li, Tao, Wang, Wei and Shen, Chao (2019) Using sparse representation to detect anomalies in complex WSNs. ACM Transactions on Intelligent Systems and Technology, 10 (6):64. ISSN 2157-6904 (Print), 2157-6912 (Online) (doi:https://doi.org/10.1145/3331147)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

wireless sensor/actuator networks

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

Tomic, Ivana ORCID: 0000-0003-3502-5980 , Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

wireless sensors and actuators

Bhatia, Laksh, Tomic, Ivana ORCID: 0000-0003-3502-5980 , Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:https://doi.org/10.1145/3418528)

World wide web

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572 , Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

wsn

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

This list was generated on Thu Nov 21 04:37:25 2024 UTC.