Skip to main content

Research Repository

Advanced Search

Outputs (16)

Reliability Analysis of Fault Tolerant Memory Systems (2023)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023, November). Reliability Analysis of Fault Tolerant Memory Systems. Presented at The 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2023), Piraeus, Greece

This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction... Read More about Reliability Analysis of Fault Tolerant Memory Systems.

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks (2023)
Presentation / Conference Contribution
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023, December). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. Presented at 2023 IEEE Globecom Workshops (GC Wkshps): Workshop on Enabling Security, Trust, and Privacy in 6G Wireless Systems, Kuala Lumpur, Malaysia

As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, t... Read More about Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis (2023)
Presentation / Conference Contribution
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (2023, November). Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. Presented at IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMDAD) 2023, Edinburgh, UK

Malware research has predominantly focused on Windows and Android Operating Systems (OS), leaving Mac OS malware relatively unexplored. This paper addresses the growing threat of Mac OS malware by leveraging Machine Learning (ML) techniques. We propo... Read More about Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Cyber Malware: Offensive and Defensive Systems (2023)
Book
Almomani, I., Maglaras, L. A., Ferrag, M. A., & Ayres, N. (Eds.). (2023). Cyber Malware: Offensive and Defensive Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-34969-0

This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta... Read More about Cyber Malware: Offensive and Defensive Systems.

Machine Learning for Smart Healthcare Management Using IoT (2023)
Book Chapter
Yigit, Y., Duran, K., Moradpoor, N., Maglaras, L., Van Huynh, N., & Canberk, B. (in press). Machine Learning for Smart Healthcare Management Using IoT. In IoT and ML for Information Management: A Smart Healthcare Perspective. Springer

The convergence of Machine Learning (ML) and the Internet of Things (IoT) has brought about a paradigm shift in healthcare, ushering in a new era of intelligent healthcare management. This powerful amalgamation is driving transformative changes acros... Read More about Machine Learning for Smart Healthcare Management Using IoT.

Hybrid Threats, Cyberterrorism and Cyberwarfare (2023)
Book
Ferrag, M. A., Kantzavelou, I., Maglaras, L., & Janicke, H. (Eds.). (2024). Hybrid Threats, Cyberterrorism and Cyberwarfare. Boca Raton: CRC Press. https://doi.org/10.1201/9781003314721

Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism,... Read More about Hybrid Threats, Cyberterrorism and Cyberwarfare.

The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System (2023)
Presentation / Conference Contribution
Moradpoor, N., Maglaras, L., Abah, E., & Robles-Durazno, A. (2023, June). The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System. Presented at 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Pafos, Cyprus

The protection of Critical National Infrastructure is extremely important due to nations being dependent on their operation and steadiness. Any disturbance to this infrastructure could have a devastating consequence on physical security, economic wel... Read More about The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System.

A Blockchain-based two Factor Honeytoken Authentication System (2023)
Presentation / Conference Contribution
Papaspirou, V., Maglaras, L., Kantzavelou, I., Moradpoor, N., & Katsikas, S. (2023, September). A Blockchain-based two Factor Honeytoken Authentication System. Poster presented at 28th European Symposium on Research in Computer Security (ESORICS), The Hague

This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the authentication method, preventing various attacks, including tampering att... Read More about A Blockchain-based two Factor Honeytoken Authentication System.

A novel autonomous container-based platform for cybersecurity training and research (2023)
Journal Article
Chouliaras, N., Kantzavelou, I., Maglaras, L., Pantziou, G., & Amine Ferrag, M. (2023). A novel autonomous container-based platform for cybersecurity training and research. PeerJ Computer Science, 9, Article e1574. https://doi.org/10.7717/peerj-cs.1574

Cyberattacks, particularly those targeting systems that store or handle sensitive data, have become more sophisticated in recent years. To face increasing threats, continuous capacity building and digital skill competence are needed. Cybersecurity ha... Read More about A novel autonomous container-based platform for cybersecurity training and research.