Skip to main content

Research Repository

Advanced Search

All Outputs (30)

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) (2022)
Presentation / Conference Contribution
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022, September). Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). Presented at 27th European Symposium on Research in Computer Security

Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detecting attacks. However, the lack of transparency in their decision-making pro... Read More about Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract).

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2022)
Presentation / Conference Contribution
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., Domalis, G., Karacapilidis, N., Tsakalidis, D., & Tsolis, D. (2021, October). GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. Presented at 7th

The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks.... Read More about GLASS: Towards Secure and Decentralized eGovernance Services using IPFS.

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure (2021)
Presentation / Conference Contribution
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October). Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analyt

Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from tw... Read More about Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.

Towards An SDN Assisted IDS (2021)
Presentation / Conference Contribution
Sutton, R., Ludwiniak, R., Pitropakis, N., Chrysoulas, C., & Dagiuklas, T. (2021). Towards An SDN Assisted IDS. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). https://doi.org/10.1109/NTMS49979.2021.9432651

Modern Intrusion Detection Systems are able to identify and check all traffic crossing the network segments that they are only set to monitor. Traditional network infrastructures use static detection mechanisms that check and monitor specific types o... Read More about Towards An SDN Assisted IDS.

Programming Languages: A Usage-based Statistical Analysis and Visualization (2021)
Presentation / Conference Contribution
Orlowska, A., Chrysoulas, C., Jaroucheh, Z., & Liu, X. (2021). Programming Languages: A Usage-based Statistical Analysis and Visualization. In ICISS 2021: 2021 The 4th International Conference on Information Science and Systems (143-148). https://doi.org

Understanding the popularity, and its trend, of programming languages can be important to anticipate which languages are best studied for future use, which are widely supported for use in enterprise projects, and investigate which skills are easiest... Read More about Programming Languages: A Usage-based Statistical Analysis and Visualization.

Multi-label Classifier to Deal with Misclassification in Non-functional Requirements (2020)
Presentation / Conference Contribution
Sabir, M., Chrysoulas, C., & Banissi, E. (2020). Multi-label Classifier to Deal with Misclassification in Non-functional Requirements. In Trends and Innovations in Information Systems and Technologies: Volume 1 (486-493). https://doi.org/10.1007/978-3-03

Automatic classification of software requirements is an active research area; it can alleviate the tedious task of manual labeling and improves transparency in the requirements engineering process. Several attempts have been made towards the identifi... Read More about Multi-label Classifier to Deal with Misclassification in Non-functional Requirements.

Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM) (2020)
Presentation / Conference Contribution
Seuwou, P., Chrysoulas, C., Banissi, E., & Ubakanma, G. (2020). Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM). In Trends and Innovations in Information Systems and Technolo

The work presented in the paper aims at exploring information technology acceptance in the context of Autonomous Vehicles (AV) with the objectives of identifying and testing the constructs that will influence future AVs acceptance. Most models of tec... Read More about Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM).

Class Feature Pyramids for Video Explanation (2020)
Presentation / Conference Contribution
Stergiou, A., Kapidis, G., Kalliatakis, G., Chrysoulas, C., Poppe, R., & Veltkamp, R. (2020). Class Feature Pyramids for Video Explanation. . https://doi.org/10.1109/iccvw.2019.00524

Deep convolutional networks are widely used in video action recognition. 3D convolutions are one prominent approach to deal with the additional time dimension. While 3D convolutions typically lead to higher accuracies, the inner workings of the tra... Read More about Class Feature Pyramids for Video Explanation.

Granularity Cost Analysis for Function Block as a Service (2020)
Presentation / Conference Contribution
Homay, A., Zoitl, A., de Sousa, M., Wollschlaeger, M., & Chrysoulas, C. (2020). Granularity Cost Analysis for Function Block as a Service. . https://doi.org/10.1109/indin41052.2019.8972205

The main challenge of exposing IEC61499 or IEC61131-3 Function Blocks as a service remains in adopting service-oriented concepts in function block programming. Implementing an IEC61499 or IEC61131-3 Function Block that is being accessed via service-o... Read More about Granularity Cost Analysis for Function Block as a Service.

Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT (2020)
Presentation / Conference Contribution
Ashiq, S., Chrysoulas, C., & Banissi, E. (2020). Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT. . https://doi.org/10.1109/icic48496.2019.8966710

Green Information System/Technology adoption is one of the key solutions sought by organisations, policy makers and governments to promote sustainability and deal with environmental issues. Surprisingly, in the research discipline of management infor... Read More about Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT.

Personalized Micro-Service Recommendation System for Online News (2019)
Presentation / Conference Contribution
Asenova, M., & Chrysoulas, C. (2019). Personalized Micro-Service Recommendation System for Online News. Procedia Computer Science, 160, 610-615. https://doi.org/10.1016/j.procs.2019.11.039

In the era of artificial intelligence and high technology advance our life is dependent on them in every aspect. The dynamic environment forces us to plan our time with conscious and every minute is valuable. To help individuals and corporations see... Read More about Personalized Micro-Service Recommendation System for Online News.

Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions (2019)
Presentation / Conference Contribution
Stergiou, A., Kapidis, G., Kalliatakis, G., Chrysoulas, C., Veltkamp, R., & Poppe, R. (2019). Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions. . https://doi.org/10.1109/icip.2019.8803153

Deep learning approaches have been established as the main methodology for video classification and recognition. Recently, 3-dimensional convolutions have been used to achieve state-of-the-art performance in many challenging video datasets. Because o... Read More about Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions.

Authentication Layer for IEC 61113-3 Applications (2019)
Presentation / Conference Contribution
Homay, A., Chrysoulas, C., & de Sousa, M. (2019). Authentication Layer for IEC 61113-3 Applications. . https://doi.org/10.1109/ntms.2019.8763839

Mid 2010, the Stuxnet ICS attack targeted the Siemens automation products, and after this attack the ICS security was thrust into spotlight, automation products suppliers started to re-examine their business approach to cyber security. The OPC Founda... Read More about Authentication Layer for IEC 61113-3 Applications.

Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case (2018)
Presentation / Conference Contribution
Chrysoulas, C., Homay, A., & Lemac, M. (2018). Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case. . https://doi.org/10.1109/ithet.2018.8424784

We propose a framework for teaching complex industrial automation concepts with the help of Virtual/Augmented reality. Initially we construct the needed 3D models like conveyors belts, and liquid tanks to be used as testbed examples for the proposed... Read More about Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case.

Building an Adaptive E-Learning System (2017)
Presentation / Conference Contribution
Chrysoulas, C., & Fasli, M. (2017). Building an Adaptive E-Learning System. In Proceedings of the 9th International Conference on Computer Supported Education - Volume 2: CSEDU (375-382). https://doi.org/10.5220/0006326103750382

Research in adaptive learning is mainly focused on improving learners’ learning achievements based mainly on personalization information, such as learning style, cognitive style or learning achievement. In this paper, an innovative adaptive learning... Read More about Building an Adaptive E-Learning System.

A service oriented QoS architecture targeting the smart grid world & machine learning aspects (2016)
Presentation / Conference Contribution
Chrysoulas, C., & Fasli, M. (2016). A service oriented QoS architecture targeting the smart grid world & machine learning aspects. . https://doi.org/10.1109/splitech.2016.7555923

Dynamic selection of services and by extension of service providers are vital in today's liberalized market of energy. On the other hand it is equally important for Service Providers to spot the one QoS Module that offers the best QoS level in a give... Read More about A service oriented QoS architecture targeting the smart grid world & machine learning aspects.

Multiply and conquer: A replication framework for building fault tolerant industrial applications (2015)
Presentation / Conference Contribution
de Sousa, M., Chrysoulas, C., & Homay, A. E. (2015). Multiply and conquer: A replication framework for building fault tolerant industrial applications. . https://doi.org/10.1109/indin.2015.7281930

TIEC 61499 defines an execution model for distributed industrial control applications, i.e. a single application distributed among several devices. In such an environment partial failures are likely to occur. In order to avoid probable system malfunc... Read More about Multiply and conquer: A replication framework for building fault tolerant industrial applications.

Building Fault Tolerant Industrial Applications Based on IEC 61499 (2015)
Presentation / Conference Contribution
de Sousa, M., Chrysoulas, C., & Homay, A. (2015). Building Fault Tolerant Industrial Applications Based on IEC 61499. In FAIM 2015

IEC 61499 defines an execution model for industrial control applications that may be distributed among several devices. In such a heterogeneous environment partial failures are likely to occur. In order to avoid probable system malfunction and breakd... Read More about Building Fault Tolerant Industrial Applications Based on IEC 61499.

Exploiting voting strategies in partially replicated IEC 61499 applications (2015)
Presentation / Conference Contribution
de Sousa, M., Chrysoulas, C., & Homay, A. E. (2015). Exploiting voting strategies in partially replicated IEC 61499 applications. . https://doi.org/10.1109/wfcs.2015.7160589

In a modern industrial environment control programs are distributed among several devices. This raises new issues and challenges especially in failure modes. Building fault tolerant applications can be the solution in order a failure of one sub-compo... Read More about Exploiting voting strategies in partially replicated IEC 61499 applications.

The arrowhead approach for SOA application development and documentation (2014)
Presentation / Conference Contribution
Blomstedt, F., Ferreira, L. L., Klisics, M., Chrysoulas, C., de Soria, I. M., Morin, B., …Varga, P. (2014). The arrowhead approach for SOA application development and documentation. In IECON 2014 - 40th Annual Conference of the IEEE Industrial Electron

The Arrowhead project aims to address the technical and applicative issues associated with cooperative automation based on Service Oriented Architectures. The problems of developing such kind of systems are mainly due to the lack of adequate developm... Read More about The arrowhead approach for SOA application development and documentation.