Skip to main content

Research Repository

Advanced Search

All Outputs (44)

Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV (2025)
Presentation / Conference Contribution
Andriambelo, N. H., Moradpoor, N., & Maglaras, L. (2025, May). Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV. Presented at CCNI 2025: 3rd International Workshop on Cybersecurity of Critical National Infrastructures (co-organized with IEEE WOWMOM 2025), Fort Worth, Texas

Decentralized and Connected Autonomous Vehicle (CAV) networks present significant opportunities for improving road safety, efficiency, and traffic management. However, the widespread deployment of these systems is hindered by critical security and pr... Read More about Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV.

Privacy-Preserving Knowledge Graph Sharing in Peer-to-Peer Decentralized Federated Learning for Connected Autonomous Vehicles (2025)
Presentation / Conference Contribution
Andriambelo, N. H., & Moradpoor, N. (2025, August). Privacy-Preserving Knowledge Graph Sharing in Peer-to-Peer Decentralized Federated Learning for Connected Autonomous Vehicles. Presented at ARES '25: 20th International Conference on Availability, Reliability and Security, Ghent, Belgium

We present a decentralized framework that enables privacypreserving knowledge graph sharing and robust federated learning among Connected Autonomous Vehicles (CAVs), without relying on trusted coordinators. Each vehicle constructs a local semantic gr... Read More about Privacy-Preserving Knowledge Graph Sharing in Peer-to-Peer Decentralized Federated Learning for Connected Autonomous Vehicles.

A Blockchain-Powered Defence System Against DDoS Attacks with Incentivised Collaboration (2025)
Presentation / Conference Contribution
Rajesh, H., Moradpoor, N., Waqas, M., & Maglaras, L. (2025, June). A Blockchain-Powered Defence System Against DDoS Attacks with Incentivised Collaboration. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

Distributed Denial of Service (DDoS) attacks continuously pose a significant threat to online services by overwhelming them, rendering them unavailable to legitimate users. This underscores the need for more sophisticated techniques with robust detec... Read More about A Blockchain-Powered Defence System Against DDoS Attacks with Incentivised Collaboration.

A Proposed Continuous Facial Recognition Framework for Adaptive Environmental Detection (2025)
Presentation / Conference Contribution
Zeeshan, N., Spada, L. L., & Moradpoor, N. (2025, June). A Proposed Continuous Facial Recognition Framework for Adaptive Environmental Detection. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

With the continuous evolution of the smart environment, the use of Internet services is becoming more common. The increased usage of these services has impacted the traditional network boundaries. This shift has created a need for more flexible, accu... Read More about A Proposed Continuous Facial Recognition Framework for Adaptive Environmental Detection.

Binius Zero-Knowledge Proofs Meet Multi-Layer Bloom Filters: A Secure and Efficient Protocol for Federated Learning in Autonomous Vehicle Networks (2025)
Presentation / Conference Contribution
Andriambelo, H., & Moradpoor, N. (2025, June). Binius Zero-Knowledge Proofs Meet Multi-Layer Bloom Filters: A Secure and Efficient Protocol for Federated Learning in Autonomous Vehicle Networks. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

We present a secure and efficient federated learning protocol for autonomous vehicles that resists data leaks, redundancy, and adversarial attacks. Our system combines fast zero-knowledge proofs and compressed Bloom filters to verify updates without... Read More about Binius Zero-Knowledge Proofs Meet Multi-Layer Bloom Filters: A Secure and Efficient Protocol for Federated Learning in Autonomous Vehicle Networks.

Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems (2025)
Presentation / Conference Contribution
Korac, S., Maglaras, L., Moradpoor, N., Kioskli, K., Buchanan, W., & Canberk, B. (2025, June). Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

Ransomware has been predominantly a threat to Windows systems. But, Linux systems became interesting for cybercriminals and this trend is expected to continue. This endangers IoT ecosystems, whereas many IoT systems are based on Linux (e.g. cloud inf... Read More about Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems.

ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality (2025)
Presentation / Conference Contribution
Alsop, H., Alsop, D., Solomon, J., Aumento, L., Butters, M., Millar, C., Maglaras, L., Yigit, Y., Moradpoor, N., & Canberk, B. (2025, June). ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality. Poster presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

End-to-end encryption (E2EE) ensures that only the intended recipient(s) can read messages. Popular instant messaging (IM) applications such as Signal, WhatsApp, Apple's iMessage, and Telegram claim to offer E2EE. However, client-side scanning (CSS)... Read More about ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality.

Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis (2025)
Presentation / Conference Contribution
Weir, S., Khan, M. S., Moradpoor, N., & Ahmad, J. (2024, December). Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis. Presented at 2024 17th International Conference on Security of Information and Networks (SIN), Sydney, Australia

This study explores advancements in AI-generated image detection, emphasizing the increasing realism of images, including deepfakes, and the need for effective detection methods. Traditional Convolutional Neural Networks (CNNs) have shown success but... Read More about Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis.

Lightweight Blockchain Prototype for Food Supply Chain Management (2025)
Presentation / Conference Contribution
Rusakov, A., Moradpoor, N., & Akbarzadeh, A. (2024, December). Lightweight Blockchain Prototype for Food Supply Chain Management. Presented at 2024 17th International Conference on Security of Information and Networks (SIN), Sydney, Australia

The modern food supply chain often involves multiple layers of participants spread across different countries and continents. This complex system offers significant benefits to businesses worldwide; however, it also presents several challenges. One m... Read More about Lightweight Blockchain Prototype for Food Supply Chain Management.

EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit (2025)
Presentation / Conference Contribution
Alpdag, K., Moradpoor, N., Hasina Andriambelo, N., Wooderson, P., & Maglaras, L. (2024, December). EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit. Presented at SINCONF 2024: 17th International Conference on Security of Information and Networks, Online

In the rapidly evolving realm of electric vehicle technology, safeguarding the cybersecurity of both electric vehicles and their charging infrastructure has become fundamental. The integration of electric vehicles and their charging stations into the... Read More about EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit.

Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles with Lightweight Blockchain and Binius Zero- Knowledge Proofs (2025)
Presentation / Conference Contribution
Andriambelo, N. H., & Moradpoor, N. (2024, December). Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles with Lightweight Blockchain and Binius Zero- Knowledge Proofs. Presented at 2024 17th International Conference on Security of Information and Networks (SIN), Sydney, Australia

The rise of autonomous vehicles (AVs) brings with it the need for secure and privacy-preserving machine learning models. Federated learning (FL) allows AVs to collaboratively train models while keeping raw data localized. However, traditional FL syst... Read More about Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles with Lightweight Blockchain and Binius Zero- Knowledge Proofs.

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records (2024)
Presentation / Conference Contribution
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (2024, April). Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records. Presented at DCOSS-IoT 2024, Abu Dhabi, United Arab Emirates

The health sector stands as one of the most crucial and vulnerable domains, harbouring extensive personal data. Particularly, Electronic Health Records store information in electronic media where users lack control over their data. Unauthorized acces... Read More about Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.

Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario (2024)
Presentation / Conference Contribution
Adesanya, O. M., Moradpoor, N., Maglaras, L., Lim, I. S., & Ferrag, M. A. (2024, April). Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario. Presented at 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Abu Dhabi, United Arab Emirates

The rapid growth of Internet of Things technology has introduced an era of numerous interconnected devices, transforming the communication with the physical world. However, the security and privacy of the data generated and stored on these devices ha... Read More about Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario.

Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems (2024)
Presentation / Conference Contribution
Jayadev, V., Moradpoor, N., & Petrovski, A. (2024, July). Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems. Paper presented at 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, Austria

Blockchain technology offers a decentralized and secure platform for addressing various challenges in smart cities and cyber-physical systems, including identity management, trust and transparency, and supply chain management. However, blockchains ar... Read More about Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems.

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis (2023)
Presentation / Conference Contribution
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (2023, November). Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. Presented at IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMDAD) 2023, Edinburgh, UK

Malware research has predominantly focused on Windows and Android Operating Systems (OS), leaving Mac OS malware relatively unexplored. This paper addresses the growing threat of Mac OS malware by leveraging Machine Learning (ML) techniques. We propo... Read More about Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.

Reliability Analysis of Fault Tolerant Memory Systems (2023)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023, November). Reliability Analysis of Fault Tolerant Memory Systems. Presented at The 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2023), Piraeus, Greece

This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction... Read More about Reliability Analysis of Fault Tolerant Memory Systems.

The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System (2023)
Presentation / Conference Contribution
Moradpoor, N., Maglaras, L., Abah, E., & Robles-Durazno, A. (2023, June). The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System. Presented at 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Pafos, Cyprus

The protection of Critical National Infrastructure is extremely important due to nations being dependent on their operation and steadiness. Any disturbance to this infrastructure could have a devastating consequence on physical security, economic wel... Read More about The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System.

A Blockchain-based two Factor Honeytoken Authentication System (2023)
Presentation / Conference Contribution
Papaspirou, V., Maglaras, L., Kantzavelou, I., Moradpoor, N., & Katsikas, S. (2023, September). A Blockchain-based two Factor Honeytoken Authentication System. Poster presented at 28th European Symposium on Research in Computer Security (ESORICS), The Hague

This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the authentication method, preventing various attacks, including tampering att... Read More about A Blockchain-based two Factor Honeytoken Authentication System.

Fake PLC in the cloud, we thought the attackers believed that: How ICS honeypot deception gets impacted by cloud deployments? (2023)
Presentation / Conference Contribution
Ivanova, S., & Moradpoor, N. (2023, April). Fake PLC in the cloud, we thought the attackers believed that: How ICS honeypot deception gets impacted by cloud deployments?. Presented at WFCS 2023: 19th IEEE International Conference on Factory Communication Systems, Pavia, Italy

The Industrial Control System (ICS) industry faces an ever-growing number of cyber threats - defence against which can be strengthened using honeypots. As the systems they mimic, ICS honeypots shall be deployed in a similar context to field ICS syste... Read More about Fake PLC in the cloud, we thought the attackers believed that: How ICS honeypot deception gets impacted by cloud deployments?.

Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain (2023)
Presentation / Conference Contribution
Moradpoor, N., Barati, M., Robles-Durazno, A., Abah, E., & McWhinnie, J. (2022, June). Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain. Presented at Cyber Science 2022: International Conference on Cybersecurity, Situational Awareness and Social Media, Cardiff Metropolitan University, Wales

The protection of critical national infrastructures such as drinking water, gas, and electricity is extremely important as nations are dependent on their operation and steadiness. However, despite the value of such utilities their security issues hav... Read More about Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain.