Skip to main content

Research Repository

Advanced Search

Outputs (18)

Autonomous Queue Management System in Software-defined Routers for Sensor Networks (2024)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Karantzalos, K., Gursu, K., Ozdem, M., Buchanan, W. J., & Canberk, B. (2024, November). Autonomous Queue Management System in Software-defined Routers for Sensor Networks. Presented at 2024 IEEE 10th World Forum on Internet of Things (WF-IoT), Ottawa, Canada

Recent advancements in sensor networks, the In-ternet of Things (IoT), and machine communication technologies have led to a significant increase in network traffic across various domains. However, this growth has brought forth the critical challenge... Read More about Autonomous Queue Management System in Software-defined Routers for Sensor Networks.

SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare (2024)
Journal Article
Bensaid, R., Labraoui, N., Abba Ari, A. A., Saidi, H., Mboussam Emati, J. H., & Maglaras, L. (2024). SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare. PeerJ Computer Science, 10, Article e2414. https://doi.org/10.7717/peerj-cs.2414

Smart healthcare systems are gaining increased practicality and utility, driven by continuous advancements in artificial intelligence technologies, cloud and fog computing, and the Internet of Things (IoT). However, despite these transformative devel... Read More about SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare.

AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks (2024)
Journal Article
Yigit, Y., Maglaras, L., Buchanan, W. J., Canberk, B., Shin, H., & Duong, T. Q. (2024). AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks. IEEE Internet of Things, 11(22), 36168-36181. https://doi.org/10.1109/jiot.2024.3455089

Digital twin technology is crucial to the development of the sixth-generation (6G) Internet of Vehicles (IoV) as it allows the monitoring and assessment of the dynamic and complicated vehicular environment. However, 6G IoV networks have critical chal... Read More about AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks.

Machine Learning for Smart Healthcare Management Using IoT (2024)
Book Chapter
Yigit, Y., Duran, K., Moradpoor, N., Maglaras, L., Van Huynh, N., & Canberk, B. (2024). Machine Learning for Smart Healthcare Management Using IoT. In IoT and ML for Information Management: A Smart Healthcare Perspective (135-166). Springer. https://doi.org/10.1007/978-981-97-5624-7_4

This chapter explores the significant impact of Machine Learning (ML) and the Internet of Things (IoT) on smart healthcare management, marking a new era of innovation with enhanced patient care and health outcomes. The fusion of IoT devices for real-... Read More about Machine Learning for Smart Healthcare Management Using IoT.

PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme (2024)
Presentation / Conference Contribution
Yaqub, Z., Yigit, Y., Maglaras, L., Tan, Z., & Wooderson, P. (2024, April). PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme. Presented at The 20th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2024), Abu Dhabi, UAE

In the rapidly evolving landscape of Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flow. However, VANETs face significant security and privacy challenges due to... Read More about PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.

Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario (2024)
Presentation / Conference Contribution
Adesanya, O. M., Moradpoor, N., Maglaras, L., Lim, I. S., & Ferrag, M. A. (2024, April). Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario. Presented at 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Abu Dhabi, United Arab Emirates

The rapid growth of Internet of Things technology has introduced an era of numerous interconnected devices, transforming the communication with the physical world. However, the security and privacy of the data generated and stored on these devices ha... Read More about Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario.

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records (2024)
Presentation / Conference Contribution
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (2024, April). Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records. Presented at DCOSS-IoT 2024, Abu Dhabi, United Arab Emirates

The health sector stands as one of the most crucial and vulnerable domains, harbouring extensive personal data. Particularly, Electronic Health Records store information in electronic media where users lack control over their data. Unauthorized acces... Read More about Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.

A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism (2024)
Presentation / Conference Contribution
Papaspirou, V., Kantzavelou, I., Yigit, Y., Maglaras, L., & Katsikas, S. (2024, July). A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism. Presented at ARES 2024: The 19th International Conference on Availability, Reliability and Security, Vienna, Austria

The evolution of authentication mechanisms in ensuring secure access to systems has been crucial for mitigating vulnerabilities and enhancing system security. However, despite advancements in two-factor authentication (2FA) and multi-factor authentic... Read More about A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism.

Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins (2024)
Presentation / Conference Contribution
Yigit, Y., Kioskli, K., Bishop, L., Chouliaras, N., Maglaras, L., & Janicke, H. (2024, June). Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins. Presented at 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Perth, Australia

This paper delves into enhancing cybersecurity training efficacy through an in-depth examination of gamified learning, behavioural strategies, and the deployment of digital twins. It identifies the critical role of behavioural strategies in bolsterin... Read More about Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins.

APOLLO: A Proximity-Oriented, Low-Layer Orchestration Algorithm for Resources Optimization in Mist Computing (2024)
Journal Article
Babaghayou, M., Chaib, N., Maglaras, L., Yigit, Y., Amine Ferrag, M., Marsh, C., & Moradpoor, N. (2025). APOLLO: A Proximity-Oriented, Low-Layer Orchestration Algorithm for Resources Optimization in Mist Computing. Wireless Networks, 31, 679–694. https://doi.org/10.1007/s11276-024-03791-5

The fusion of satellite technologies with the Internet of Things (IoT) has propelled the evolution of mobile computing, ushering in novel communication paradigms and data management strategies. Within this landscape, the efficient management of compu... Read More about APOLLO: A Proximity-Oriented, Low-Layer Orchestration Algorithm for Resources Optimization in Mist Computing.