Skip to main content

Research Repository

Advanced Search

Outputs (9)

Cyber Threats in the Healthcare Sector and Countermeasures (2022)
Book Chapter
Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2022). Cyber Threats in the Healthcare Sector and Countermeasures. In M. Khosrow-Pour (Ed.), Research Anthology on Securing Medical Systems and Records. IGI Global. https://doi.org/10.4018/978-1-6684-6311-6.ch0

Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get una... Read More about Cyber Threats in the Healthcare Sector and Countermeasures.

Artificial Intelligence: Practical and Ethical Challenges (2022)
Book Chapter
Rice, S., & Maglaras, L. (2022). Artificial Intelligence: Practical and Ethical Challenges. In M. Ahmed, S. Rabiul Islam, A. Anwar, N. Moustafa, & A. Khan Pathan (Eds.), Explainable Artificial Intelligence for Cyber Security (59-71). Springer. https://do

Artificial Intelligence (AI) & Machine Learning (ML) is used everywhere in daily life from speech recognition on our phones, targeted marketing strategies & face recognition without the majority of society even realising it. The power of technology a... Read More about Artificial Intelligence: Practical and Ethical Challenges.

The Cost Perspective of Password Security (2020)
Book Chapter
Maglaras, L., Janicke, H., & Ferrag, M. A. (2020). The Cost Perspective of Password Security. In B. B. Gupta, & D. Gupta (Eds.), Handbook of Research on Multimedia Cyber Security (319-330). IGI Global. https://doi.org/10.4018/978-1-7998-2701-6.ch017

This study technically analyses the maximum number of combinations for common passwords up to 12 characters long. A maximum storage size necessary for the creation of a data base that holds all possible passwords up to 12 characters is also presented... Read More about The Cost Perspective of Password Security.

Cyber Threats in the Healthcare Sector and Countermeasures (2020)
Book Chapter
Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2020). Cyber Threats in the Healthcare Sector and Countermeasures. In A. Masouras, G. Maris, & A. Kavoura (Eds.), Entrepreneurial Development and Innovation in Family Businesses and SMEs (109-124). IGI Global.

Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get una... Read More about Cyber Threats in the Healthcare Sector and Countermeasures.

Developing Cyber Buffer Zones (2020)
Book Chapter
Robinson, M., Jones, K., Janicke, H., & Maglaras, L. (2020). Developing Cyber Buffer Zones. In M. Khosrow-Pour (Ed.), Encyclopedia of Criminal Activities and the Deep Web (287-303). IGI Global. https://doi.org/10.4018/978-1-5225-9715-5.ch019

Cyber peacekeeping is a new and novel field of research that focuses on the ways that nations and society can restore peace and security in the aftermath of cyber warfare. In this article, the authors make an original contribution to the field by dev... Read More about Developing Cyber Buffer Zones.

Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems (2019)
Book Chapter
Maglaras, L., Janicke, H., Jiang, J., & Crampton, A. (2019). Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems. In Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications (299-318). IGI Global. https://doi.

SCADA (Supervisory Control and Data Acquisition) systems are a critical part of modern national critical infrastructure (CI) systems. Due to the rapid increase of sophisticated cyber threats with exponentially destructive effects, intrusion detection... Read More about Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems.

CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems (2018)
Book Chapter
Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Janicke, H., & Jones, K. (2018). CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (622-637). IGI Glo

Cyber Security of ICS/SCADA systems is a major aspect of current research focus. Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real SCADA systems with low costs. Significantly lacking from current research, is... Read More about CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems.

A Novel Method for Calculating Customer Reviews Ratings (2018)
Book Chapter
Vourgidis, I. S., Carter, J., Maglaras, L., Janicke, H., Folia, Z., & Fragkou, P. (2018). A Novel Method for Calculating Customer Reviews Ratings. In A. Elçi (Ed.), Handbook of Research on Contemporary Perspectives on Web-Based Systems (460-478). IGI Glo

The number of consumers consulting online reviews in order to purchase a product or service, keeps growing. In addition to that, consumers can add an online review in order to express their experience upon the services or products received. This iter... Read More about A Novel Method for Calculating Customer Reviews Ratings.

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (2018)
Book Chapter
Cook, A., Smith, R., Maglaras, L., & Janicke, H. (2018). SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (1168-1183). IG

The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for inv... Read More about SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.