Skip to main content

Research Repository

Advanced Search

All Outputs (7)

Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities (2025)
Journal Article
Yigit, Y., Amine Ferrag, M., Ghanem, M. C., Sarker, I. H., Maglaras, L. A., Chrysoulas, C., Moradpoor, N., Tihanyi, N., & Janicke, H. (2025). Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities. Sensors, 25(6), Article 1666

Critical National Infrastructures (CNIs)—including energy grids, water systems, 1 transportation networks, and communication frameworks—are essential to modern society 2 yet face escalating cybersecurity threats. This review paper comprehensively ana... Read More about Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities.

A novel TLS-based Fingerprinting approach that combines feature expansion and similarity mapping (2025)
Journal Article
Thomson, A., Maglaras, L., & Moradpoor, N. (2025). A novel TLS-based Fingerprinting approach that combines feature expansion and similarity mapping. Future Internet, 17(3), Article 120. https://doi.org/10.3390/fi17030120

Malicious domains are part of the landscape of the internet but are becoming more prevalent and more dangerous to both companies and individuals. They can be hosted on variety of technologies and serve an array of content, ranging from Malware, comma... Read More about A novel TLS-based Fingerprinting approach that combines feature expansion and similarity mapping.

Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis (2025)
Presentation / Conference Contribution
Weir, S., Khan, M. S., Moradpoor, N., & Ahmad, J. (2024, December). Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis. Presented at 2024 17th International Conference on Security of Information and Networks (SIN), Sydney, Australia

This study explores advancements in AI-generated image detection, emphasizing the increasing realism of images, including deepfakes, and the need for effective detection methods. Traditional Convolutional Neural Networks (CNNs) have shown success but... Read More about Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis.

EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit (2025)
Presentation / Conference Contribution
Alpdag, K., Moradpoor, N., Hasina Andriambelo, N., Wooderson, P., & Maglaras, L. (2024, December). EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit. Presented at SINCONF 2024: 17th International Conference on Security of Information and Networks, Online

In the rapidly evolving realm of electric vehicle technology, safeguarding the cybersecurity of both electric vehicles and their charging infrastructure has become fundamental. The integration of electric vehicles and their charging stations into the... Read More about EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit.

Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles with Lightweight Blockchain and Binius Zero- Knowledge Proofs (2025)
Presentation / Conference Contribution
Andriambelo, N. H., & Moradpoor, N. (2024, December). Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles with Lightweight Blockchain and Binius Zero- Knowledge Proofs. Presented at 2024 17th International Conference on Security of Information and Networks (SIN), Sydney, Australia

The rise of autonomous vehicles (AVs) brings with it the need for secure and privacy-preserving machine learning models. Federated learning (FL) allows AVs to collaboratively train models while keeping raw data localized. However, traditional FL syst... Read More about Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles with Lightweight Blockchain and Binius Zero- Knowledge Proofs.

Lightweight Blockchain Prototype for Food Supply Chain Management (2025)
Presentation / Conference Contribution
Rusakov, A., Moradpoor, N., & Akbarzadeh, A. (2024, December). Lightweight Blockchain Prototype for Food Supply Chain Management. Presented at 2024 17th International Conference on Security of Information and Networks (SIN), Sydney, Australia

The modern food supply chain often involves multiple layers of participants spread across different countries and continents. This complex system offers significant benefits to businesses worldwide; however, it also presents several challenges. One m... Read More about Lightweight Blockchain Prototype for Food Supply Chain Management.

Adversarial Attacks on Supervised Energy-Based Anomaly Detection in Clean Water Systems (2025)
Journal Article
Moradpoor, N., Abah, E., Robles-Durazno, A., & Maglaras, L. (2025). Adversarial Attacks on Supervised Energy-Based Anomaly Detection in Clean Water Systems. Electronics, 14(3), Article 639. https://doi.org/10.3390/electronics14030639

Critical National Infrastructure includes large networks such as telecommunications, 11 transportation, health services, police, nuclear power plants, and utilities like clean water, gas, and 12 electricity. The protection of these infrastructures is... Read More about Adversarial Attacks on Supervised Energy-Based Anomaly Detection in Clean Water Systems.