Skip navigation

Items where Faculty / School / Research Centre / Research Groups is "Internet of Things and Security Research Centre (ISEC)"

Items where Faculty / School / Research Centre / Research Groups is "Internet of Things and Security Research Centre (ISEC)"

Up a level
Export as [feed] RSS
Group by: Date | Creators | Item Type | Uncontrolled Keywords | No Grouping
abuse-freeness Ad-hoc networks additive particle tracking Advanced metering infrastructure (AMI) adversarial machine learning Adversarial Models AI enabled IoT systems Algorithm design and analysis alloy microstructure Anomaly detection artificial intelligence assessment asynchronous sampling Attribute-Based Encryption authenticated encryption authentication authorization autoencoder network autonomous systems bayesian game Bayesian network Behaviour-based Big data biomedical monitoring Blockchain Bluetooth Low Energy calculus Calibration-free CIS control cloud computing collaborative filtering collaborative learning communication communication and application layer attacks communication protocols community detection computation offloading computational modeling Computational offloading computer bugs computer crime computer hacking computer security Context analysis contract-signing protocol control systems cooja cooperative control Correlation CPA Security cps Cross-disciplinary collaboration Crowdsourcing cryptography Cyber attacks Cyber crime cyber forensics cyber hygiene healthcare Cyber insurance cyber physical systems cyber risk Cyber Security cyber threats spreading cyber-physical cyber-physical attacks cyber-physical security cyber-physical systems cyberattack cybersecurity Cybersecurity breach victims data generation data integrity assessment and control Data Security decentralized control decision support decision support systems decision-making Deep learning design methodology Detection latency Digital artifacts Digital deception Digital evidence Digital forensics distributed control double trusted third parties economics edge computing Edge-disjoint multipath EdgeCloudSim Simulator emergency response Emotions encryption Encryption Switching Energy efficiency Energy Internet Entropy Enumeration error handling and recovery event-based control event-triggered control experiential learning Expert Witness evidence forensics Forensics investigation formal methods formation control fuzzy cognitive maps game theory GAN network guidelines healthcare HexaFind histograms honeypots Hop-count human and societal aspects of security and privacy human-as-a-security-sensor Human-as-a-Sensor I-ICAAAN iBeacon identity management Identity-Based Encryption Image similarity indexes Indoor Localisation Indoor positioning system industrial control Industrial control system Industrial Cyber-Physical System (ICPS) industrial internet of things information and communication technology Information cascade information leakage information security Information trustworthiness insulin integrated circuits intelligent recommendation system interdisciplinary physics internet connection records internet history Internet history analysis Internet of Everything internet of things Internet of Things (IoT) intrusion detection Intrusion detection system IoT IoT offloading jamming Java key bootstrapping key derivation key exchange key management keyword search linear linear quadratic regulator Linux LOADng Localization Localization algorithm Location fingerprint Location Fingerprinting location privacy LoRaWAN Low-Power Wide-Area Networks low-speed experimental UAVs LPWA networks LQR MAC protocol Mac OS X mach-o Machine Learning machine-to-machine magnetically driven flow Malicious Spoofing Attacks management Measurement medical technologies Mental health microgrid misinformation Mobile Edge Computing modbus monitoring multi-agent system design multi-agent systems multi-stage attacks mutual authentication mutual authentication and key derivation Neighbour disjoint multipath (NDM) Network network layer attacks Network topology networks Node-disjoint multipath nonlinear dynamics Occupancy Detection Operational Technology optimisation optimization Optimized link state routing (OLSR) Participatory Sensing Pattern of life PBL Peer Assisted Learning peer-assessment peer-group learning performance cost Personality phishing Positioning system privacy Problem-based Learning process control program verification prototypes Proximity based localization psychology RAM Dump real-time systems reinforcement learning relay resilience rescue robots Resilience risk-based security assessment robotic vehicles robustness RPL run-time monitoring runtime safety SCADA secure communication Secure therapy security security and privacy Security economics security protocols self-healing Semantic attacks Semantic attacks Semantic social engineering Semantic textual similarity semantics sensors Session-to-session analysis Shared economy simulated learning Site-survey-free situational awareness smart contracts smart grid smart grids Smart homes smart vehicles Social Engineering Social media Social networks software software/program verification solidification sparse decision making stalking Standard Model standards STEM teaching sugar supply chain attacks systems Taxonomy time semantics time-based zero knowledge proof of knowledge Time-varying networks timed automata tools training and awareness trapdoor commitment scheme trust tutorials TV two-way trust recommendation UAVs universal composability UNIX vehicles vehicular security Virtual reality Volafox VolaGUI Wi-Fi wide area systems wireless networked control systems wireless sensor and actuator networks Wireless sensor networks wireless sensor/actuator networks wireless sensors and actuators World wide web wsn
Number of items at this level: 437.

abuse-freeness

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

Ad-hoc networks

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

additive particle tracking

Bojarevics, V. ORCID: 0000-0002-7326-7748, Pericleous, K. ORCID: 0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

Advanced metering infrastructure (AMI)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.2971707)

adversarial machine learning

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:https://doi.org/10.1016/j.cosrev.2019.100199)

Adversarial Models

Breza, Michael, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie (2018) Failures from the Environment, a Report on the First FAILSAFE workshop. ACM SIGCOMM Computer Communication Review, 48 (2). pp. 40-45. ISSN 0146-4833 (doi:https://doi.org/10.1145/3213232.3213238)

AI enabled IoT systems

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2020.3006066)

Algorithm design and analysis

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

alloy microstructure

Bojarevics, V. ORCID: 0000-0002-7326-7748, Pericleous, K. ORCID: 0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

Anomaly detection

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Li, Xiaoming, Xu, Guangquan, Zheng, Xi, Liang, Kaitai, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Li, Tao, Wang, Wei and Shen, Chao (2019) Using sparse representation to detect anomalies in complex WSNs. ACM Transactions on Intelligent Systems and Technology, 10 (6):64. ISSN 2157-6904 (Print), 2157-6912 (Online) (doi:https://doi.org/10.1145/3331147)

artificial intelligence

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:https://doi.org/10.1016/j.cosrev.2019.100199)

assessment

González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165493)

asynchronous sampling

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

Attribute-Based Encryption

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

authenticated encryption

Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372235)

authentication

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting. 26-29 July 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (In Press)

Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM40551.2019.8973948)

authorization

Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM40551.2019.8973948)

autoencoder network

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

autonomous systems

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

bayesian game

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

Bayesian network

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182, Gan, Diane ORCID: 0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Behaviour-based

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Big data

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

biomedical monitoring

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Blockchain

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: 0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George ORCID: 0000-0003-3559-5182, Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2019.2929503)

Rahman, Md. Abdur, Loukas, George ORCID: 0000-0003-3559-5182, Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:https://doi.org/10.1145/3323873.3326924)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:https://doi.org/10.1109/ICDCS.2019.00190)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM41954.2020.9281929)

Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372235)

Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:https://doi.org/10.1007/978-981-4585-87-3_48-1)

Bluetooth Low Energy

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: 0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

calculus

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Calibration-free

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

CIS control

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

cloud computing

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2996940)

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Loukas, George ORCID: 0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

collaborative filtering

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2020.3006066)

collaborative learning

Gan, D. ORCID: 0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

communication

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:https://doi.org/10.1109/TIFS.2019.2892005)

communication and application layer attacks

Khan, Taimoor ORCID: 0000-0002-5752-6420 and Tomic, Ivana ORCID: 0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.3032968)

communication protocols

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

community detection

Gresty, David W., Loukas, George ORCID: 0000-0003-3559-5182, Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

computation offloading

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Loukas, George ORCID: 0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

computational modeling

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Computational offloading

Loukas, George ORCID: 0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

computer bugs

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

computer crime

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

computer hacking

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

computer security

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

Context analysis

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

contract-signing protocol

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

control systems

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

cooja

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

cooperative control

Tomic, Ivana ORCID: 0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

Correlation

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

CPA Security

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

cps

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

Cross-disciplinary collaboration

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

Crowdsourcing

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George ORCID: 0000-0003-3559-5182, Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2019.2929503)

cryptography

Ning, Zhenhu, Xu, Guangquan, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Wang, Hao and Liang, Kaitai (2019) TAW: cost-effective threshold authentication with weights for internet of things. IEEE Access, 7. pp. 30112-30125. ISSN 2169-3536 (Print), 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2902226)

Cyber attacks

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Cyber crime

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

cyber forensics

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:https://doi.org/10.1109/TIFS.2021.3054966)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

cyber hygiene healthcare

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

Cyber insurance

Farao, Aristeidis, Panda, Sakshyam, Menesidou, Sofia Anna, Veliou, Entso, Episkopos, Nikolaos, Kalatzantonakis, George, Mohammadi, Farnaz, Georgopoulos, Nikolaos, Sirivianos, Michael, Salamanos, Nikos, Loizou, Spyros, Pingos, Michalis, Polley, John, Fielder, Andrew, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2020) SECONDO: A platform for cybersecurity investments and cyber insurance decisions. In: Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min and Khalil, Ismail, (eds.) Trust, Privacy and Security in Digital Business: Proceedings of the 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020. Lecture Notes in Computer Science book series (LNCS) (12395). Springer Nature, Cham, Switzerland, pp. 65-74. ISBN 978-3030589851 (doi:https://doi.org/10.1007/978-3-030-58986-8_5)

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2019.101593)

cyber physical systems

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

cyber risk

González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165493)

Cyber Security

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: 0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Budimir, S., Fontaine, J., Huijts, N., Haans, A., Loukas, G. ORCID: 0000-0003-3559-5182, Ras, I. and Roesch, E. (2020) Emotions, personality, and psychopathology of cybersecurity breach victims. Journal of Psychosomatic Research, 133:110059. ISSN 0022-3999 (Print), 1879-1360 (Online) (doi:https://doi.org/10.1016/j.jpsychores.2020.110059)

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182, Bezemskij, Anatolij and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

Kogias, Dimitrios, Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria, Katsadouros, Evangelos, Loukas, George ORCID: 0000-0003-3559-5182, Heartfield, Ryan and Patrikakis, Charalampos Z. (2019) Towards a blockchain-enabled crowdsourcing platform. IT Professional, 21 (5). pp. 18-25. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2019.2929503)

Loukas, George ORCID: 0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Loukas, George ORCID: 0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

Mavropoulos, Orestis, Mouratidis, Haralambos, Fish, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2018) Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks, 92:101743. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.08.013)

Nifakos, Sokratis, Chandramouli, Krishna, Nikolaou, Charoula Konstantina, Papachristou, Panagiotis, Panaousis, Emmanouil and Bonacina, Stefano (2021) Influence of human factors on cyber security within healthcare organisations: a systematic review. Sensors, 21 (15):5119. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21155119)

Odeleye, Blessing, Loukas, George ORCID: 0000-0003-3559-5182, Heartfield, Ryan and Spyridonis, Fotios ORCID: 0000-0003-4253-365X (2021) Detecting framerate-oriented cyber attacks on user experience in virtual reality. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. VR4Sec.

Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Karapistoli, Eirini, Elsemary, Hadeep, Alpcan, Tansu, Khuzani, MHR and Economides, Anastasios A. (2016) Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks, 56. pp. 28-42. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2016.11.008)

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2019.101593)

Pitropakis, Nikolaos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Giannetsos, Thanassis, Anastasiadis, Eleftherios and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199. ISSN 1574-0137 (doi:https://doi.org/10.1016/j.cosrev.2019.100199)

Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:https://doi.org/10.1016/j.future.2018.01.029)

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:https://doi.org/10.1109/PerComW.2014.6815228)

cyber threats spreading

Brett, Terry, Loukas, George ORCID: 0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID: 0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:https://doi.org/10.1103/PhysRevE.99.050303)

cyber-physical

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

cyber-physical attacks

Loukas, George ORCID: 0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

cyber-physical security

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182, Gan, Diane ORCID: 0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Loukas, George ORCID: 0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Loukas, George ORCID: 0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

cyber-physical systems

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bhatia, Laksh, Tomić, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:https://doi.org/10.1145/3274783.3275183)

Loukas, George ORCID: 0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

cyberattack

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

cybersecurity

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

Cybersecurity breach victims

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: 0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:https://doi.org/10.2196/24879)

data generation

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

data integrity assessment and control

Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372235)

Data Security

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

decentralized control

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

decision support

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:https://doi.org/10.1109/TIFS.2021.3054966)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

decision support systems

Fielder, Andrew, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Malacaria, Pasquale, Hankin, Chris and Smeraldi, Fabrizio (2016) Decision support approaches for cyber security investment. Decision Support Systems, 86. pp. 13-23. ISSN 0167-9236 (doi:https://doi.org/10.1016/j.dss.2016.02.012)

decision-making

Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:https://doi.org/10.1007/978-981-4585-87-3_48-1)

Deep learning

Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Patrikakis, Charalampos and Loukas, George ORCID: 0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:https://doi.org/10.1016/j.asoc.2021.107413)

design methodology

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Detection latency

Loukas, George ORCID: 0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Digital artifacts

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

Digital deception

Loukas, George ORCID: 0000-0003-3559-5182, Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2020.2980090)

Digital evidence

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

Digital forensics

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

Gresty, David W., Loukas, George ORCID: 0000-0003-3559-5182, Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:https://doi.org/10.1109/TIFS.2021.3054966)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

distributed control

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

double trusted third parties

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

economics

Chronopoulos, Michail, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Grossklags, Jens (2017) An options approach to cybersecurity investment. IEEE Access, 6. pp. 12175-12186. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2773366)

edge computing

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Edge-disjoint multipath

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

EdgeCloudSim Simulator

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

emergency response

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:https://doi.org/10.1109/PerComW.2014.6815228)

Emotions

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: 0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:https://doi.org/10.2196/24879)

encryption

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2996940)

Encryption Switching

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

Energy efficiency

Loukas, George ORCID: 0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Energy Internet

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.2971707)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:https://doi.org/10.1109/TIFS.2019.2892005)

Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:https://doi.org/10.1016/j.future.2018.01.029)

Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:https://doi.org/10.1007/978-981-4585-87-3_48-1)

Entropy

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Enumeration

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

error handling and recovery

Giovanni, Liva, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering. ISSN 0098-5589 (In Press) (doi:https://doi.org/10.1109/TSE.2019.2948351)

event-based control

Bhatia, Laksh, Tomic, Ivana ORCID: 0000-0003-3502-5980, Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:https://doi.org/10.1145/3418528)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

event-triggered control

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

experiential learning

Gan, D. ORCID: 0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

Expert Witness evidence

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

forensics

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Forensics investigation

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

formal methods

Giovanni, Liva, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering. ISSN 0098-5589 (In Press) (doi:https://doi.org/10.1109/TSE.2019.2948351)

formation control

Tomic, Ivana ORCID: 0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

fuzzy cognitive maps

Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372235)

game theory

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2019) Post-incident audits on cyber insurance discounts. Computers and Security, 87:101593. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2019.101593)

GAN network

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

guidelines

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)

healthcare

González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165493)

Nifakos, Sokratis, Chandramouli, Krishna, Nikolaou, Charoula Konstantina, Papachristou, Panagiotis, Panaousis, Emmanouil and Bonacina, Stefano (2021) Influence of human factors on cyber security within healthcare organisations: a systematic review. Sensors, 21 (15):5119. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21155119)

HexaFind

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

histograms

Theodorakopoulos, George, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai and Loukas, George ORCID: 0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971 (Print), 1941-0018 (Online) (In Press) (doi:https://doi.org/10.1109/TDSC.2020.2980270)

honeypots

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

Hop-count

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

human and societal aspects of security and privacy

Parsons, Emily Kate, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2020) How secure is home: assessing human susceptibility to IoT threats. In: PCI 2020: 24th Pan-Hellenic Conference on Informatics. ACM, pp. 64-71. ISBN 978-1450388979 (doi:https://doi.org/10.1145/3437120.3437277)

human-as-a-security-sensor

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Human-as-a-Sensor

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

I-ICAAAN

Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:https://doi.org/10.1016/j.future.2018.01.029)

iBeacon

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: 0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

identity management

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM41954.2020.9281929)

Identity-Based Encryption

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

Image similarity

Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Patrikakis, Charalampos and Loukas, George ORCID: 0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:https://doi.org/10.1016/j.asoc.2021.107413)

indexes

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2996940)

Indoor Localisation

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Indoor positioning system

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

industrial control

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Industrial control system

Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM40551.2019.8973948)

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

Industrial Cyber-Physical System (ICPS)

Khan, Taimoor ORCID: 0000-0002-5752-6420 and Tomic, Ivana ORCID: 0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.3032968)

industrial internet of things

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:https://doi.org/10.1109/ICDCS.2019.00190)

information and communication technology

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Information cascade

Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Patrikakis, Charalampos and Loukas, George ORCID: 0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:https://doi.org/10.1016/j.asoc.2021.107413)

Kasnesis, Panagiotis, Heartfield, Ryan, Toumanidis, Lazaros, Liang, Xing, Loukas, George ORCID: 0000-0003-3559-5182 and Patrikakis, Charalampos Z. (2020) A prototype deep learning paraphrase identification service for discovering information cascades in social networks. In: IEEE International Conference on Multimedia and Expo. IEEE, pp. 1-4. ISBN 978-1728114859 (doi:https://doi.org/10.1109/ICMEW46912.2020.9106044)

information leakage

Gan, Diane ORCID: 0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:https://doi.org/10.3390/fi7010067)

information security

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Computers & Security, 76. pp. 101-127. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.02.020)

Information trustworthiness

Kasnesis, Panagiotis, Heartfield, Ryan, Toumanidis, Lazaros, Liang, Xing, Loukas, George ORCID: 0000-0003-3559-5182 and Patrikakis, Charalampos Z. (2020) A prototype deep learning paraphrase identification service for discovering information cascades in social networks. In: IEEE International Conference on Multimedia and Expo. IEEE, pp. 1-4. ISBN 978-1728114859 (doi:https://doi.org/10.1109/ICMEW46912.2020.9106044)

insulin

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

integrated circuits

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

intelligent recommendation system

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2020.3006066)

interdisciplinary physics

Brett, Terry, Loukas, George ORCID: 0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID: 0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:https://doi.org/10.1103/PhysRevE.99.050303)

internet connection records

Gresty, David W., Loukas, George ORCID: 0000-0003-3559-5182, Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

internet history

Gresty, David W., Loukas, George ORCID: 0000-0003-3559-5182, Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Internet history analysis

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

Internet of Everything

Gan, Diane ORCID: 0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383

internet of things

Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George ORCID: 0000-0003-3559-5182 and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:https://doi.org/10.3390/s19235258)

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: 0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182, Bezemskij, Anatolij and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.07.011)

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

Loukas, George ORCID: 0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Mavropoulos, Orestis, Mouratidis, Haralambos, Fish, Andrew and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2018) Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks, 92:101743. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.08.013)

Ning, Zhenhu, Xu, Guangquan, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Wang, Hao and Liang, Kaitai (2019) TAW: cost-effective threshold authentication with weights for internet of things. IEEE Access, 7. pp. 30112-30125. ISSN 2169-3536 (Print), 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2902226)

Rahman, Md. Abdur, Loukas, George ORCID: 0000-0003-3559-5182, Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:https://doi.org/10.1145/3323873.3326924)

Internet of Things (IoT)

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: 0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:https://doi.org/10.2196/24879)

intrusion detection

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Loukas, George ORCID: 0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

Loukas, George ORCID: 0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Odeleye, Blessing, Loukas, George ORCID: 0000-0003-3559-5182, Heartfield, Ryan and Spyridonis, Fotios ORCID: 0000-0003-4253-365X (2021) Detecting framerate-oriented cyber attacks on user experience in virtual reality. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. VR4Sec.

Intrusion detection system

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182, Gan, Diane ORCID: 0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

IoT

Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:https://doi.org/10.1016/j.future.2018.01.029)

IoT offloading

Jaddoa, Ali, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis G. (2019) Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory, 101:102019. ISSN 1569-190X (doi:https://doi.org/10.1016/j.simpat.2019.102019)

jamming

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

Java

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

key bootstrapping

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:https://doi.org/10.1109/TIFS.2019.2892005)

key derivation

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting. 26-29 July 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (In Press)

key exchange

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.2971707)

Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC 2021. Annual Computer Security Applications Conference. Dec 6, 2021 - Dec 10, 2021. Austin, Texas, USA. Annual Computer Security Applications Conference (ACSAC) . Association for Computing Machinery (ACM), 1601 Broadway, Times Square, New York City. (In Press)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)

key management

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

keyword search

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2996940)

linear

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

linear quadratic regulator

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

Linux

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

LOADng

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Localization

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

Localization algorithm

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

Location fingerprint

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

Location Fingerprinting

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

location privacy

Theodorakopoulos, George, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai and Loukas, George ORCID: 0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971 (Print), 1941-0018 (Online) (In Press) (doi:https://doi.org/10.1109/TDSC.2020.2980270)

LoRaWAN

Tomic, Ivana ORCID: 0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

Low-Power Wide-Area Networks

Bhatia, Laksh, Tomić, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:https://doi.org/10.1145/3274783.3275183)

low-speed experimental UAVs

Tomic, Ivana ORCID: 0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

LPWA networks

Bhatia, Laksh, Tomic, Ivana ORCID: 0000-0003-3502-5980, Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:https://doi.org/10.1145/3418528)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

LQR

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Milonidis, Efstathios and Halikias, George D. (2016) LQR distributed cooperative control of a formation of low-speed experimental UAVs. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, pp. 1-6. ISBN 978-1467398916 (doi:https://doi.org/10.1109/CONTROL.2016.7737541)

MAC protocol

Bhatia, Laksh, Tomić, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2018) LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18. ACM, New York, NY, USA, pp. 361-362. ISBN 978-1450359528 (doi:https://doi.org/10.1145/3274783.3275183)

Mac OS X

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

mach-o

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Machine Learning

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: 0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

machine-to-machine

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

magnetically driven flow

Bojarevics, V. ORCID: 0000-0002-7326-7748, Pericleous, K. ORCID: 0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

Malicious Spoofing Attacks

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: 0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

management

González-Granadillo, Gustavo, Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon, Navarro-Llobet, Diana, Okoh, Caxton, Nifakos, Sokratis, Xenakis, Christos and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Automated cyber and privacy risk management toolkit. Sensors, 21 (16):5493. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165493)

Measurement

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

medical technologies

Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George ORCID: 0000-0003-3559-5182 and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:https://doi.org/10.3390/s19235258)

Mental health

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: 0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:https://doi.org/10.2196/24879)

microgrid

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

misinformation

Loukas, George ORCID: 0000-0003-3559-5182, Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2020.2980090)

Mobile Edge Computing

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: 0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

modbus

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

monitoring

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

multi-agent system design

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

multi-agent systems

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

multi-stage attacks

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:https://doi.org/10.1109/TIFS.2021.3054966)

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

mutual authentication

Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372211)

mutual authentication and key derivation

Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC 2021. Annual Computer Security Applications Conference. Dec 6, 2021 - Dec 10, 2021. Austin, Texas, USA. Annual Computer Security Applications Conference (ACSAC) . Association for Computing Machinery (ACM), 1601 Broadway, Times Square, New York City. (In Press)

Neighbour disjoint multipath (NDM)

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Network

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

network layer attacks

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

Network topology

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

networks

Brett, Terry, Loukas, George ORCID: 0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID: 0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:https://doi.org/10.1103/PhysRevE.99.050303)

Node-disjoint multipath

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

nonlinear dynamics

Brett, Terry, Loukas, George ORCID: 0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID: 0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:https://doi.org/10.1103/PhysRevE.99.050303)

Occupancy Detection

Oliff, William, Filippoupolitis, Avgoustinos and Loukas, George ORCID: 0000-0003-3559-5182 (2017) Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017). ACM. ISBN 978-1-4503-5243-7 (doi:https://doi.org/10.1145/3109761.3109776)

Operational Technology

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)

optimisation

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Rass, Stefan and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Game-theoretic decision support for cyber forensic investigations. Sensors, 21 (16):5300. ISSN 1424-8220 (doi:https://doi.org/10.3390/s21165300)

optimization

Nisioti, Antonia, Loukas, George ORCID: 0000-0003-3559-5182, Laszka, Aron and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2021) Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16. pp. 2397-2412. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:https://doi.org/10.1109/TIFS.2021.3054966)

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

Theodorakopoulos, George, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai and Loukas, George ORCID: 0000-0003-3559-5182 (2020) On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971 (Print), 1941-0018 (Online) (In Press) (doi:https://doi.org/10.1109/TDSC.2020.2980270)

Optimized link state routing (OLSR)

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

Participatory Sensing

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

Pattern of life

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

PBL

Gan, D. ORCID: 0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

Peer Assisted Learning

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

peer-assessment

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

peer-group learning

Gan, D. ORCID: 0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

performance cost

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

Personality

Budimir, Sanja, Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal, Loukas, George ORCID: 0000-0003-3559-5182 and Roesch, Etienne (2021) Emotional reactions to cybersecurity breach situations: A scenario-based survey study. Journal of Medical Internet Research, 23 (5):e24879. ISSN 1438-8871 (Online) (doi:https://doi.org/10.2196/24879)

phishing

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:https://doi.org/10.1145/2835375)

Loukas, George ORCID: 0000-0003-3559-5182, Patrikakis, Charalampos Z. and Wilbanks, Linda R. (2020) Digital deception: Cyber fraud and online misinformation. IT Professional, 22 (2). pp. 19-20. ISSN 1520-9202 (Print), 1941-045X (Online) (doi:https://doi.org/10.1109/MITP.2020.2980090)

Positioning system

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

privacy

Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372211)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:https://doi.org/10.1109/ICDCS.2019.00190)

Problem-based Learning

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

process control

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

program verification

Liva, Giovanni ORCID: 0000-0002-9337-5762, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:https://doi.org/10.1007/s10664-019-09699-5)

prototypes

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Proximity based localization

Gurung, Sarita, Hossain, A.K.M. Mahtab and Kanchanasut, Kanchana (2014) A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20 (6). pp. 1431-1444. ISSN 1022-0038 (Print), 1572-8196 (Online) (doi:https://doi.org/10.1007/s11276-013-0685-7)

psychology

Budimir, S., Fontaine, J., Huijts, N., Haans, A., Loukas, G. ORCID: 0000-0003-3559-5182, Ras, I. and Roesch, E. (2020) Emotions, personality, and psychopathology of cybersecurity breach victims. Journal of Psychosomatic Research, 133:110059. ISSN 0022-3999 (Print), 1879-1360 (Online) (doi:https://doi.org/10.1016/j.jpsychores.2020.110059)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.07.011)

RAM Dump

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

real-time systems

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

reinforcement learning

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182, Bezemskij, Anatolij and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)

relay resilience

Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC 2021. Annual Computer Security Applications Conference. Dec 6, 2021 - Dec 10, 2021. Austin, Texas, USA. Annual Computer Security Applications Conference (ACSAC) . Association for Computing Machinery (ACM), 1601 Broadway, Times Square, New York City. (In Press)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting. 26-29 July 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (In Press)

rescue robots

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:https://doi.org/10.1109/PerComW.2014.6815228)

Resilience

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

risk-based security assessment

Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM40551.2019.8973948)

robotic vehicles

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

robustness

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Robustness properties of distributed configurations in multi-agent systems. In: 6th IFAC Symposium on System Structure and Control SSSC 2016. Elsevier, pp. 86-91. ISSN 2405-8963 (doi:https://doi.org/10.1016/j.ifacol.2016.07.500)

RPL

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

run-time monitoring

Khan, Taimoor ORCID: 0000-0002-5752-6420 and Tomic, Ivana ORCID: 0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.3032968)

runtime

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

safety

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

SCADA

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

Siniosoglou, Ilias, Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis, Sarigiannidis, Antonios, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Loukas, George ORCID: 0000-0003-3559-5182 and Sarigiannidis, Panagiotis (2020) NeuralPot: an industrial honeypot implementation based on convolutional neural networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE. ISBN 978-1728180878 ISSN 1530-1346 (Print), 2642-7389 (Online) (doi:https://doi.org/10.1109/ISCC50000.2020.9219712)

secure communication

Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372211)

Sani, Abubakar Sadiq, Yuan, Dong, Jin, Jiong, Gao, Longxiang, Yu, Shui and Dong, Zhao Yang (2018) Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93. pp. 849-859. ISSN 0167-739X (doi:https://doi.org/10.1016/j.future.2018.01.029)

Secure therapy

Abdur Rahman, Md., Shamim Hossain, M., Loukas, George ORCID: 0000-0003-3559-5182, Hassanain, Elham, Rahman, Syed Sadiqur, Alhamid, Mohammed F. and Guizani, Mohsen (2018) Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access, 6. pp. 72469-72478. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2018.2881246)

security

Abdur Rahman, Md, Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno, Barnes, Stuart, Fioranelli, Francesco, Yang, Shufan, Romain, Olivier, Abbasi, Qammer, Loukas, George ORCID: 0000-0003-3559-5182 and Imran, Muhammad (2019) A secure occupational therapy framework for monitoring cancer patients’ quality of life. Sensors, 19 (23):5258. ISSN 1424-8220 (doi:https://doi.org/10.3390/s19235258)

Bolgouras, Vaios, Ntantogian, Christoforos, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2019) Distributed key management in microgrids. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2125-2133. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2019.2941586)

Chronopoulos, Michail, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Grossklags, Jens (2017) An options approach to cybersecurity investment. IEEE Access, 6. pp. 12175-12186. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2773366)

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:https://doi.org/10.1145/2835375)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R. J., Filippoupolitis, Avgoustinos and Roesch, Etienne (2018) A taxonomy of cyber-physical threats and impact in the smart home. Computers and Security, 78. pp. 398-428. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.07.011)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:https://doi.org/10.1109/WF-IoT.2016.7845510)

Khan, Taimoor ORCID: 0000-0002-5752-6420 and Tomic, Ivana ORCID: 0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.3032968)

Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372211)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.2971707)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:https://doi.org/10.1109/TIFS.2019.2892005)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:https://doi.org/10.1109/ICDCS.2019.00190)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

security and privacy

Parsons, Emily Kate, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2020) How secure is home: assessing human susceptibility to IoT threats. In: PCI 2020: 24th Pan-Hellenic Conference on Informatics. ACM, pp. 64-71. ISBN 978-1450388979 (doi:https://doi.org/10.1145/3437120.3437277)

Security economics

Farao, Aristeidis, Panda, Sakshyam, Menesidou, Sofia Anna, Veliou, Entso, Episkopos, Nikolaos, Kalatzantonakis, George, Mohammadi, Farnaz, Georgopoulos, Nikolaos, Sirivianos, Michael, Salamanos, Nikos, Loizou, Spyros, Pingos, Michalis, Polley, John, Fielder, Andrew, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Xenakis, Christos (2020) SECONDO: A platform for cybersecurity investments and cyber insurance decisions. In: Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min and Khalil, Ismail, (eds.) Trust, Privacy and Security in Digital Business: Proceedings of the 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020. Lecture Notes in Computer Science book series (LNCS) (12395). Springer Nature, Cham, Switzerland, pp. 65-74. ISBN 978-3030589851 (doi:https://doi.org/10.1007/978-3-030-58986-8_5)

Fielder, Andrew, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Malacaria, Pasquale, Hankin, Chris and Smeraldi, Fabrizio (2016) Decision support approaches for cyber security investment. Decision Support Systems, 86. pp. 13-23. ISSN 0167-9236 (doi:https://doi.org/10.1016/j.dss.2016.02.012)

Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Karapistoli, Eirini, Elsemary, Hadeep, Alpcan, Tansu, Khuzani, MHR and Economides, Anastasios A. (2016) Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks, 56. pp. 28-42. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2016.11.008)

security protocols

Sani, Abubakar Sadiq, Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing, Bao, Wei, Vucetic, Branka and Dong, Zhao Yang (2020) Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. In: 2019 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728119816 ; 9781728119823 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM40551.2019.8973948)

self-healing

Tomic, Ivana ORCID: 0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

Semantic attacks

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

Semantic attacks

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

Semantic social engineering

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys (CSUR), 48 (3):37. ISSN 0360-0300 (Print), 1557-7341 (Online) (doi:https://doi.org/10.1145/2835375)

Semantic textual similarity

Kasnesis, Panagiotis, Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Patrikakis, Charalampos and Loukas, George ORCID: 0000-0003-3559-5182 (2021) Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Applied Soft Computing, 108:107413. ISSN 1568-4946 (doi:https://doi.org/10.1016/j.asoc.2021.107413)

semantics

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

sensors

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

Session-to-session analysis

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

Gresty, David W., Loukas, George ORCID: 0000-0003-3559-5182, Gan, Diane ORCID: 0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Shared economy

Rahman, Md. Abdur, Loukas, George ORCID: 0000-0003-3559-5182, Abdullah, Syed Maruf, Abdu, Areej, Rahman, Syed Sadiqur, Hassanain, Elham and Arafa, Yasmine (2019) Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ACM, New York, USA, pp. 404-407. ISBN 978-1450367653 (doi:https://doi.org/10.1145/3323873.3326924)

simulated learning

Gan, D. ORCID: 0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:https://doi.org/10.1109/CSCI.2017.313)

Site-survey-free

Hossain, A.K.M. Mahtab and Soh, Wee-Seng (2015) A survey of calibration-free indoor positioning systems. Computer Communications, 66. pp. 1-13. ISSN 0140-3664 (Print), 1873-703X (Online) (doi:https://doi.org/10.1016/j.comcom.2015.03.001)

situational awareness

Sani, Abubakar Sadiq, Yuan, Dong, Ogaji, S. and Dong, Zhao Yang (2020) CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. In: Tian, Yuchu and Levy, David Charles, (eds.) Handbook of Real-Time Computing. Springer, Singapore, pp. 1-49. ISBN 9789814585873 (doi:https://doi.org/10.1007/978-981-4585-87-3_48-1)

smart contracts

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM41954.2020.9281929)

smart grid

Radoglou Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Efstathopoulos, Georgios and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) ARIES: a novel multivariate intrusion detection system for smart grid. Sensors, 20 (18):5305. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s20185305)

Sani, Abubakar Sadiq, Meng, Ke and Dong, Zhao Yang (2021) SComm: a real-time mutually authenticated secure communication framework for smart grids. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372211)

Sani, Abubakar Sadiq, Yuan, Dong, Mens, Ke and Dong, Zhao Yang (2021) DIACS: A blockchain-based model for systematic data integrity assessment and control. In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728188973 ; 9781728188980 ISSN 2167-9665 (Print), 2472-8152 (Online) (doi:https://doi.org/10.1109/ISGT49243.2021.9372235)

smart grids

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM41954.2020.9281929)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting. 26-29 July 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (In Press)

Smart homes

Budimir, S., Fontaine, J., Huijts, N., Haans, A., Loukas, G. ORCID: 0000-0003-3559-5182, Ras, I. and Roesch, E. (2020) Emotions, personality, and psychopathology of cybersecurity breach victims. Journal of Psychosomatic Research, 133:110059. ISSN 0022-3999 (Print), 1879-1360 (Online) (doi:https://doi.org/10.1016/j.jpsychores.2020.110059)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182, Bezemskij, Anatolij and Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 (2020) Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics & Security. ISSN 1556-6013 (Print), 1556-6021 (Online)

smart vehicles

Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC 2021. Annual Computer Security Applications Conference. Dec 6, 2021 - Dec 10, 2021. Austin, Texas, USA. Annual Computer Security Applications Conference (ACSAC) . Association for Computing Machinery (ACM), 1601 Broadway, Times Square, New York City. (In Press)

Social Engineering

Gan, Diane ORCID: 0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2016.2616285)

Heartfield, Ryan, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:https://doi.org/10.1109/SERA.2017.7965754)

Social media

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

Social networks

Gan, Diane ORCID: 0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:https://doi.org/10.3390/fi7010067)

Heartfield, Ryan and Loukas, George ORCID: 0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:https://doi.org/10.22619/IJCSA.2016.100106)

software

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

software/program verification

Giovanni, Liva, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering. ISSN 0098-5589 (In Press) (doi:https://doi.org/10.1109/TSE.2019.2948351)

solidification

Bojarevics, V. ORCID: 0000-0002-7326-7748, Pericleous, K. ORCID: 0000-0002-7426-9999, Garrido, M., Fautrelle, Y. and Davoust, L. (2015) Travelling magnetic field mixing for particle dispersion in liquid metal. Magnetohydrodynamics, 51 (3). pp. 249-255. ISSN 0024-998X (Print), 1574-0579 (Online)

sparse decision making

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2020.3006066)

stalking

Gan, Diane ORCID: 0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:https://doi.org/10.3390/fi7010067)

Standard Model

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Loukas, George ORCID: 0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2906290)

standards

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) KEF: a Key Exchange Framework for operational technology security standards and guidelines. In: Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 2022. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (Unpublished)

STEM teaching

Chadwick, David, Gan, Diane ORCID: 0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

sugar

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:https://doi.org/10.1109/WiMOB.2018.8589095)

supply chain attacks

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2020) Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. In: 2020 IEEE Power & Energy Society General Meeting (PESGM). IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1-5. ISBN 9781728155081 ; 9781728155098 ISSN 1944-9925 (Print), 1944-9933 (Online) (doi:https://doi.org/10.1109/PESGM41954.2020.9281929)

systems

Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:https://doi.org/10.1109/JPROC.2017.2725642)

Taxonomy

Breza, Michael, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie (2018) Failures from the Environment, a Report on the First FAILSAFE workshop. ACM SIGCOMM Computer Communication Review, 48 (2). pp. 40-45. ISSN 0146-4833 (doi:https://doi.org/10.1145/3213232.3213238)

time semantics

Liva, Giovanni ORCID: 0000-0002-9337-5762, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:https://doi.org/10.1007/s10664-019-09699-5)

time-based zero knowledge proof of knowledge

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Yeoh, Phee Lep, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Xyreum: A high-performance and scalable blockchain for iiot security and privacy. In: Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, pp. 1920-1930. ISBN 9781728125190 ; 9781728125206 ISSN 1063-6927 (Print), 2575-8411 (Online) (doi:https://doi.org/10.1109/ICDCS.2019.00190)

Time-varying networks

Brett, Terry, Loukas, George ORCID: 0000-0003-3559-5182, Moreno, Yamir and Perra, Nicola ORCID: 0000-0002-5559-3064 (2019) Spreading of computer viruses on time-varying networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99 (5):050303(R). ISSN 1539-3755 (doi:https://doi.org/10.1103/PhysRevE.99.050303)

timed automata

Liva, Giovanni ORCID: 0000-0002-9337-5762, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:https://doi.org/10.1007/s10664-019-09699-5)

tools

Liva, Giovanni, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:https://doi.org/10.1145/3193992.3193997)

training and awareness

Panda, Sakshyam, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George ORCID: 0000-0003-3559-5182 and Laoudias, Christos (2020) Optimizing investments in cyber hygiene for protecting healthcare users. In: Di Pierro, Alessandra, Malacaria, Pasquale and Nagarajan, Rajagopal, (eds.) From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retirement. Lecture Notes in Computer Science, 12065 . Springer, pp. 268-291. ISBN 978-3030411022 (doi:https://doi.org/10.1007/978-3-030-41103-9_11)

trapdoor commitment scheme

Xu, Guangquan, Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Liang, Kaitai, Wang, Hao and Li, Xiaotong (2019) DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE Access, 7. pp. 174740-174749. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2952213)

trust

Tomic, Ivana ORCID: 0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

tutorials

Serpanos, Dimitrios ORCID: 0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID: 0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:https://doi.org/10.1109/MDAT.2018.2816943)

TV

Cui, Yuanbo, Gao, Fei, Shi, Yijie, Yin, Wei, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062 and Liang, Kaitai (2020) An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access, 8. pp. 99024-99036. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2996940)

two-way trust recommendation

Xu, Guangquan, Zhao, Yuyang, Litao, Jiao, Feng, Meiqi, Ji, Zhong, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Chen, Si and Zheng, Xi (2020) TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things, 8 (12). pp. 9559-9567. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2020.3006066)

UAVs

Tomic, Ivana ORCID: 0000-0003-3502-5980 and Halikias, George D. (2016) Performance analysis of distributed control configurations in LQR multi-agent system design. In: 2016 UKACC 11th International Conference on Control (CONTROL). IEEE. ISBN 978-1467398923 (doi:https://doi.org/10.1109/CONTROL.2016.7737530)

universal composability

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei and Dong, Zhao Yang (2020) A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE Transactions on Industrial Informatics, 17 (1). pp. 534-546. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:https://doi.org/10.1109/TII.2020.2971707)

Sani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka and Bertino, Elisa (2019) Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE Transactions on Information Forensics and Security, 14 (8). pp. 2113-2127. ISSN 1556-6013 (doi:https://doi.org/10.1109/TIFS.2019.2892005)

Sani, Abubakar Sadiq, Yuan, Dong, Bertino, Elisa and Dong, Zhao Yang (2021) Crypto-Chain: a relay resilience framework for smart vehicles. In: ACSAC 2021. Annual Computer Security Applications Conference. Dec 6, 2021 - Dec 10, 2021. Austin, Texas, USA. Annual Computer Security Applications Conference (ACSAC) . Association for Computing Machinery (ACM), 1601 Broadway, Times Square, New York City. (In Press)

Sani, Abubakar Sadiq, Yuan, Dong, Meng, Ke and Dong, Zhao Yang (2021) R-Chain: a universally composable relay resilience framework for smart grids. In: 2021 IEEE Power & Energy Society General Meeting. 26-29 July 2021. IEEExplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ. (In Press)

UNIX

Bayley, Fletcher and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

vehicles

Loukas, George ORCID: 0000-0003-3559-5182, Karapistoli, Eirini, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Sarigiannidis, Panagiotis, Bezemskij, Anatolij and Vuong, Tuan (2018) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks, 84. pp. 124-147. ISSN 1570-8705 (doi:https://doi.org/10.1016/j.adhoc.2018.10.002)

Loukas, George ORCID: 0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2017.2782159)

vehicular security

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID: 0000-0003-3559-5182 and Gan, Diane ORCID: 0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Bezemskij, Anatolij, Loukas, George ORCID: 0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID: 0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:https://doi.org/10.1109/IUCC-CSS.2016.017)

Loukas, George ORCID: 0000-0003-3559-5182, Yoon, Yongpil, Sakellari, Georgia ORCID: 0000-0001-7238-8700, Vuong, Tuan and Heartfield, Ryan (2016) Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Simulation Modelling Practice and Theory, 73. pp. 83-94. ISSN 1569-190X (Print), 1878-1462 (Online) (doi:https://doi.org/10.1016/j.simpat.2016.08.005)

Virtual reality

Odeleye, Blessing, Loukas, George ORCID: 0000-0003-3559-5182, Heartfield, Ryan and Spyridonis, Fotios ORCID: 0000-0003-4253-365X (2021) Detecting framerate-oriented cyber attacks on user experience in virtual reality. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. VR4Sec.

Volafox

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

VolaGUI

Coppock, Tom and Gan, Diane ORCID: 0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Wi-Fi

Hossain, A. K. M. Mahtab and Loukas, George ORCID: 0000-0003-3559-5182 (2019) Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. In: MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, pp. 424-433. ISBN 978-1450372831 (doi:https://doi.org/10.1145/3360774.3360791)

wide area systems

Bhatia, Laksh, Tomic, Ivana ORCID: 0000-0003-3502-5980, Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:https://doi.org/10.1145/3418528)

wireless networked control systems

Fu, Anqi, Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (0219) Asynchronous sampling for decentralized periodic event-triggered control. In: 2019 American Control Conference (ACC). IEEE, pp. 145-150. ISBN 978-1538679012 ISSN 0743-1619 (Print), 2378-5861 (Online)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

wireless sensor and actuator networks

Tomic, Ivana ORCID: 0000-0003-3502-5980, Bhatia, Laksh, Breza, Michael J. and McCann, Julie A. (2018) The limits of LoRaWAN in event-triggered wireless networked control systems. In: 2018 UKACC 12th International Conference on Control (CONTROL). IEEE, pp. 101-106. ISBN 978-1538628645 (doi:https://doi.org/10.1109/CONTROL.2018.8516774)

Wireless sensor networks

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Alberola, Rodolfo De Paz (2016) Neighbour-disjoint multipath for low-power and lossy networks. ACM Transactions on Sensor Networks, 12 (3):23. pp. 1-25. ISSN 1550-4859 (Print), 1550-4867 (Online) (doi:https://doi.org/10.1145/2914792)

Hossain, A. K. M. Mahtab, Sreenan, Cormac J. and Fedor, Szymon (2014) A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, pp. 308-315. ISBN 978-1-4799-4617-4 ISSN 2325-2936 (Print), 2325-2944 (Online) (doi:https://doi.org/10.1109/DCOSS.2014.43)

Li, Xiaoming, Xu, Guangquan, Zheng, Xi, Liang, Kaitai, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Li, Tao, Wang, Wei and Shen, Chao (2019) Using sparse representation to detect anomalies in complex WSNs. ACM Transactions on Intelligent Systems and Technology, 10 (6):64. ISSN 2157-6904 (Print), 2157-6912 (Online) (doi:https://doi.org/10.1145/3331147)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Chen, Po-Yu, Breza, Michael J. and McCann, Julie A. (2018) Antilizer: run time self-healing security for wireless sensor networks. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18. ACM, New York, USA, pp. 107-116. ISBN 978-1450360937 (doi:https://doi.org/10.1145/3286978.3287029)

wireless sensor/actuator networks

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael, Jackson, Greg, Bhatia, Laksh and McCann, Julie A. (2019) Design and evaluation of jamming resilient cyber-physical systems. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE. ISBN 978-1538679753 (doi:https://doi.org/10.1109/Cybermatics_2018.2018.00138)

Tomic, Ivana ORCID: 0000-0003-3502-5980, Breza, Michael and McCann, Julie A. (2019) Jamming-resilient control and communication framework for cyber physical systems. In: Living in the Internet of Things (IoT 2019). IET, London, UK. ISBN 978-1839530890 (doi:https://doi.org/10.1049/cp.2019.0132)

wireless sensors and actuators

Bhatia, Laksh, Tomic, Ivana ORCID: 0000-0003-3502-5980, Fu, Anqi, Breza, Michael and McCann, Julie A. (2021) Control communication co-design for wide area cyber-physical systems. ACM Transactions on Cyber-Physical Systems, 5 (2). pp. 1-27. ISSN 2378-962X (Print), 2378-9638 (Online) (doi:https://doi.org/10.1145/3418528)

World wide web

Gresty, David, Gan, Diane ORCID: 0000-0002-0920-7572, Loukas, George ORCID: 0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:https://doi.org/10.1016/j.diin.2016.01.015)

wsn

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

This list was generated on Mon Dec 6 14:13:52 2021 UTC.