Skip to main content

Research Repository

Advanced Search

Outputs (99)

Vulnerability Analysis of Network Scanning on SCADA Systems (2018)
Journal Article
Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018). Vulnerability Analysis of Network Scanning on SCADA Systems. Security and Communication Networks, 2018, Article 3794603. https://doi.org/10.1155/2018/3794603

Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructure environments for decades. With the demand for remote facilities to be con... Read More about Vulnerability Analysis of Network Scanning on SCADA Systems.

Authentication Protocols for Internet of Things: A Comprehensive Survey (2017)
Journal Article
Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., & Shu, L. (2017). Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks, 2017, Article 6562953. https://doi.org/10.1155/2017/6562953

In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail.... Read More about Authentication Protocols for Internet of Things: A Comprehensive Survey.

Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? (2017)
Journal Article
Chapman, S., Smith, R., Maglaras, L., & Janicke, H. (2017). Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?. Journal of Sensor and Actuator Networks, 6(3), Article 16. https://doi.org/10.3390/jsan6030016

This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject areas: cyber defence exerci... Read More about Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?.

The industrial control system cyber defence triage process (2017)
Journal Article
Cook, A., Janicke, H., Smith, R., & Maglaras, L. (2017). The industrial control system cyber defence triage process. Computers and Security, 70, 467-481. https://doi.org/10.1016/j.cose.2017.07.009

The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats in an effective and cost-sensitive manner that does not expose their operati... Read More about The industrial control system cyber defence triage process.

Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems (2017)
Journal Article
Yousaf, A., Loan, A., Babiceanu, R. F., Maglaras, L., & Yousaf, O. (2017). Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. Computers and Security, 70, 124-143. https://doi.org/10.1016/j.cose.2017.05.011

In this paper an analysis of physical layer intruders, for direct sequence spread spectrum systems, is presented. Physical layer intruders are traditional jammers that do not have any intelligence as compared to smart jammers that have signal process... Read More about Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems.

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (2017)
Journal Article
Cook, A., Smith, R. G., Maglaras, L., & Janicke, H. (2017). SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. International Journal of Cyber Warfare and Terrorism, 7(2), Article 1. https://doi.org/10.4018/ijcwt.2017040101

The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for inv... Read More about SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.

MIMO Techniques for Jamming Threat Suppression in Vehicular Networks (2016)
Journal Article
Kosmanos, D., Prodromou, N., Argyriou, A., Maglaras, L. A., & Janicke, H. (2016). MIMO Techniques for Jamming Threat Suppression in Vehicular Networks. Mobile Information Systems, 2016, Article 8141204. https://doi.org/10.1155/2016/8141204

Vehicular ad hoc networks have emerged as a promising field of research and development, since they will be able to accommodate a variety of applications, ranging from infotainment to traffic management and road safety. A specific security-related co... Read More about MIMO Techniques for Jamming Threat Suppression in Vehicular Networks.

Human behaviour as an aspect of cybersecurity assurance (2016)
Journal Article
Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667-4679. https://doi.org/10.1002/sec.1657

There continue to be numerous breaches publicised pertaining to cybersecurity despite security practices being applied within industry for many years. This paper is intended to be the first in a number of papers as research into cybersecurity assuran... Read More about Human behaviour as an aspect of cybersecurity assurance.

Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems (2016)
Journal Article
Maglaras, L. A., Jiang, J., & Cruz, T. J. (2016). Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. Journal of Information Security and Applications, 30, 15-26. https://doi.org/10.1016/j.jisa.2016.04.002

Modern Supervisory Control and Data Acquisition (SCADA) systems used by the electric utility industry to monitor and control electric power generation, transmission and distribution are recognized today as critical components of the electric power de... Read More about Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems.