Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario
(2024)
Presentation / Conference Contribution
Adesanya, O. M., Moradpoor, N., Maglaras, L., Lim, I. S., & Ferrag, M. A. (in press). Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario.
All Outputs (7)
Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records (2024)
Presentation / Conference Contribution
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (in press). Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.
PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme (2024)
Presentation / Conference Contribution
Yaqub, Z., Yigit, Y., Maglaras, L., Tan, Z., & Wooderson, P. (2024, April). PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme. Presented at The 20th Annual International Conference on Distributed Computing in Smart Systems and the InterneIn the rapidly evolving landscape of Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flow. However, VANETs face significant security and privacy challenges due to... Read More about PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.
Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing (2024)
Journal Article
Bensaid, R., Labraoui, N., Abba Ari, A. A., Maglaras, L., Saidi, H., Abdu Lwahhab, A. M., & Benfriha, S. (2024). Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing. Security and CommuThe growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in a short period of time. Therefore, a combination of computing models such a... Read More about Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing.
Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing (2024)
Journal Article
Lambropoulos, G., Mitropoulos, S., Douligeris, C., & Maglaras, L. (2024). Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing. Computers, 13(2), Article 54. https://doi.org/10.3390/computers13020054The widespread adoption of cloud computing has resulted in centralized datacenter structures; however, there is a requirement for smaller-scale distributed infrastructures to meet the demands for speed, responsiveness, and security for critical appli... Read More about Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing.
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns (2024)
Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (online). Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. International Journal of Information Security, https://doi.org/10.1007/s1020Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches increasing. Firms and their staff are experiencing mass phishing attacks, several typical precursors to... Read More about Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns.
Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper (2024)
Presentation / Conference Contribution
Sarker, I. H., Janicke, H., Maglaras, L., & Camtepe, S. (2024). Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper. In Advanced Research in Technologies, Information, Innovation and Sustainability (ARTIIS 2023), PrAs cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today’s digital era. Traditional security measures tend to be insufficient to defend against these persistent and dynamic thre... Read More about Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper.