Skip to main content

Research Repository

Advanced Search

All Outputs (16)

Investigating Machine Learning Attacks on Financial Time Series Models (2022)
Journal Article
Gallagher, M., Pitropakis, N., Chrysoulas, C., Papadopoulos, P., Mylonas, A., & Katsikas, S. (2022). Investigating Machine Learning Attacks on Financial Time Series Models. Computers and Security, 123, https://doi.org/10.1016/j.cose.2022.102933

Machine learning and Artificial Intelligence (AI) already support human decision-making and complement professional roles, and are expected in the future to be sufficiently trusted to make autonomous decisions. To trust AI systems with such tasks, a... Read More about Investigating Machine Learning Attacks on Financial Time Series Models.

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture (2022)
Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022). GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291

E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the esta... Read More about GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.

A security and authentication layer for SCADA/DCS applications (2021)
Journal Article
Homay, A., Chrysoulas, C., El Boudani, B., de Sousa, M., & Wollschlaeger, M. (2021). A security and authentication layer for SCADA/DCS applications. Microprocessors and Microsystems, 87, Article 103479. https://doi.org/10.1016/j.micpro.2020.103479

Mid 2010, a sophisticated malicious computer worm called Stuxnet targeted major ICS systems around the world causing severe damages to Siemens automation products. Stuxnet proved its ability to infect air-gapped-segregated critical computers control... Read More about A security and authentication layer for SCADA/DCS applications.

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT (2021)
Journal Article
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021). Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. http

As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defe... Read More about Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.

A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda (2020)
Journal Article
Muller, L., Chrysoulas, C., Pitropakis, N., & Barclay, P. J. (2020). A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda. Big Data and Cognitive Computing, 4(4), Article 38. https://doi.org/10.3390/bdcc404

The shift towards microservisation which can be observed in recent developments of the cloud landscape for applications has led towards the emergence of the Function as a Service (FaaS) concept, also called Serverless. This term describes the event-d... Read More about A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda.

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing (2020)
Journal Article
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., Haynes, D., Pitropakis, N., & Papadopoulos, P. (2020). Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communic

The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways... Read More about Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.

Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture) (2020)
Journal Article
El Boudani, B., Kanaris, L., Kokkinis, A., Kyriacou, M., Chrysoulas, C., Stavrou, S., & Dagiuklas, T. (2020). Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture). Sensor

In the near future, the fifth-generation wireless technology is expected to be rolled out, offering low latency, high bandwidth and multiple antennas deployed in a single access point. This ecosystem will help further enhance various location-based s... Read More about Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture).

ProMe: A Mentoring Platform for Older Adults Using Machine Learning Techniques for Supporting the “Live and Learn” Concept (2018)
Journal Article
Kostopoulos, G., Neureiter, K., Papatoiu, D., Tscheligi, M., & Chrysoulas, C. (2018). ProMe: A Mentoring Platform for Older Adults Using Machine Learning Techniques for Supporting the “Live and Learn” Concept. Mobile Information Systems, 2018, 1-8. ht

It is well known what an important role employment plays in our lives and how it influences our everyday life. With the help of employment, all of us as individuals manage to create our personal and social net that not only gives meaning and financia... Read More about ProMe: A Mentoring Platform for Older Adults Using Machine Learning Techniques for Supporting the “Live and Learn” Concept.

Traffic Sign Recognition based on Synthesised Training Data (2018)
Journal Article
Stergiou, A., Kalliatakis, G., & Chrysoulas, C. (2018). Traffic Sign Recognition based on Synthesised Training Data. Big Data and Cognitive Computing, 2(3), Article 19. https://doi.org/10.3390/bdcc2030019

To deal with the richness in visual appearance variation found in real-world data, we propose to synthesise training data capturing these differences for traffic sign recognition. The use of synthetic training data, created from road traffic sign tem... Read More about Traffic Sign Recognition based on Synthesised Training Data.

QoS provisioning in a service-oriented architecture targeting the smart grid world (2018)
Journal Article
Chrysoulas, E. (2018). QoS provisioning in a service-oriented architecture targeting the smart grid world. International Journal of Smart Grid and Green Communications, 1(3), 216-226. https://doi.org/10.1504/ijsggc.2018.091350

In today's liberalised market of energy, dynamic selections of services (energy consumption or even energy production) and by extension of service providers are crucial. It is equally important for service providers to spot the one quality of service... Read More about QoS provisioning in a service-oriented architecture targeting the smart grid world.

Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid (2017)
Journal Article
Chrysoulas, C., & Fasli, M. (2017). Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid. Journal of Communications Software and Systems, 13(2), 77. https://doi.org/10.24138/jcomss.v13i2.375

Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other hand it is equally important for Service Providers to spot the one QoS Module that offers the best QoS level in a give... Read More about Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid.

Tolerating partial failures on IEC 61499 applications (2015)
Journal Article
de Sousa, M., Chrysoulas, C., & Homay, A. (2015). Tolerating partial failures on IEC 61499 applications. ACM SIGBED Review, 12(3), 32-35. https://doi.org/10.1145/2815482.2815488

In a modern industrial environment control programs are distributed among several devices. This raises new challenges, especially in handling the failure modes. Automatic reconfiguration is a possible approach in dealing with partial failures. The au... Read More about Tolerating partial failures on IEC 61499 applications.

Shielding the Grid World: An Overview (2014)
Journal Article
Chrysoulas, C. (2014). Shielding the Grid World: An Overview. International Journal of Electronics and Information Engineering, 1(1), 23-28

Continues research and development efforts within the Grid community have produced protocols, services, and tools that address the challenges arising when we seek to build scalable virtual organizations (VOs). The technologies that have evolved from... Read More about Shielding the Grid World: An Overview.

Proposing a service-enabled semantic grid model (2009)
Journal Article
Chrysoulas, C., & Koufopavlou, O. (2009). Proposing a service-enabled semantic grid model. International Journal of Autonomous and Adaptive Communications Systems, 2(4), 349-361. https://doi.org/10.1504/ijaacs.2009.029170

The semantic grid refers to an approach to grid computing in which information, computing resources and services are described in standard ways that can be processed by computer. This makes it easier for resources to be discovered and joined up autom... Read More about Proposing a service-enabled semantic grid model.

Towards a service-enabled distributed router architecture (2008)
Journal Article
Chrysoulas, C., Haleplidis, E., Kostopoulos, G., Haas, R., Denazis, S., & Koufopavlou, O. (2008). Towards a service-enabled distributed router architecture. IET Circuits, Devices and Systems, 2(1), 60-68. https://doi.org/10.1049/iet-cds%3A20070041

Modelling is an essential tool in the development and assessment of new concepts. The authors propose an architecture for the next-generation gigabit distributed active router that was designed and implemented in the IST project, FlexiNET. In the Fle... Read More about Towards a service-enabled distributed router architecture.

Towards a resource management and service deployment framework (2007)
Journal Article
Chrysoulas, C., Haleplidis, E., Kostopoulos, G., Haas, R., & Koufopavlou, O. (2008). Towards a resource management and service deployment framework. International Journal of Network Management, 18(4), 345-363. https://doi.org/10.1002/nem.672

Owing to the increase in both heterogeneity and complexity in today's networking systems, the need arises for new network‐based services architectures. They must provide flexibility and efficiency in the definition, deployment and execution of the se... Read More about Towards a resource management and service deployment framework.