Skip to main content

Research Repository

Advanced Search

Outputs (9)

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis (2021)
Journal Article
Ferrag, M. A., Friha, O., Maglaras, L., Janicke, H., & Shu, L. (2021). Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access, 9, 138509-138542. https://doi.org/10.1109/access.2

In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications. Specifically, we first provide a review of the federated learning-b... Read More about Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.

A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks (2021)
Journal Article
Lambat, Y., Ayres, N., Maglaras, L., & Ferrag, M. A. (2021). A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks. Applied Sciences, 11(19), Article 9083. https://doi.org/10.3390/app11199083

It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated... Read More about A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks.

Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia (2021)
Journal Article
Almomani, I., Ahmed, M., & Maglaras, L. (2021). Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Computer Science, 7, Article e703. https://doi.org/10.7717/peerj-cs.703

The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regulatory Framework (CRF) and the NCA’s Essential Cybersecurity Controls (ECC) to ensure data and infrastructure security in all IT-based systems. However... Read More about Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia.

Intrusion Detection in Critical Infrastructures: A Literature Review (2021)
Journal Article
Panagiotis, F., Taxiarxchis, K., Georgios, K., Maglaras, L., & Ferrag, M. A. (2021). Intrusion Detection in Critical Infrastructures: A Literature Review. Smart Cities, 4(3), 1146-1157. https://doi.org/10.3390/smartcities4030061

Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we c... Read More about Intrusion Detection in Critical Infrastructures: A Literature Review.

RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks (2021)
Journal Article
Kosmanos, D., Karagiannis, D., Argyriou, A., Lalis, S., & Maglaras, L. (2021). RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks. Security and Communication Networks, 2021, Article 9959310. https://doi.org/10.1155/20

Wireless communications are vulnerable against radio frequency (RF) interference which might be caused either intentionally or unintentionally. A particular subset of wireless networks, Vehicular Ad-hoc NETworks (VANET), which incorporate a series of... Read More about RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks.

WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles (2021)
Journal Article
Babaghayou, M., Labraoui, N., Abba Ari, A. A., Ferrag, M. A., Maglaras, L., & Janicke, H. (2021). WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors, 21(7), Article 2443. https://doi.org/10.33

Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts main... Read More about WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.

Cyber Ranges and TestBeds for Education, Training, and Research (2021)
Journal Article
Chouliaras, N., Kittes, G., Kantzavelou, I., Maglaras, L., Pantziou, G., & Ferrag, M. A. (2021). Cyber Ranges and TestBeds for Education, Training, and Research. Applied Sciences, 11(4), Article 1809. https://doi.org/10.3390/app11041809

In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting... Read More about Cyber Ranges and TestBeds for Education, Training, and Research.

A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems (2021)
Journal Article
Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Cook, A., Janicke, H., & Jones, K. (2021). A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems. International Journal of Smart Security Technologies, 8(1), 16-34. https://doi.org/

Incident response teams cannot prepare for every situation or predict every crisis, especially when they involve cyber-physical systems. As a result, training activities need to be provided to support operating in challenging situations to develop co... Read More about A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems.