Skip to main content

Research Repository

Advanced Search

All Outputs (7)

A novel autonomous container-based platform for cybersecurity training and research (2023)
Journal Article
Chouliaras, N., Kantzavelou, I., Maglaras, L., Pantziou, G., & Amine Ferrag, M. (2023). A novel autonomous container-based platform for cybersecurity training and research. PeerJ Computer Science, 9, Article e1574. https://doi.org/10.7717/peerj-cs.1574

Cyberattacks, particularly those targeting systems that store or handle sensitive data, have become more sophisticated in recent years. To face increasing threats, continuous capacity building and digital skill competence are needed. Cybersecurity ha... Read More about A novel autonomous container-based platform for cybersecurity training and research.

A Novel Authentication Method That Combines Honeytokens and Google Authenticator (2023)
Journal Article
Papaspirou, V., Papathanasaki, M., Maglaras, L., Kantzavelou, I., Douligeris, C., Ferrag, M. A., & Janicke, H. (2023). A Novel Authentication Method That Combines Honeytokens and Google Authenticator. Information, 14(7), Article 386. https://doi.org/10.33

Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attac... Read More about A Novel Authentication Method That Combines Honeytokens and Google Authenticator.

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise (2023)
Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2023). Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Information and Computer Security, 31(4), 404-426. https:

Purpose This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security posture as it adapts to remote working because of the Coronavir... Read More about Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise.

Digitization of healthcare sector: A study on privacy and security concerns (2023)
Journal Article
Paul, M., Maglaras, L., Ferrag, M. A., & Almomani, I. (2023). Digitization of healthcare sector: A study on privacy and security concerns. ICT Express, 9(4), 571-588. https://doi.org/10.1016/j.icte.2023.02.007

The digital revolution has taken business sectors to a new height through the advancement of technology. The healthcare sector also embraced digital technology to facilitate technological change from mechanical and analogue electronic devices to the... Read More about Digitization of healthcare sector: A study on privacy and security concerns.

IoT: Communication protocols and security threats (2023)
Journal Article
Gerodimos, A., Maglaras, L., Ferrag, M. A., Ayres, N., & Kantzavelou, I. (2023). IoT: Communication protocols and security threats. Internet of Things and Cyber-Physical Systems, 3, 1-13. https://doi.org/10.1016/j.iotcps.2022.12.003

In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, pre... Read More about IoT: Communication protocols and security threats.

A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing (2023)
Journal Article
Babaghayou, M., Chaib, N., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2023). A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing. Sensors, 23(1), Article 531. https://doi.org/10.3390/s23010531

By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), the Internet of Vehicles (IoV) paradigm has attracted the attention of different research and development bodies. However, IoV deployment is still at stake as many security and privac... Read More about A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing.