Skip to main content

Research Repository

Advanced Search

All Outputs (84)

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed (2019)
Journal Article
Maglaras, L., Cruz, T., Ferrag, M. A., & Janicke, H. (2020). Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technology Letters, 3(1), Article e132. https://doi.org/10.1002/itl2.132

Security of Critical National Infrastructures (CNI) is one of the major concerns to countries both in a European and in a worldwide level. Training on scenarios that involve such systems is important to the effective handling of incidents. Experienti... Read More about Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.

Estimating the Relative Speed of RF Jammers in VANETs (2019)
Journal Article
Kosmanos, D., Argyriou, A., & Maglaras, L. (2019). Estimating the Relative Speed of RF Jammers in VANETs. Security and Communication Networks, 2019, Article 2064348. https://doi.org/10.1155/2019/2064348

Vehicular Ad Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their perform... Read More about Estimating the Relative Speed of RF Jammers in VANETs.

Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems (2019)
Book Chapter
Maglaras, L., Janicke, H., Jiang, J., & Crampton, A. (2019). Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems. In Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications (299-318). IGI Global. https://doi.org/10.4018/978-1-5225-9866-4.ch017

SCADA (Supervisory Control and Data Acquisition) systems are a critical part of modern national critical infrastructure (CI) systems. Due to the rapid increase of sophisticated cyber threats with exponentially destructive effects, intrusion detection... Read More about Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems.

DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services (2019)
Journal Article
Ferrag, M. A., & Maglaras, L. (2019). DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services. Computers, 8(3), Article 58. https://doi.org/10.3390/computers8030058

In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system initialization phase, creat... Read More about DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services.

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security (2019)
Journal Article
Derhab, A., Guerroumi, M., Gumaei, A., Maglaras, L., Ferrag, M. A., Mukherjee, M., & Khan, F. A. (2019). Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors, 19(14), Article 3119. https://doi.org/10.3390/s19143119

The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies and approaches should be... Read More about Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.

DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids (2019)
Journal Article
Ferrag, M. A., & Maglaras, L. (2020). DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids. IEEE Transactions on Engineering Management, 67(4), 1285-1297. https://doi.org/10.1109/tem.2019.2922936

In this paper, we propose a novel deep learning and blockchain-based energy framework for smart grids, entitled DeepCoin. The DeepCoin framework uses two schemes, a blockchain-based scheme and a deep learning-based scheme. The blockchain-based scheme... Read More about DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids.

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends (2019)
Journal Article
Ferrag, M. A., Maglaras, L., & Derhab, A. (2019). Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. Security and Communication Networks, 2019, Article 5452870. https://doi.org/10.1155/2019/5452870

Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summarise the factors that hinder biometrics models’ development and deployment on a large scale, including human physiol... Read More about Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.

Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector (2019)
Journal Article
Evans, M., He, Y., Maglaras, L., Yevseyeva, I., & Janicke, H. (2019). Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. International Journal of Medical Informatics, 127, 109-119. https://doi.org/10.1016/j.ijmedinf.2019.04.019

Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two thirds of these incidents pertain to human error, but despite this, there are... Read More about Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector.

Protecting Civilians from Cyber Warfare with Cyber Buffer Zones (2019)
Journal Article
Robinson, M., Maglaras, L., Jones, K., & Janicke, H. (2019). Protecting Civilians from Cyber Warfare with Cyber Buffer Zones. International Journal of Smart Security Technologies, 6(1), 31-48. https://doi.org/10.4018/ijsst.2019010103

Cyber peacekeeping has quickly risen in prominence as a viable way to regulate the impact cyber warfare has upon civilian security. In this article, the concept of a cyber buffer zone is explored, and proposals are made on how it could be used to fur... Read More about Protecting Civilians from Cyber Warfare with Cyber Buffer Zones.

A Novel Method for Calculating Customer Reviews Ratings (2018)
Book Chapter
Vourgidis, I. S., Carter, J., Maglaras, L., Janicke, H., Folia, Z., & Fragkou, P. (2018). A Novel Method for Calculating Customer Reviews Ratings. In A. Elçi (Ed.), Handbook of Research on Contemporary Perspectives on Web-Based Systems (460-478). IGI Global. https://doi.org/10.4018/978-1-5225-5384-7.ch020

The number of consumers consulting online reviews in order to purchase a product or service, keeps growing. In addition to that, consumers can add an online review in order to express their experience upon the services or products received. This iter... Read More about A Novel Method for Calculating Customer Reviews Ratings.

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (2018)
Book Chapter
Cook, A., Smith, R., Maglaras, L., & Janicke, H. (2018). SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (1168-1183). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch057

The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for inv... Read More about SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.

CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems (2018)
Book Chapter
Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Janicke, H., & Jones, K. (2018). CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (622-637). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch033

Cyber Security of ICS/SCADA systems is a major aspect of current research focus. Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real SCADA systems with low costs. Significantly lacking from current research, is... Read More about CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems.

Developing cyber peacekeeping: Observation, monitoring and reporting (2018)
Journal Article
Robinson, M., Jones, K., Janicke, H., & Maglaras, L. (2019). Developing cyber peacekeeping: Observation, monitoring and reporting. Government Information Quarterly, 36(2), 276-293. https://doi.org/10.1016/j.giq.2018.12.001

Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber warfare increasingly becoming part of future conflicts, new and novel solutions are needed to assist governments in securing their national infrastructur... Read More about Developing cyber peacekeeping: Observation, monitoring and reporting.

Blockchain Technologies for the Internet of Things: Research Issues and Challenges (2018)
Journal Article
Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2019). Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet of Things, 6(2), 2188-2204. https://doi.org/10.1109/jiot.2018.2882794

This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we pr... Read More about Blockchain Technologies for the Internet of Things: Research Issues and Challenges.

HEART-IS: A novel technique for evaluating human error-related information security incidents (2018)
Journal Article
Evans, M., He, Y., Maglaras, L., & Janicke, H. (2019). HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers and Security, 80, 74-89. https://doi.org/10.1016/j.cose.2018.09.002

Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to information security. Despite this level of understanding organisations conti... Read More about HEART-IS: A novel technique for evaluating human error-related information security incidents.

Vulnerability Analysis of Network Scanning on SCADA Systems (2018)
Journal Article
Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018). Vulnerability Analysis of Network Scanning on SCADA Systems. Security and Communication Networks, 2018, Article 3794603. https://doi.org/10.1155/2018/3794603

Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructure environments for decades. With the demand for remote facilities to be con... Read More about Vulnerability Analysis of Network Scanning on SCADA Systems.

Authentication Protocols for Internet of Things: A Comprehensive Survey (2017)
Journal Article
Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., & Shu, L. (2017). Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks, 2017, Article 6562953. https://doi.org/10.1155/2017/6562953

In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail.... Read More about Authentication Protocols for Internet of Things: A Comprehensive Survey.

Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? (2017)
Journal Article
Chapman, S., Smith, R., Maglaras, L., & Janicke, H. (2017). Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?. Journal of Sensor and Actuator Networks, 6(3), Article 16. https://doi.org/10.3390/jsan6030016

This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject areas: cyber defence exerci... Read More about Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?.

The industrial control system cyber defence triage process (2017)
Journal Article
Cook, A., Janicke, H., Smith, R., & Maglaras, L. (2017). The industrial control system cyber defence triage process. Computers and Security, 70, 467-481. https://doi.org/10.1016/j.cose.2017.07.009

The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats in an effective and cost-sensitive manner that does not expose their operati... Read More about The industrial control system cyber defence triage process.

Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems (2017)
Journal Article
Yousaf, A., Loan, A., Babiceanu, R. F., Maglaras, L., & Yousaf, O. (2017). Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. Computers and Security, 70, 124-143. https://doi.org/10.1016/j.cose.2017.05.011

In this paper an analysis of physical layer intruders, for direct sequence spread spectrum systems, is presented. Physical layer intruders are traditional jammers that do not have any intelligence as compared to smart jammers that have signal process... Read More about Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems.