Skip to main content

Research Repository

Advanced Search

All Outputs (7)

The Cost Perspective of Password Security (2020)
Book Chapter
Maglaras, L., Janicke, H., & Ferrag, M. A. (2020). The Cost Perspective of Password Security. In B. B. Gupta, & D. Gupta (Eds.), Handbook of Research on Multimedia Cyber Security (319-330). IGI Global. https://doi.org/10.4018/978-1-7998-2701-6.ch017

This study technically analyses the maximum number of combinations for common passwords up to 12 characters long. A maximum storage size necessary for the creation of a data base that holds all possible passwords up to 12 characters is also presented... Read More about The Cost Perspective of Password Security.

Cyber Threats in the Healthcare Sector and Countermeasures (2020)
Book Chapter
Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2020). Cyber Threats in the Healthcare Sector and Countermeasures. In A. Masouras, G. Maris, & A. Kavoura (Eds.), Entrepreneurial Development and Innovation in Family Businesses and SMEs (109-124). IGI Global. https://doi.org/10.4018/978-1-7998-3648-3.ch007

Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get una... Read More about Cyber Threats in the Healthcare Sector and Countermeasures.

Developing Cyber Buffer Zones (2020)
Book Chapter
Robinson, M., Jones, K., Janicke, H., & Maglaras, L. (2020). Developing Cyber Buffer Zones. In M. Khosrow-Pour (Ed.), Encyclopedia of Criminal Activities and the Deep Web (287-303). IGI Global. https://doi.org/10.4018/978-1-5225-9715-5.ch019

Cyber peacekeeping is a new and novel field of research that focuses on the ways that nations and society can restore peace and security in the aftermath of cyber warfare. In this article, the authors make an original contribution to the field by dev... Read More about Developing Cyber Buffer Zones.

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks (2020)
Journal Article
Derhab, A., Bouras, A., Belaoued, M., Maglaras, L., & Khan, F. A. (2020). Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors, 20(21), Article 6106. https://doi.org/10.3390/s20216106

In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored nod... Read More about Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.

The Security Aspects of Automotive Over-the-Air Updates (2020)
Journal Article
Howden, J., Maglaras, L., & Ferrag, M. A. (2020). The Security Aspects of Automotive Over-the-Air Updates. International Journal of Cyber Warfare and Terrorism, 10(2), 64-81. https://doi.org/10.4018/ijcwt.2020040104

Over-the-air (OTA) update is a method for vehicle manufacturers to remotely distribute maintenance updates, performance, and feature enhancements through the vehicle's lifespan. Recalls of vehicles cost the manufactures a lot of money. OTA solves the... Read More about The Security Aspects of Automotive Over-the-Air Updates.

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks (2020)
Journal Article
Ferrag, M. A., Maglaras, L., Ahmim, A., Derdour, M., & Janicke, H. (2020). RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet, 12(3), Article 44. https://doi.org/10.3390/fi12030044

This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip a... Read More about RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.

Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems (2020)
Journal Article
Vourgidis, I., Maglaras, L., Alfakeeh, A. S., Al-Bayatti, A. H., & Ferrag, M. A. (2020). Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems. Sensors, 20(4), Article 997. https://doi.org/10.3390/s20040997

The field of cooperative intelligent transport systems and more specifically pedestrians to vehicles could be characterized as quite challenging, since there is a broad research area to be studied, with direct positive results to society. Pedestrians... Read More about Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems.