Skip to main content

Research Repository

Advanced Search

Outputs (99)

Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV (2025)
Presentation / Conference Contribution
Andriambelo, N. H., Moradpoor, N., & Maglaras, L. (2025, May). Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV. Presented at CCNI 2025: 3rd International Workshop on Cybersecurity of Critical National Infrastructures (co-organized with IEEE WOWMOM 2025), Fort Worth, Texas

Decentralized and Connected Autonomous Vehicle (CAV) networks present significant opportunities for improving road safety, efficiency, and traffic management. However, the widespread deployment of these systems is hindered by critical security and pr... Read More about Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV.

A Blockchain-Powered Defence System Against DDoS Attacks with Incentivised Collaboration (2025)
Presentation / Conference Contribution
Rajesh, H., Moradpoor, N., Waqas, M., & Maglaras, L. (2025, June). A Blockchain-Powered Defence System Against DDoS Attacks with Incentivised Collaboration. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

Distributed Denial of Service (DDoS) attacks continuously pose a significant threat to online services by overwhelming them, rendering them unavailable to legitimate users. This underscores the need for more sophisticated techniques with robust detec... Read More about A Blockchain-Powered Defence System Against DDoS Attacks with Incentivised Collaboration.

Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems (2025)
Presentation / Conference Contribution
Korac, S., Maglaras, L., Moradpoor, N., Kioskli, K., Buchanan, W., & Canberk, B. (2025, June). Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

Ransomware has been predominantly a threat to Windows systems. But, Linux systems became interesting for cybercriminals and this trend is expected to continue. This endangers IoT ecosystems, whereas many IoT systems are based on Linux (e.g. cloud inf... Read More about Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems.

ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality (2025)
Presentation / Conference Contribution
Alsop, H., Alsop, D., Solomon, J., Aumento, L., Butters, M., Millar, C., Maglaras, L., Yigit, Y., Moradpoor, N., & Canberk, B. (2025, June). ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality. Poster presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

End-to-end encryption (E2EE) ensures that only the intended recipient(s) can read messages. Popular instant messaging (IM) applications such as Signal, WhatsApp, Apple's iMessage, and Telegram claim to offer E2EE. However, client-side scanning (CSS)... Read More about ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality.

Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities (2025)
Journal Article
Yigit, Y., Ferrag, M. A., Ghanem, M. C., Sarker, I. H., Maglaras, L. A., Chrysoulas, C., Moradpoor, N., Tihanyi, N., & Janicke, H. (2025). Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities. Sensors, 25(6), Article 1666. https://doi.org/10.3390/s25061666

Critical National Infrastructures (CNIs)—including energy grids, water systems, transportation networks, and communication frameworks—are essential to modern society yet face escalating cybersecurity threats. This review paper comprehensively analyze... Read More about Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities.

A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping (2025)
Journal Article
Thomson, A., Maglaras, L., & Moradpoor, N. (2025). A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping. Future Internet, 17(3), Article 120. https://doi.org/10.3390/fi17030120

Malicious domains are part of the landscape of the internet but are becoming more prevalent and more dangerous both to companies and to individuals. They can be hosted on various technologies and serve an array of content, including malware, command... Read More about A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping.

EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit (2025)
Presentation / Conference Contribution
Alpdag, K., Moradpoor, N., Hasina Andriambelo, N., Wooderson, P., & Maglaras, L. (2024, December). EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit. Presented at SINCONF 2024: 17th International Conference on Security of Information and Networks, Online

In the rapidly evolving realm of electric vehicle technology, safeguarding the cybersecurity of both electric vehicles and their charging infrastructure has become fundamental. The integration of electric vehicles and their charging stations into the... Read More about EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit.

Adversarial Attacks on Supervised Energy-Based Anomaly Detection in Clean Water Systems (2025)
Journal Article
Moradpoor, N., Abah, E., Robles-Durazno, A., & Maglaras, L. (2025). Adversarial Attacks on Supervised Energy-Based Anomaly Detection in Clean Water Systems. Electronics, 14(3), Article 639. https://doi.org/10.3390/electronics14030639

Critical National Infrastructure includes large networks such as telecommunications, transportation, health services, police, nuclear power plants, and utilities like clean water, gas, and electricity. The protection of these infrastructures is cruci... Read More about Adversarial Attacks on Supervised Energy-Based Anomaly Detection in Clean Water Systems.

Autonomous Queue Management System in Software-defined Routers for Sensor Networks (2024)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Karantzalos, K., Gursu, K., Ozdem, M., Buchanan, W. J., & Canberk, B. (2024, November). Autonomous Queue Management System in Software-defined Routers for Sensor Networks. Presented at 2024 IEEE 10th World Forum on Internet of Things (WF-IoT), Ottawa, Canada

Recent advancements in sensor networks, the In-ternet of Things (IoT), and machine communication technologies have led to a significant increase in network traffic across various domains. However, this growth has brought forth the critical challenge... Read More about Autonomous Queue Management System in Software-defined Routers for Sensor Networks.