Skip to main content

Research Repository

Advanced Search

All Outputs (9)

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed (2019)
Journal Article
Maglaras, L., Cruz, T., Ferrag, M. A., & Janicke, H. (2020). Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technology Letters, 3(1), Article e132. https://doi.org/10.1002/itl2.132

Security of Critical National Infrastructures (CNI) is one of the major concerns to countries both in a European and in a worldwide level. Training on scenarios that involve such systems is important to the effective handling of incidents. Experienti... Read More about Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.

Estimating the Relative Speed of RF Jammers in VANETs (2019)
Journal Article
Kosmanos, D., Argyriou, A., & Maglaras, L. (2019). Estimating the Relative Speed of RF Jammers in VANETs. Security and Communication Networks, 2019, Article 2064348. https://doi.org/10.1155/2019/2064348

Vehicular Ad Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their perform... Read More about Estimating the Relative Speed of RF Jammers in VANETs.

Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems (2019)
Book Chapter
Maglaras, L., Janicke, H., Jiang, J., & Crampton, A. (2019). Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems. In Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications (299-318). IGI Global. https://doi.org/10.4018/978-1-5225-9866-4.ch017

SCADA (Supervisory Control and Data Acquisition) systems are a critical part of modern national critical infrastructure (CI) systems. Due to the rapid increase of sophisticated cyber threats with exponentially destructive effects, intrusion detection... Read More about Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems.

DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services (2019)
Journal Article
Ferrag, M. A., & Maglaras, L. (2019). DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services. Computers, 8(3), Article 58. https://doi.org/10.3390/computers8030058

In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system initialization phase, creat... Read More about DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services.

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security (2019)
Journal Article
Derhab, A., Guerroumi, M., Gumaei, A., Maglaras, L., Ferrag, M. A., Mukherjee, M., & Khan, F. A. (2019). Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors, 19(14), Article 3119. https://doi.org/10.3390/s19143119

The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies and approaches should be... Read More about Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.

DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids (2019)
Journal Article
Ferrag, M. A., & Maglaras, L. (2020). DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids. IEEE Transactions on Engineering Management, 67(4), 1285-1297. https://doi.org/10.1109/tem.2019.2922936

In this paper, we propose a novel deep learning and blockchain-based energy framework for smart grids, entitled DeepCoin. The DeepCoin framework uses two schemes, a blockchain-based scheme and a deep learning-based scheme. The blockchain-based scheme... Read More about DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids.

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends (2019)
Journal Article
Ferrag, M. A., Maglaras, L., & Derhab, A. (2019). Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. Security and Communication Networks, 2019, Article 5452870. https://doi.org/10.1155/2019/5452870

Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summarise the factors that hinder biometrics models’ development and deployment on a large scale, including human physiol... Read More about Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.

Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector (2019)
Journal Article
Evans, M., He, Y., Maglaras, L., Yevseyeva, I., & Janicke, H. (2019). Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. International Journal of Medical Informatics, 127, 109-119. https://doi.org/10.1016/j.ijmedinf.2019.04.019

Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two thirds of these incidents pertain to human error, but despite this, there are... Read More about Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector.

Protecting Civilians from Cyber Warfare with Cyber Buffer Zones (2019)
Journal Article
Robinson, M., Maglaras, L., Jones, K., & Janicke, H. (2019). Protecting Civilians from Cyber Warfare with Cyber Buffer Zones. International Journal of Smart Security Technologies, 6(1), 31-48. https://doi.org/10.4018/ijsst.2019010103

Cyber peacekeeping has quickly risen in prominence as a viable way to regulate the impact cyber warfare has upon civilian security. In this article, the concept of a cyber buffer zone is explored, and proposals are made on how it could be used to fur... Read More about Protecting Civilians from Cyber Warfare with Cyber Buffer Zones.