Skip to main content

Research Repository

Advanced Search

Outputs (37)

Internet of drones security: taxonomies, open issues, and future directions (2022)
Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023). Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.

Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions... Read More about Internet of drones security: taxonomies, open issues, and future directions.

DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data (2022)
Journal Article
Saidi, H., Labraoui, N., Ari, A. A. A., Maglaras, L. A., & Emati, J. H. M. (2022). DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data. IEEE Access, 10, 101011-101028. https://doi.org/10.1109/acces

In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite increased attention to the security of electronic health records, patient privacy is still at... Read More about DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data.

Transforming Points of Single Contact Data into Linked Data (2022)
Journal Article
Fragkou, P., & Maglaras, L. (2022). Transforming Points of Single Contact Data into Linked Data. Computers, 11(8), Article 122. https://doi.org/10.3390/computers11080122

Open data portals contain valuable information for citizens and business. However, searching for information can prove to be tiresome even in portals tackling domains similar information. A typical case is the information residing in the European Com... Read More about Transforming Points of Single Contact Data into Linked Data.

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning (2022)
Journal Article
Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access, 10, 40281-40306. https://doi.or

In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and... Read More about Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.

FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things (2022)
Journal Article
Friha, O., Ferrag, M. A., Shu, L., Maglaras, L., Choo, K. R., & Nafaa, M. (2022). FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. Journal of Parallel and Distributed Computing, 165, 17-31. https://doi.org/1

In this paper, we propose a federated learning-based intrusion detection system, named FELIDS, for securing agricultural-IoT infrastructures. Specifically, the FELIDS system protects data privacy through local learning, where devices benefit from the... Read More about FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.

Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure (2022)
Journal Article
He, Y., Maglaras, L., Aliyu, A., & Luo, C. (2022). Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure. Security and Communication Networks, 2022, Article 2775249. https://doi.org/10.1155/2022/2775249

The healthcare information system (HIS) has become a victim of cyberattacks. Traditional ways to handle cyber incidents in healthcare organizations follow a predefined incident response (IR) procedure. However, this procedure is usually reactive, mis... Read More about Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure.

A multiplayer game model to detect insiders in wireless sensor networks (2022)
Journal Article
Kantzavelou, I., Maglaras, L., Tzikopoulos, P. F., & Katsikas, S. (2022). A multiplayer game model to detect insiders in wireless sensor networks. PeerJ Computer Science, 8, Article e791. https://doi.org/10.7717/peerj-cs.791

Insiders might have incentives and objectives opposed to those of the belonging organization. It is hard to detect them because of their privileges that partially protect them. In Wireless Sensor Networks (WSNs), significant security issues arise, in... Read More about A multiplayer game model to detect insiders in wireless sensor networks.