Skip to main content

Research Repository

Advanced Search

Outputs (47)

Cyber Ranges and TestBeds for Education, Training, and Research (2021)
Journal Article
Chouliaras, N., Kittes, G., Kantzavelou, I., Maglaras, L., Pantziou, G., & Ferrag, M. A. (2021). Cyber Ranges and TestBeds for Education, Training, and Research. Applied Sciences, 11(4), Article 1809. https://doi.org/10.3390/app11041809

In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting... Read More about Cyber Ranges and TestBeds for Education, Training, and Research.

A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems (2021)
Journal Article
Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Cook, A., Janicke, H., & Jones, K. (2021). A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems. International Journal of Smart Security Technologies, 8(1), 16-34. https://doi.org/

Incident response teams cannot prepare for every situation or predict every crisis, especially when they involve cyber-physical systems. As a result, training activities need to be provided to support operating in challenging situations to develop co... Read More about A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems.

Developing Cyber Buffer Zones (2020)
Book Chapter
Robinson, M., Jones, K., Janicke, H., & Maglaras, L. (2020). Developing Cyber Buffer Zones. In M. Khosrow-Pour (Ed.), Encyclopedia of Criminal Activities and the Deep Web (287-303). IGI Global. https://doi.org/10.4018/978-1-5225-9715-5.ch019

Cyber peacekeeping is a new and novel field of research that focuses on the ways that nations and society can restore peace and security in the aftermath of cyber warfare. In this article, the authors make an original contribution to the field by dev... Read More about Developing Cyber Buffer Zones.

Cyber Threats in the Healthcare Sector and Countermeasures (2020)
Book Chapter
Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2020). Cyber Threats in the Healthcare Sector and Countermeasures. In A. Masouras, G. Maris, & A. Kavoura (Eds.), Entrepreneurial Development and Innovation in Family Businesses and SMEs (109-124). IGI Global.

Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get una... Read More about Cyber Threats in the Healthcare Sector and Countermeasures.

The Cost Perspective of Password Security (2020)
Book Chapter
Maglaras, L., Janicke, H., & Ferrag, M. A. (2020). The Cost Perspective of Password Security. In B. B. Gupta, & D. Gupta (Eds.), Handbook of Research on Multimedia Cyber Security (319-330). IGI Global. https://doi.org/10.4018/978-1-7998-2701-6.ch017

This study technically analyses the maximum number of combinations for common passwords up to 12 characters long. A maximum storage size necessary for the creation of a data base that holds all possible passwords up to 12 characters is also presented... Read More about The Cost Perspective of Password Security.

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks (2020)
Journal Article
Derhab, A., Bouras, A., Belaoued, M., Maglaras, L., & Khan, F. A. (2020). Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors, 20(21), Article 6106. https://doi

In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored nod... Read More about Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.

The Security Aspects of Automotive Over-the-Air Updates (2020)
Journal Article
Howden, J., Maglaras, L., & Ferrag, M. A. (2020). The Security Aspects of Automotive Over-the-Air Updates. International Journal of Cyber Warfare and Terrorism, 10(2), 64-81. https://doi.org/10.4018/ijcwt.2020040104

Over-the-air (OTA) update is a method for vehicle manufacturers to remotely distribute maintenance updates, performance, and feature enhancements through the vehicle's lifespan. Recalls of vehicles cost the manufactures a lot of money. OTA solves the... Read More about The Security Aspects of Automotive Over-the-Air Updates.

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks (2020)
Journal Article
Ferrag, M. A., Maglaras, L., Ahmim, A., Derdour, M., & Janicke, H. (2020). RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet, 12(3), Article 44. https://doi.org/10.3390/fi12030044

This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip a... Read More about RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.

Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems (2020)
Journal Article
Vourgidis, I., Maglaras, L., Alfakeeh, A. S., Al-Bayatti, A. H., & Ferrag, M. A. (2020). Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Appli

The field of cooperative intelligent transport systems and more specifically pedestrians to vehicles could be characterized as quite challenging, since there is a broad research area to be studied, with direct positive results to society. Pedestrians... Read More about Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems.

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed (2019)
Journal Article
Maglaras, L., Cruz, T., Ferrag, M. A., & Janicke, H. (2020). Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technology Letters, 3(1), Article e132. https://doi.org/10.1002/itl2.132

Security of Critical National Infrastructures (CNI) is one of the major concerns to countries both in a European and in a worldwide level. Training on scenarios that involve such systems is important to the effective handling of incidents. Experienti... Read More about Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.