Skip navigation

Items where Faculty / Department / Research Groups is "Internet of Things and Security (ISEC)"

Items where Faculty / Department / Research Groups is "Internet of Things and Security (ISEC)"

Up a level
Export as [feed] RSS
Group by: Date | Creators | Item Type | Uncontrolled Keywords | No Grouping
abuse-freeness Ad-hoc networks additive particle tracking adversarial machine learning Adversarial Models Algorithm design and analysis alloy microstructure Anomaly detection artificial intelligence asynchronous sampling Attribute-Based Encryption autoencoder network autonomous systems Bayesian network Behaviour-based Big data biomedical monitoring Blockchain Bluetooth Low Energy calculus Calibration-free cloud computing collaborative learning communication protocols community detection computation offloading computational modeling Computational offloading computer bugs computer crime computer hacking computer security Context analysis contract-signing protocol control systems cooja cooperative control Correlation CPA Security cps Cross-disciplinary collaboration Crowdsourcing cryptography Cyber attacks Cyber crime cyber insurance cyber physical systems Cyber Security cyber-physical cyber-physical attacks cyber-physical security cyber-physical systems cyberattack data generation Data Security decentralized control decision support decision support systems design methodology Detection latency Digital artifacts Digital deception Digital evidence Digital forensics distributed control double trusted third parties economics edge computing Edge-disjoint multipath EdgeCloudSim Simulator emergency response Encryption Switching Energy efficiency Entropy Enumeration error handling and recovery event-based control event-triggered control experiential learning Expert Witness evidence forensics Forensics investigation formal methods formation control game theory GAN network HexaFind histograms honeypots Hop-count human-as-a-security-sensor Human-as-a-Sensor iBeacon Identity-Based Encryption Indoor Localisation Indoor positioning system industrial control industrial control system information and communication technology information leakage information security insulin integrated circuits internet connection records internet history Internet history analysis Internet of Everything internet of things intrusion detection Intrusion detection system IoT offloading jamming Java key management linear linear quadratic regulator Linux LOADng Localization Localization algorithm Location fingerprint Location Fingerprinting location privacy LoRaWAN Low-Power Wide-Area Networks low-speed experimental UAVs LPWA networks LQR MAC protocol Mac OS X mach-o Machine Learning machine-to-machine magnetically driven flow Malicious Spoofing Attacks Measurement medical technologies microgrid misinformation Mobile Edge Computing monitoring multi-agent system design multi-agent systems Neighbour disjoint multipath (NDM) Network network layer attacks Network topology Node-disjoint multipath Occupancy Detection optimization Optimized link state routing (OLSR) Participatory Sensing Pattern of life PBL Peer Assisted Learning peer-assessment peer-group learning performance cost phishing Positioning system Problem-based Learning process control program verification prototypes Proximity based localization Psychology RAM Dump real-time systems rescue robots Resilience robotic vehicles robustness RPL runtime safety SCADA Secure therapy security security economics self-healing Semantic attacks Semantic attacks Semantic social engineering semantics sensors Session-to-session analysis Shared economy simulated learning Site-survey-free Social Engineering Social media Social networks software software/program verification solidification stalking Standard Model STEM teaching sugar systems Taxonomy time semantics timed automata tools trapdoor commitment scheme trust tutorials UAVs UNIX vehicles vehicular security Volafox VolaGUI Wi-Fi wireless networked control systems wireless sensor and actuator networks Wireless sensor networks wireless sensor/actuator networks World wide web wsn
Number of items at this level: 300.

abuse-freeness

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

Ad-hoc networks

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

additive particle tracking

Bojarevics, V. ORCID: 0000-0002-7326-7748, Pericleous, K. ORCID: 0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

adversarial machine learning

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:https://doi.org/10.1016/j.cosrev.2019.100199)

Adversarial Models

Breza, Michael, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie (2018) Failures from the Environment, a Report on the First FAILSAFE workshop. ACM SIGCOMM Computer Communication Review, 48 (2). pp. 40-45. ISSN 0146-4833 (doi:https://doi.org/10.1145/3213232.3213238)

Algorithm design and analysis

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

alloy microstructure

Bojarevics, V. ORCID: 0000-0002-7326-7748, Pericleous, K. ORCID: 0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

Anomaly detection

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Li, Xiaoming, Xu, Guangquan, Zheng, Xi, Liang, Kaitai, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Li, Tao, Wang, Wei and Shen, Chao (2019) Using sparse representation to detect anomalies in complex WSNs. ACM Transactions on Intelligent Systems and Technology, 10 (6):64. ISSN 2157-6904 (Print), 2157-6912 (Online) (doi:https://doi.org/10.1145/3331147)

artificial intelligence

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:https://doi.org/10.1016/j.cosrev.2019.100199)

asynchronous sampling

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

Attribute-Based Encryption

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

autoencoder network

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. (In Press)

autonomous systems

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bayesian network

Bezemskij, Anatolij, Loukas, George, Gan, Diane ORCID: 0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Behaviour-based

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Big data

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

biomedical monitoring

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Blockchain

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George, Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2019.2929503)

Rahman, Md. Abdur, Loukas, George, Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:https://doi.org/10.1145/3323873.3326924)

Bluetooth Low Energy

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

calculus

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Calibration-free

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

cloud computing

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

collaborative learning

Gan, D. ORCID: 0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

communication protocols

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

community detection

Gresty, David W., Loukas, George, Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

computation offloading

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Loukas, George, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

computational modeling

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Computational offloading

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

computer bugs

Liva, Giovanni, Khan, Muhammad Taimoor, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

computer crime

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

computer hacking

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

computer security

Heartfield, Ryan and Loukas, George (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

Context analysis

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

contract-signing protocol

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

control systems

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

cooja

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

cooperative control

Tomic, Ivana ORCID: 0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

Correlation

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

CPA Security

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

cps

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

Cross-disciplinary collaboration

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

Crowdsourcing

Hossain, A. K. M. Mahtab and Loukas, George (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George, Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2019.2929503)

cryptography

Ning, Zhenhu, Xu, Guangquan, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Wang, Hao and Liang, Kaitai (2019) TAW: cost-effective threshold authentication with weights for internet of things. IEEE Access, 7. pp. 30112-30125. ISSN 2169-3536 (Print), 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2902226)

Cyber attacks

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Cyber crime

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Heartfield, Ryan, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

cyber insurance

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2019.101593)

cyber physical systems

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

Cyber Security

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Heartfield, Ryan and Loukas, George (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Heartfield, Ryan, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George, Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2019.2929503)

Loukas, George, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

Mavropoulos, Orestis, Mouratidis, Haralambos, Fish, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2018) Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks, 92:101743. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.08.013)

Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Karapistoli, Eirini, Elsemary, Hadeep, Alpcan, Tansu, Khuzani, MHR and Economides, Anastasios A. (2016) Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks, 56. pp. 28-42. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2016.11.008)

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2019.101593)

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:https://doi.org/10.1016/j.cosrev.2019.100199)

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:https://doi.org/10.1109/PerComW.2014.6815228)

cyber-physical

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

cyber-physical attacks

Loukas, George, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

cyber-physical security

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George, Gan, Diane ORCID: 0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Loukas, George, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

cyber-physical systems

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bhatia, Laksh, Tomić, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:https://doi.org/10.1145/3274783.3275183)

Loukas, George, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

cyberattack

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

data generation

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. (In Press)

Data Security

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

decentralized control

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

decision support

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

decision support systems

Fielder, Andrew, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Malacaria, Pasquale, Hankin, Chris and Smeraldi, Fabrizio (2016) Decision support approaches for cyber security investment. Decision Support Systems, 86. pp. 13-23. ISSN 0167-9236 (doi:https://doi.org/10.1016/j.dss.2016.02.012)

design methodology

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Detection latency

Loukas, George, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Digital artifacts

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

Digital deception

Loukas, George, Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2020.2980090)

Digital evidence

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

Digital forensics

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

Gresty, David W., Loukas, George, Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

distributed control

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

double trusted third parties

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

economics

Chronopoulos, Michail, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Grossklags, Jens (2017) An options approach to cybersecurity investment. IEEE Access, 6. pp. 12175-12186. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2773366)

edge computing

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Edge-disjoint multipath

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

EdgeCloudSim Simulator

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

emergency response

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:https://doi.org/10.1109/PerComW.2014.6815228)

Encryption Switching

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

Energy efficiency

Loukas, George, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Entropy

Hossain, A. K. M. Mahtab and Loukas, George (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Enumeration

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

error handling and recovery

Giovanni, Liva, Khan, Muhammad Taimoor, Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering. ISSN 0098-5589 (In Press) (doi:https://doi.org/10.1109/TSE.2019.2948351)

event-based control

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

event-triggered control

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

experiential learning

Gan, D. ORCID: 0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

Expert Witness evidence

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

forensics

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Forensics investigation

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

formal methods

Giovanni, Liva, Khan, Muhammad Taimoor, Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering. ISSN 0098-5589 (In Press) (doi:https://doi.org/10.1109/TSE.2019.2948351)

formation control

Tomic, Ivana ORCID: 0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

game theory

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2019.101593)

GAN network

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. (In Press)

HexaFind

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

histograms

Theodorakopoulos, George, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai and Loukas, George (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971 (Print), 1941-0018 (Online) (In Press) (doi:https://doi.org/10.1109/TDSC.2020.2980270)

honeypots

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. (In Press)

Hop-count

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

human-as-a-security-sensor

Heartfield, Ryan and Loukas, George (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Human-as-a-Sensor

Heartfield, Ryan, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

iBeacon

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

Identity-Based Encryption

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

Indoor Localisation

Hossain, A. K. M. Mahtab and Loukas, George (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Indoor positioning system

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

industrial control

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

industrial control system

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. (In Press)

information and communication technology

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

information leakage

Gan, Diane ORCID: 0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:https://doi.org/10.3390/fi7010067)

information security

Heartfield, Ryan and Loukas, George (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

insulin

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

integrated circuits

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

internet connection records

Gresty, David W., Loukas, George, Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

internet history

Gresty, David W., Loukas, George, Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Internet history analysis

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

Internet of Everything

Gan, Diane ORCID: 0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383

internet of things

Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:https://doi.org/10.3390/s19235258)

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

Heartfield, Ryan, Loukas, George, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.07.011)

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Loukas, George, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Mavropoulos, Orestis, Mouratidis, Haralambos, Fish, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2018) Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks, 92:101743. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.08.013)

Ning, Zhenhu, Xu, Guangquan, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Wang, Hao and Liang, Kaitai (2019) TAW: cost-effective threshold authentication with weights for internet of things. IEEE Access, 7. pp. 30112-30125. ISSN 2169-3536 (Print), 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2902226)

Rahman, Md. Abdur, Loukas, George, Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:https://doi.org/10.1145/3323873.3326924)

intrusion detection

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

Loukas, George, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Intrusion detection system

Bezemskij, Anatolij, Loukas, George, Gan, Diane ORCID: 0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

IoT offloading

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

jamming

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

Java

Liva, Giovanni, Khan, Muhammad Taimoor, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

key management

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

linear

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

linear quadratic regulator

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

Linux

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

LOADng

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Localization

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

Localization algorithm

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

Location fingerprint

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

Location Fingerprinting

Hossain, A. K. M. Mahtab and Loukas, George (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

location privacy

Theodorakopoulos, George, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai and Loukas, George (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971 (Print), 1941-0018 (Online) (In Press) (doi:https://doi.org/10.1109/TDSC.2020.2980270)

LoRaWAN

Tomic, Ivana ORCID: 0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

Low-Power Wide-Area Networks

Bhatia, Laksh, Tomić, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:https://doi.org/10.1145/3274783.3275183)

low-speed experimental UAVs

Tomic, Ivana ORCID: 0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

LPWA networks

Tomic, Ivana ORCID: 0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

LQR

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

MAC protocol

Bhatia, Laksh, Tomić, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:https://doi.org/10.1145/3274783.3275183)

Mac OS X

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

mach-o

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Machine Learning

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

machine-to-machine

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

magnetically driven flow

Bojarevics, V. ORCID: 0000-0002-7326-7748, Pericleous, K. ORCID: 0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

Malicious Spoofing Attacks

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

Measurement

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

medical technologies

Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:https://doi.org/10.3390/s19235258)

microgrid

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

misinformation

Loukas, George, Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2020.2980090)

Mobile Edge Computing

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

monitoring

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

multi-agent system design

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

multi-agent systems

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

Neighbour disjoint multipath (NDM)

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Network

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

network layer attacks

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

Network topology

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

Node-disjoint multipath

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Occupancy Detection

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

optimization

Theodorakopoulos, George, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai and Loukas, George (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971 (Print), 1941-0018 (Online) (In Press) (doi:https://doi.org/10.1109/TDSC.2020.2980270)

Optimized link state routing (OLSR)

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

Participatory Sensing

Hossain, A. K. M. Mahtab and Loukas, George (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Pattern of life

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

PBL

Gan, D. ORCID: 0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

Peer Assisted Learning

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

peer-assessment

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

peer-group learning

Gan, D. ORCID: 0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

performance cost

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

phishing

Heartfield, Ryan and Loukas, George (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:https://doi.org/10.1145/2835375)

Loukas, George, Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2020.2980090)

Positioning system

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

Problem-based Learning

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

process control

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

program verification

Liva, Giovanni ORCID: 0000-0002-9337-5762, Khan, Muhammad Taimoor and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:https://doi.org/10.1007/s10664-019-09699-5)

prototypes

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Proximity based localization

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

Psychology

Heartfield, Ryan, Loukas, George, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.07.011)

RAM Dump

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

real-time systems

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

rescue robots

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:https://doi.org/10.1109/PerComW.2014.6815228)

Resilience

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

robotic vehicles

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

robustness

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

RPL

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

runtime

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Liva, Giovanni, Khan, Muhammad Taimoor, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

safety

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

SCADA

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. (In Press)

Secure therapy

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

security

Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:https://doi.org/10.3390/s19235258)

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

Chronopoulos, Michail, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Grossklags, Jens (2017) An options approach to cybersecurity investment. IEEE Access, 6. pp. 12175-12186. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2773366)

Heartfield, Ryan and Loukas, George (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:https://doi.org/10.1145/2835375)

Heartfield, Ryan, Loukas, George, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.07.011)

Heartfield, Ryan, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

security economics

Fielder, Andrew, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Malacaria, Pasquale, Hankin, Chris and Smeraldi, Fabrizio (2016) Decision support approaches for cyber security investment. Decision Support Systems, 86. pp. 13-23. ISSN 0167-9236 (doi:https://doi.org/10.1016/j.dss.2016.02.012)

Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Karapistoli, Eirini, Elsemary, Hadeep, Alpcan, Tansu, Khuzani, MHR and Economides, Anastasios A. (2016) Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks, 56. pp. 28-42. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2016.11.008)

self-healing

Tomic, Ivana ORCID: 0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

Semantic attacks

Heartfield, Ryan, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

Semantic attacks

Heartfield, Ryan, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

Semantic social engineering

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Heartfield, Ryan and Loukas, George (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:https://doi.org/10.1145/2835375)

semantics

Liva, Giovanni, Khan, Muhammad Taimoor, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

sensors

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Session-to-session analysis

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

Gresty, David W., Loukas, George, Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Shared economy

Rahman, Md. Abdur, Loukas, George, Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:https://doi.org/10.1145/3323873.3326924)

simulated learning

Gan, D. ORCID: 0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

Site-survey-free

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

Social Engineering

Gan, Diane ORCID: 0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383

Heartfield, Ryan, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

Heartfield, Ryan, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

Social media

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Social networks

Gan, Diane ORCID: 0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:https://doi.org/10.3390/fi7010067)

Heartfield, Ryan and Loukas, George (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

software

Liva, Giovanni, Khan, Muhammad Taimoor, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

software/program verification

Giovanni, Liva, Khan, Muhammad Taimoor, Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering. ISSN 0098-5589 (In Press) (doi:https://doi.org/10.1109/TSE.2019.2948351)

solidification

Bojarevics, V. ORCID: 0000-0002-7326-7748, Pericleous, K. ORCID: 0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

stalking

Gan, Diane ORCID: 0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:https://doi.org/10.3390/fi7010067)

Standard Model

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

STEM teaching

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

sugar

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

systems

Khan, Muhammad Taimoor, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Taxonomy

Breza, Michael, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie (2018) Failures from the Environment, a Report on the First FAILSAFE workshop. ACM SIGCOMM Computer Communication Review, 48 (2). pp. 40-45. ISSN 0146-4833 (doi:https://doi.org/10.1145/3213232.3213238)

time semantics

Liva, Giovanni ORCID: 0000-0002-9337-5762, Khan, Muhammad Taimoor and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:https://doi.org/10.1007/s10664-019-09699-5)

timed automata

Liva, Giovanni ORCID: 0000-0002-9337-5762, Khan, Muhammad Taimoor and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:https://doi.org/10.1007/s10664-019-09699-5)

tools

Liva, Giovanni, Khan, Muhammad Taimoor, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

trapdoor commitment scheme

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

trust

Tomic, Ivana ORCID: 0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

tutorials

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

UAVs

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

UNIX

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

vehicles

Loukas, George, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

vehicular security

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Loukas, George, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Volafox

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

VolaGUI

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Wi-Fi

Hossain, A. K. M. Mahtab and Loukas, George (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

wireless networked control systems

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

wireless sensor and actuator networks

Tomic, Ivana ORCID: 0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

Wireless sensor networks

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

Li, Xiaoming, Xu, Guangquan, Zheng, Xi, Liang, Kaitai, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Li, Tao, Wang, Wei and Shen, Chao (2019) Using sparse representation to detect anomalies in complex WSNs. ACM Transactions on Intelligent Systems and Technology, 10 (6):64. ISSN 2157-6904 (Print), 2157-6912 (Online) (doi:https://doi.org/10.1145/3331147)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

wireless sensor/actuator networks

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

World wide web

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

wsn

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

This list was generated on Thu May 28 14:50:08 2020 UTC.