Skip to main content

Research Repository

Advanced Search

Outputs (52)

SANCUS–Towards Unifying the Analysis and Control of Security, Privacy and Service Reliability (2021)
Presentation / Conference Contribution
Zarakovitis, C., Pitropakis, N., Klonidis, D., & Khalife, H. (2021, June). SANCUS–Towards Unifying the Analysis and Control of Security, Privacy and Service Reliability. Poster presented at EuCNC & 6G Summit, Grenoble, France

The arrival of new technologies change the global digital landscape in many ways. In the past years, for example, network virtualization and cloud computing have given raise to organizations for meeting their everyday needs in an elastic manner witho... Read More about SANCUS–Towards Unifying the Analysis and Control of Security, Privacy and Service Reliability.

Towards An SDN Assisted IDS (2021)
Presentation / Conference Contribution
Sutton, R., Ludwiniak, R., Pitropakis, N., Chrysoulas, C., & Dagiuklas, T. (2021). Towards An SDN Assisted IDS. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). https://doi.org/10.1109/NTMS49979.2021.9432651

Modern Intrusion Detection Systems are able to identify and check all traffic crossing the network segments that they are only set to monitor. Traditional network infrastructures use static detection mechanisms that check and monitor specific types o... Read More about Towards An SDN Assisted IDS.

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT (2021)
Journal Article
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021). Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. http

As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defe... Read More about Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.

A Comparative Analysis of Honeypots on Different Cloud Platforms (2021)
Journal Article
Kelly, C., Pitropakis, N., Mylonas, A., McKeown, S., & Buchanan, W. J. (2021). A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors, 21(7), Article 2433. https://doi.org/10.3390/s21072433

In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The financial and operational advantages of moving IT infrastructure to special... Read More about A Comparative Analysis of Honeypots on Different Cloud Platforms.

Privacy and Trust Redefined in Federated Machine Learning (2021)
Journal Article
Papadopoulos, P., Abramson, W., Hall, A. J., Pitropakis, N., & Buchanan, W. J. (2021). Privacy and Trust Redefined in Federated Machine Learning. Machine Learning and Knowledge Extraction, 3(2), 333-356. https://doi.org/10.3390/make3020017

A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthcare records, accessing this information is challenging and often prohibited... Read More about Privacy and Trust Redefined in Federated Machine Learning.

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach (2020)
Presentation / Conference Contribution
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020, February). Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. Presented at ICISSP 2020, Valletta, Malta

Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high situational awareness, it can still be hard for users to continually be awa... Read More about Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach.

Privacy-preserving Surveillance Methods using Homomorphic Encryption (2020)
Presentation / Conference Contribution
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020, February). Privacy-preserving Surveillance Methods using Homomorphic Encryption. Presented at 6th International Conference on Information Security Systems and Privacy (ICISS

Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encryption to protect all states of the data: in-transit, at-rest, and in-memory.... Read More about Privacy-preserving Surveillance Methods using Homomorphic Encryption.

A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda (2020)
Journal Article
Muller, L., Chrysoulas, C., Pitropakis, N., & Barclay, P. J. (2020). A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda. Big Data and Cognitive Computing, 4(4), Article 38. https://doi.org/10.3390/bdcc404

The shift towards microservisation which can be observed in recent developments of the cloud landscape for applications has led towards the emergence of the Function as a Service (FaaS) concept, also called Serverless. This term describes the event-d... Read More about A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda.

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing (2020)
Journal Article
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., Haynes, D., Pitropakis, N., & Papadopoulos, P. (2020). Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communic

The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways... Read More about Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric (2020)
Journal Article
Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., & Buchanan, W. J. (2020). A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors, 20(22), Article 6587. https://doi.org/10.3390/s20226587

Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record storage solutions to common sec... Read More about A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.