Skip to main content

Research Repository

Advanced Search

Outputs (47)

Internet of drones security: taxonomies, open issues, and future directions (2022)
Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023). Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.vehcom.2022.100552

Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions... Read More about Internet of drones security: taxonomies, open issues, and future directions.

DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data (2022)
Journal Article
Saidi, H., Labraoui, N., Ari, A. A. A., Maglaras, L. A., & Emati, J. H. M. (2022). DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data. IEEE Access, 10, 101011-101028. https://doi.org/10.1109/access.2022.3207803

In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite increased attention to the security of electronic health records, patient privacy is still at... Read More about DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data.

Transforming Points of Single Contact Data into Linked Data (2022)
Journal Article
Fragkou, P., & Maglaras, L. (2022). Transforming Points of Single Contact Data into Linked Data. Computers, 11(8), Article 122. https://doi.org/10.3390/computers11080122

Open data portals contain valuable information for citizens and business. However, searching for information can prove to be tiresome even in portals tackling domains similar information. A typical case is the information residing in the European Com... Read More about Transforming Points of Single Contact Data into Linked Data.

Cyber Threats in the Healthcare Sector and Countermeasures (2022)
Book Chapter
Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2022). Cyber Threats in the Healthcare Sector and Countermeasures. In M. Khosrow-Pour (Ed.), Research Anthology on Securing Medical Systems and Records. IGI Global. https://doi.org/10.4018/978-1-6684-6311-6.ch001

Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get una... Read More about Cyber Threats in the Healthcare Sector and Countermeasures.

Artificial Intelligence: Practical and Ethical Challenges (2022)
Book Chapter
Rice, S., & Maglaras, L. (2022). Artificial Intelligence: Practical and Ethical Challenges. In M. Ahmed, S. Rabiul Islam, A. Anwar, N. Moustafa, & A. Khan Pathan (Eds.), Explainable Artificial Intelligence for Cyber Security (59-71). Springer. https://doi.org/10.1007/978-3-030-96630-0_3

Artificial Intelligence (AI) & Machine Learning (ML) is used everywhere in daily life from speech recognition on our phones, targeted marketing strategies & face recognition without the majority of society even realising it. The power of technology a... Read More about Artificial Intelligence: Practical and Ethical Challenges.

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning (2022)
Journal Article
Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access, 10, 40281-40306. https://doi.org/10.1109/access.2022.3165809

In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and... Read More about Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.

SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles (2022)
Conference Proceeding
Babaghayou, M., Labraoui, N., Ari, A. A. A., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2022). SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles. In CROWNCOM 2021, WiCON 2021: Cognitive Radio Oriented Wireless Networks and Wireless Internet (343-360). https://doi.org/10.1007/978-3-030-98002-3_25

The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhancing applications provided by the Internet of Vehicles (IoV) paradigm are on... Read More about SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles.