Skip to main content

Research Repository

Advanced Search

All Outputs (7)

CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems (2018)
Book Chapter
Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Janicke, H., & Jones, K. (2018). CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (622-637). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch033

Cyber Security of ICS/SCADA systems is a major aspect of current research focus. Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real SCADA systems with low costs. Significantly lacking from current research, is... Read More about CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems.

A Novel Method for Calculating Customer Reviews Ratings (2018)
Book Chapter
Vourgidis, I. S., Carter, J., Maglaras, L., Janicke, H., Folia, Z., & Fragkou, P. (2018). A Novel Method for Calculating Customer Reviews Ratings. In A. Elçi (Ed.), Handbook of Research on Contemporary Perspectives on Web-Based Systems (460-478). IGI Global. https://doi.org/10.4018/978-1-5225-5384-7.ch020

The number of consumers consulting online reviews in order to purchase a product or service, keeps growing. In addition to that, consumers can add an online review in order to express their experience upon the services or products received. This iter... Read More about A Novel Method for Calculating Customer Reviews Ratings.

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (2018)
Book Chapter
Cook, A., Smith, R., Maglaras, L., & Janicke, H. (2018). SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (1168-1183). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch057

The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for inv... Read More about SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.

Developing cyber peacekeeping: Observation, monitoring and reporting (2018)
Journal Article
Robinson, M., Jones, K., Janicke, H., & Maglaras, L. (2019). Developing cyber peacekeeping: Observation, monitoring and reporting. Government Information Quarterly, 36(2), 276-293. https://doi.org/10.1016/j.giq.2018.12.001

Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber warfare increasingly becoming part of future conflicts, new and novel solutions are needed to assist governments in securing their national infrastructur... Read More about Developing cyber peacekeeping: Observation, monitoring and reporting.

Blockchain Technologies for the Internet of Things: Research Issues and Challenges (2018)
Journal Article
Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2019). Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet of Things, 6(2), 2188-2204. https://doi.org/10.1109/jiot.2018.2882794

This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we pr... Read More about Blockchain Technologies for the Internet of Things: Research Issues and Challenges.

HEART-IS: A novel technique for evaluating human error-related information security incidents (2018)
Journal Article
Evans, M., He, Y., Maglaras, L., & Janicke, H. (2019). HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers and Security, 80, 74-89. https://doi.org/10.1016/j.cose.2018.09.002

Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to information security. Despite this level of understanding organisations conti... Read More about HEART-IS: A novel technique for evaluating human error-related information security incidents.

Vulnerability Analysis of Network Scanning on SCADA Systems (2018)
Journal Article
Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018). Vulnerability Analysis of Network Scanning on SCADA Systems. Security and Communication Networks, 2018, Article 3794603. https://doi.org/10.1155/2018/3794603

Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructure environments for decades. With the demand for remote facilities to be con... Read More about Vulnerability Analysis of Network Scanning on SCADA Systems.