Skip to main content

Research Repository

Advanced Search

All Outputs (87)

EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit (2024)
Presentation / Conference Contribution
Alpdag, K., Moradpoor, N., Hasina Andriambelo, N., Wooderson, P., & Maglaras, L. (2024, December). EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit. Presented at SINCONF 2024: 17th International Conference on Security of Information and Networks, Online

In the rapidly evolving realm of electric vehicle technology, safeguarding the cybersecurity of both electric vehicles and their charging infrastructure has become fundamental. The integration of electric vehicles and their charging stations into the... Read More about EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit.

AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet-of-Vehicles Networks (2024)
Journal Article
Yigit, Y., Maglaras, L., Buchanan, W. J., Canberk, B., Shin, H., & Duong, T. Q. (online). AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet-of-Vehicles Networks. IEEE Internet of Things, https://doi.org/10.1109/jiot.2024.3455089

Digital twin technology is crucial to the development of the sixth-generation (6G) Internet of Vehicles (IoV) as it allows the monitoring and assessment of the dynamic and complicated vehicular environment. However, 6G IoV networks have critical chal... Read More about AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet-of-Vehicles Networks.

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records (2024)
Presentation / Conference Contribution
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (2024, April). Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records. Presented at DCOSS-IoT 2024, Abu Dhabi, United Arab Emirates

The health sector stands as one of the most crucial and vulnerable domains, harbouring extensive personal data. Particularly, Electronic Health Records store information in electronic media where users lack control over their data. Unauthorized acces... Read More about Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.

PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme (2024)
Presentation / Conference Contribution
Yaqub, Z., Yigit, Y., Maglaras, L., Tan, Z., & Wooderson, P. (2024, April). PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme. Presented at The 20th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2024), Abu Dhabi, UAE

In the rapidly evolving landscape of Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flow. However, VANETs face significant security and privacy challenges due to... Read More about PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.

A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism (2024)
Presentation / Conference Contribution
Papaspirou, V., Kantzavelou, I., Yigit, Y., Maglaras, L., & Katsikas, S. (2024, July). A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism. Presented at ARES 2024: The 19th International Conference on Availability, Reliability and Security, Vienna, Austria

The evolution of authentication mechanisms in ensuring secure access to systems has been crucial for mitigating vulnerabilities and enhancing system security. However, despite advancements in two-factor authentication (2FA) and multi-factor authentic... Read More about A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism.

Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins (2024)
Presentation / Conference Contribution
Yigit, Y., Kioskli, K., Bishop, L., Chouliaras, N., Maglaras, L., & Janicke, H. (2024, June). Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins. Presented at 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Perth, Australia

This paper delves into enhancing cybersecurity training efficacy through an in-depth examination of gamified learning, behavioural strategies, and the deployment of digital twins. It identifies the critical role of behavioural strategies in bolsterin... Read More about Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins.

APOLLO: A Proximity-Oriented, Low-Layer Orchestration Algorithm for Resources Optimization in Mist Computing (2024)
Journal Article
Babaghayou, M., Chaib, N., Maglaras, L., Yigit, Y., Amine Ferrag, M., Marsh, C., & Moradpoor, N. (online). APOLLO: A Proximity-Oriented, Low-Layer Orchestration Algorithm for Resources Optimization in Mist Computing. Wireless Networks, https://doi.org/10.1007/s11276-024-03791-5

The fusion of satellite technologies with the Internet of Things (IoT) has propelled the evolution of mobile computing, ushering in novel communication paradigms and data management strategies. Within this landscape, the efficient management of compu... Read More about APOLLO: A Proximity-Oriented, Low-Layer Orchestration Algorithm for Resources Optimization in Mist Computing.

Automated Sensor Node Malicious Activity Detection with Explainability Analysis (2024)
Journal Article
Zubair, M., Janicke, H., Mohsin, A., Maglaras, L., & Sarker, I. H. (2024). Automated Sensor Node Malicious Activity Detection with Explainability Analysis. Sensors, 24(12), Article 3712. https://doi.org/10.3390/s24123712

Cybersecurity has become a major concern in the modern world due to our heavy reliance on cyber systems. Advanced automated systems utilize many sensors for intelligent decision-making, and any malicious activity of these sensors could potentially le... Read More about Automated Sensor Node Malicious Activity Detection with Explainability Analysis.

Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects (2024)
Journal Article
Sarker, I. H., Janicke, H., Mohsin, A., Gill, A., & Maglaras, L. (2024). Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects. ICT Express, 10(4), 935-958. https://doi.org/10.1016/j.icte.2024.05.007

Digital twins (DTs) are an emerging digitalization technology with a huge impact on today’s innovations in both industry and research. DTs can significantly enhance our society and quality of life through the virtualization of a real-world physical s... Read More about Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects.

Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing (2024)
Presentation / Conference Contribution
Babaghayou, M., Chaib, N., Maglaras, L., Yigit, Y., Ferrag, M. A., & Marsh, C. (2023, December). Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing. Presented at 16th EAI International Conference, WiCON 2023, Athens, Greece

In an era of rapidly evolving mobile computing, integrating satellite technologies with the Internet of Things (IoT) creates new communication and data management horizons. Our research focuses on the emerging challenge of efficiently managing heavy... Read More about Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing.

Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing (2024)
Journal Article
Bensaid, R., Labraoui, N., Abba Ari, A. A., Maglaras, L., Saidi, H., Abdu Lwahhab, A. M., & Benfriha, S. (2024). Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing. Security and Communication Networks, 2024, Article 6651584. https://doi.org/10.1155/2024/6651584

The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in a short period of time. Therefore, a combination of computing models such a... Read More about Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing.

Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing (2024)
Journal Article
Lambropoulos, G., Mitropoulos, S., Douligeris, C., & Maglaras, L. (2024). Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing. Computers, 13(2), Article 54. https://doi.org/10.3390/computers13020054

The widespread adoption of cloud computing has resulted in centralized datacenter structures; however, there is a requirement for smaller-scale distributed infrastructures to meet the demands for speed, responsiveness, and security for critical appli... Read More about Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing.

Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns (2024)
Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2024). Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. International Journal of Information Security, 23(3), 1679–1693. https://doi.org/10.1007/s10207-023-00809-5

Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches increasing. Firms and their staff are experiencing mass phishing attacks, several typical precursors to... Read More about Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns.

Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper (2024)
Presentation / Conference Contribution
Sarker, I. H., Janicke, H., Maglaras, L., & Camtepe, S. (2023, October). Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper. Presented at Third International Conference, ARTIIS 2023, Madrid, Spain

As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today’s digital era. Traditional security measures tend to be insufficient to defend against these persistent and dynamic thre... Read More about Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper.

Reliability Analysis of Fault Tolerant Memory Systems (2023)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023, November). Reliability Analysis of Fault Tolerant Memory Systems. Presented at The 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2023), Piraeus, Greece

This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction... Read More about Reliability Analysis of Fault Tolerant Memory Systems.

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks (2023)
Presentation / Conference Contribution
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023, December). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. Presented at 2023 IEEE Globecom Workshops (GC Wkshps): Workshop on Enabling Security, Trust, and Privacy in 6G Wireless Systems, Kuala Lumpur, Malaysia

As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, t... Read More about Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis (2023)
Presentation / Conference Contribution
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (2023, November). Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. Presented at IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMDAD) 2023, Edinburgh, UK

Malware research has predominantly focused on Windows and Android Operating Systems (OS), leaving Mac OS malware relatively unexplored. This paper addresses the growing threat of Mac OS malware by leveraging Machine Learning (ML) techniques. We propo... Read More about Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.

Cyber Malware: Offensive and Defensive Systems (2023)
Book
Almomani, I., Maglaras, L. A., Ferrag, M. A., & Ayres, N. (Eds.). (2023). Cyber Malware: Offensive and Defensive Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-34969-0

This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta... Read More about Cyber Malware: Offensive and Defensive Systems.