Skip to main content

Research Repository

Advanced Search

All Outputs (47)

Internet of drones security: taxonomies, open issues, and future directions (2022)
Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023). Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.vehcom.2022.100552

Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions... Read More about Internet of drones security: taxonomies, open issues, and future directions.

DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data (2022)
Journal Article
Saidi, H., Labraoui, N., Ari, A. A. A., Maglaras, L. A., & Emati, J. H. M. (2022). DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data. IEEE Access, 10, 101011-101028. https://doi.org/10.1109/access.2022.3207803

In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite increased attention to the security of electronic health records, patient privacy is still at... Read More about DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data.

Transforming Points of Single Contact Data into Linked Data (2022)
Journal Article
Fragkou, P., & Maglaras, L. (2022). Transforming Points of Single Contact Data into Linked Data. Computers, 11(8), Article 122. https://doi.org/10.3390/computers11080122

Open data portals contain valuable information for citizens and business. However, searching for information can prove to be tiresome even in portals tackling domains similar information. A typical case is the information residing in the European Com... Read More about Transforming Points of Single Contact Data into Linked Data.

Cyber Threats in the Healthcare Sector and Countermeasures (2022)
Book Chapter
Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2022). Cyber Threats in the Healthcare Sector and Countermeasures. In M. Khosrow-Pour (Ed.), Research Anthology on Securing Medical Systems and Records. IGI Global. https://doi.org/10.4018/978-1-6684-6311-6.ch001

Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get una... Read More about Cyber Threats in the Healthcare Sector and Countermeasures.

Artificial Intelligence: Practical and Ethical Challenges (2022)
Book Chapter
Rice, S., & Maglaras, L. (2022). Artificial Intelligence: Practical and Ethical Challenges. In M. Ahmed, S. Rabiul Islam, A. Anwar, N. Moustafa, & A. Khan Pathan (Eds.), Explainable Artificial Intelligence for Cyber Security (59-71). Springer. https://doi.org/10.1007/978-3-030-96630-0_3

Artificial Intelligence (AI) & Machine Learning (ML) is used everywhere in daily life from speech recognition on our phones, targeted marketing strategies & face recognition without the majority of society even realising it. The power of technology a... Read More about Artificial Intelligence: Practical and Ethical Challenges.

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning (2022)
Journal Article
Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access, 10, 40281-40306. https://doi.org/10.1109/access.2022.3165809

In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and... Read More about Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.

SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles (2022)
Conference Proceeding
Babaghayou, M., Labraoui, N., Ari, A. A. A., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2022). SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles. In CROWNCOM 2021, WiCON 2021: Cognitive Radio Oriented Wireless Networks and Wireless Internet (343-360). https://doi.org/10.1007/978-3-030-98002-3_25

The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhancing applications provided by the Internet of Vehicles (IoV) paradigm are on... Read More about SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles.

FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things (2022)
Journal Article
Friha, O., Ferrag, M. A., Shu, L., Maglaras, L., Choo, K. R., & Nafaa, M. (2022). FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. Journal of Parallel and Distributed Computing, 165, 17-31. https://doi.org/10.1016/j.jpdc.2022.03.003

In this paper, we propose a federated learning-based intrusion detection system, named FELIDS, for securing agricultural-IoT infrastructures. Specifically, the FELIDS system protects data privacy through local learning, where devices benefit from the... Read More about FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.

Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure (2022)
Journal Article
He, Y., Maglaras, L., Aliyu, A., & Luo, C. (2022). Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure. Security and Communication Networks, 2022, Article 2775249. https://doi.org/10.1155/2022/2775249

The healthcare information system (HIS) has become a victim of cyberattacks. Traditional ways to handle cyber incidents in healthcare organizations follow a predefined incident response (IR) procedure. However, this procedure is usually reactive, mis... Read More about Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure.

A multiplayer game model to detect insiders in wireless sensor networks (2022)
Journal Article
Kantzavelou, I., Maglaras, L., Tzikopoulos, P. F., & Katsikas, S. (2022). A multiplayer game model to detect insiders in wireless sensor networks. PeerJ Computer Science, 8, Article e791. https://doi.org/10.7717/peerj-cs.791

Insiders might have incentives and objectives opposed to those of the belonging organization. It is hard to detect them because of their privileges that partially protect them. In Wireless Sensor Networks (WSNs), significant security issues arise, in... Read More about A multiplayer game model to detect insiders in wireless sensor networks.

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis (2021)
Journal Article
Ferrag, M. A., Friha, O., Maglaras, L., Janicke, H., & Shu, L. (2021). Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access, 9, 138509-138542. https://doi.org/10.1109/access.2021.3118642

In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications. Specifically, we first provide a review of the federated learning-b... Read More about Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.

A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks (2021)
Journal Article
Lambat, Y., Ayres, N., Maglaras, L., & Ferrag, M. A. (2021). A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks. Applied Sciences, 11(19), Article 9083. https://doi.org/10.3390/app11199083

It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated... Read More about A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks.

Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia (2021)
Journal Article
Almomani, I., Ahmed, M., & Maglaras, L. (2021). Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Computer Science, 7, Article e703. https://doi.org/10.7717/peerj-cs.703

The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regulatory Framework (CRF) and the NCA’s Essential Cybersecurity Controls (ECC) to ensure data and infrastructure security in all IT-based systems. However... Read More about Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia.

Intrusion Detection in Critical Infrastructures: A Literature Review (2021)
Journal Article
Panagiotis, F., Taxiarxchis, K., Georgios, K., Maglaras, L., & Ferrag, M. A. (2021). Intrusion Detection in Critical Infrastructures: A Literature Review. Smart Cities, 4(3), 1146-1157. https://doi.org/10.3390/smartcities4030061

Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we c... Read More about Intrusion Detection in Critical Infrastructures: A Literature Review.

RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks (2021)
Journal Article
Kosmanos, D., Karagiannis, D., Argyriou, A., Lalis, S., & Maglaras, L. (2021). RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks. Security and Communication Networks, 2021, Article 9959310. https://doi.org/10.1155/2021/9959310

Wireless communications are vulnerable against radio frequency (RF) interference which might be caused either intentionally or unintentionally. A particular subset of wireless networks, Vehicular Ad-hoc NETworks (VANET), which incorporate a series of... Read More about RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks.

WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles (2021)
Journal Article
Babaghayou, M., Labraoui, N., Abba Ari, A. A., Ferrag, M. A., Maglaras, L., & Janicke, H. (2021). WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors, 21(7), Article 2443. https://doi.org/10.3390/s21072443

Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts main... Read More about WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.