Skip to main content

Research Repository

Advanced Search

All Outputs (77)

PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme (2024)
Conference Proceeding
Yaqub, Z., Yigit, Y., Maglaras, L., Tan, Z., & Wooderson, P. (in press). PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.

In the rapidly evolving landscape of Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flow. However, VANETs face significant security and privacy challenges due to... Read More about PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.

Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing (2024)
Journal Article
Bensaid, R., Labraoui, N., Abba Ari, A. A., Maglaras, L., Saidi, H., Abdu Lwahhab, A. M., & Benfriha, S. (2024). Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing. Security and Communication Networks, 2024, Article 6651584. https://doi.org/10.1155/2024/6651584

The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in a short period of time. Therefore, a combination of computing models such a... Read More about Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing.

Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing (2024)
Journal Article
Lambropoulos, G., Mitropoulos, S., Douligeris, C., & Maglaras, L. (2024). Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing. Computers, 13(2), Article 54. https://doi.org/10.3390/computers13020054

The widespread adoption of cloud computing has resulted in centralized datacenter structures; however, there is a requirement for smaller-scale distributed infrastructures to meet the demands for speed, responsiveness, and security for critical appli... Read More about Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing.

Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns (2024)
Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (in press). Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. International Journal of Information Security, https://doi.org/10.1007/s10207-023-00809-5

Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches increasing. Firms and their staff are experiencing mass phishing attacks, several typical precursors to... Read More about Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns.

Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper (2024)
Conference Proceeding
Sarker, I. H., Janicke, H., Maglaras, L., & Camtepe, S. (2024). Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper. In Advanced Research in Technologies, Information, Innovation and Sustainability (ARTIIS 2023), Proceedings, Part II (302-316). https://doi.org/10.1007/978-3-031-48855-9_23

As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today’s digital era. Traditional security measures tend to be insufficient to defend against these persistent and dynamic thre... Read More about Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper.

Cyber Malware: Offensive and Defensive Systems (2023)
Book
Almomani, I., Maglaras, L. A., Ferrag, M. A., & Ayres, N. (Eds.). (2023). Cyber Malware: Offensive and Defensive Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-34969-0

This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta... Read More about Cyber Malware: Offensive and Defensive Systems.

Machine Learning for Smart Healthcare Management Using IoT (2023)
Book Chapter
Yigit, Y., Duran, K., Moradpoor, N., Maglaras, L., Van Huynh, N., & Canberk, B. (in press). Machine Learning for Smart Healthcare Management Using IoT. In IoT and ML for Information Management: A Smart Healthcare Perspective. Springer

The convergence of Machine Learning (ML) and the Internet of Things (IoT) has brought about a paradigm shift in healthcare, ushering in a new era of intelligent healthcare management. This powerful amalgamation is driving transformative changes acros... Read More about Machine Learning for Smart Healthcare Management Using IoT.

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis (2023)
Conference Proceeding
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (in press). Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. In 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Conference Proceeding
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (in press). Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Hybrid Threats, Cyberterrorism and Cyberwarfare (2023)
Book
Ferrag, M. A., Kantzavelou, I., Maglaras, L., & Janicke, H. (Eds.). (2024). Hybrid Threats, Cyberterrorism and Cyberwarfare. Boca Raton: CRC Press. https://doi.org/10.1201/9781003314721

Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism,... Read More about Hybrid Threats, Cyberterrorism and Cyberwarfare.

The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System (2023)
Conference Proceeding
Moradpoor, N., Maglaras, L., Abah, E., & Robles-Durazno, A. (2023). The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System. In 2023 19th IEEE International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) (453-460). https://doi.org/10.1109/DCOSS-IoT58021.2023.00077

The protection of Critical National Infrastructure is extremely important due to nations being dependent on their operation and steadiness. Any disturbance to this infrastructure could have a devastating consequence on physical security, economic wel... Read More about The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System.

A Blockchain-based two Factor Honeytoken Authentication System (2023)
Presentation / Conference
Papaspirou, V., Maglaras, L., Kantzavelou, I., Moradpoor, N., & Katsikas, S. (2023, September). A Blockchain-based two Factor Honeytoken Authentication System. Poster presented at 28th European Symposium on Research in Computer Security (ESORICS), The Hague

This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the authentication method, preventing various attacks, including tampering att... Read More about A Blockchain-based two Factor Honeytoken Authentication System.

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks (2023)
Conference Proceeding
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (in press). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, t... Read More about Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

A novel autonomous container-based platform for cybersecurity training and research (2023)
Journal Article
Chouliaras, N., Kantzavelou, I., Maglaras, L., Pantziou, G., & Amine Ferrag, M. (2023). A novel autonomous container-based platform for cybersecurity training and research. PeerJ Computer Science, 9, Article e1574. https://doi.org/10.7717/peerj-cs.1574

Cyberattacks, particularly those targeting systems that store or handle sensitive data, have become more sophisticated in recent years. To face increasing threats, continuous capacity building and digital skill competence are needed. Cybersecurity ha... Read More about A novel autonomous container-based platform for cybersecurity training and research.

A Novel Authentication Method That Combines Honeytokens and Google Authenticator (2023)
Journal Article
Papaspirou, V., Papathanasaki, M., Maglaras, L., Kantzavelou, I., Douligeris, C., Ferrag, M. A., & Janicke, H. (2023). A Novel Authentication Method That Combines Honeytokens and Google Authenticator. Information, 14(7), Article 386. https://doi.org/10.3390/info14070386

Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attac... Read More about A Novel Authentication Method That Combines Honeytokens and Google Authenticator.

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise (2023)
Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2023). Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Information and Computer Security, 31(4), 404-426. https://doi.org/10.1108/ICS-05-2022-0085

Purpose This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security posture as it adapts to remote working because of the Coronavir... Read More about Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise.