Skip to main content

Research Repository

Advanced Search

Outputs (21)

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform (2022)
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379

Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and impro... Read More about Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

Investigating Machine Learning Attacks on Financial Time Series Models (2022)
Journal Article
Gallagher, M., Pitropakis, N., Chrysoulas, C., Papadopoulos, P., Mylonas, A., & Katsikas, S. (2022). Investigating Machine Learning Attacks on Financial Time Series Models. Computers and Security, 123, https://doi.org/10.1016/j.cose.2022.102933

Machine learning and Artificial Intelligence (AI) already support human decision-making and complement professional roles, and are expected in the future to be sufficiently trusted to make autonomous decisions. To trust AI systems with such tasks, a... Read More about Investigating Machine Learning Attacks on Financial Time Series Models.

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture (2022)
Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022). GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291

E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the esta... Read More about GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.

Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems (2022)
Conference Proceeding
Grierson, S., Thomson, C., Papadopoulos, P., & Buchanan, B. (2022). Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/sin54109.2021.9699157

Intrusion detection systems are integral to the security of networked systems for detecting malicious or anomalous network traffic. As traditional approaches are becoming less effective, machine learning and deep learning-based intrusion detection sy... Read More about Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2022)
Conference Proceeding
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., …Tsolis, D. (2022). GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. In Computer Security. ESORICS 2021 International Workshops. https://doi.org/10.1007/978-3-030-95484-0_3

The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks.... Read More about GLASS: Towards Secure and Decentralized eGovernance Services using IPFS.

Ransomware: Analysing the Impact on Windows Active Directory Domain Services (2022)
Journal Article
McDonald, G., Papadopoulos, P., Pitropakis, N., Ahmad, J., & Buchanan, W. J. (2022). Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors, 22(3), Article 953. https://doi.org/10.3390/s22030953

Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to... Read More about Ransomware: Analysing the Impact on Windows Active Directory Domain Services.

Decentralised Privacy: A Distributed Ledger Approach (2021)
Book Chapter
Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2021). Decentralised Privacy: A Distributed Ledger Approach. In C. Mustansar Hussain, & P. Di Sia (Eds.), Handbook of Smart Materials, Technologies, and Devices (1-26). Cham: Springer. https://doi.org/10.1007/978-3-030-58675-1_58-1

Our world due to the technological progress became fast-paced and is constantly evolving, thus changing every single day. Consequently, the most valuable asset on earth is not gold or oil anymore but data. Big data companies try to take advantage of... Read More about Decentralised Privacy: A Distributed Ledger Approach.

Browsers’ Private Mode: Is It What We Were Promised? (2021)
Journal Article
Hughes, K., Papadopoulos, P., Pitropakis, N., Smales, A., Ahmad, J., & Buchanan, W. J. (2021). Browsers’ Private Mode: Is It What We Were Promised?. Computers, 10(12), Article 165. https://doi.org/10.3390/computers10120165

Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine if nefarious or suspicious activity has occurred on that device. Our study... Read More about Browsers’ Private Mode: Is It What We Were Promised?.

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure (2021)
Presentation / Conference
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October). Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online

Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from tw... Read More about Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.