Skip to main content

Research Repository

Advanced Search

All Outputs (60)

Towards Building a Smart Water Management System (SWAMS) in Nigeria (2024)
Conference Proceeding
Bamgboye, O., Chrysoulas, C., Liu, X., Watt, T., Sodiya, A., Oyeleye, M., & Kalutharage, S. (in press). Towards Building a Smart Water Management System (SWAMS) in Nigeria.

The water management landscape in Nigeria struggles with formidable obstacles characterized by a lack of adequate infrastructure, an uneven distribution of resources, and insufficient access to clean water, particularly in rural areas. These challeng... Read More about Towards Building a Smart Water Management System (SWAMS) in Nigeria.

Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution (2023)
Conference Proceeding
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (2023). Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution. In P. Kommers, I. Arnedillo Sánchez, & P. Isaías (Eds.), PROCEEDINGS OF THE 16 th IADIS INTERNATIONAL CONFERENCE INFORMATION SYSTEMS 2023 (21-28)

This article is a report on the lessons learned when conducting an interpretive case study in a developing country. From the literature review, it was apparent that there are few reported lessons from pilot studies about strategic alignment in higher... Read More about Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution.

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks (2023)
Conference Proceeding
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. In 2023 IEEE Globecom Workshops (GC Wkshps). https://doi.org/10.1109/GCWkshps58843.2023.10465218

As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, t... Read More about Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques (2023)
Conference Proceeding
Gomez, L. R., Watt, T., Babaagba, K. O., Chrysoulas, C., Homay, A., Rangarajan, R., & Liu, X. (2023). Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques. In ICISS '23: Proceedings of the 2023 6th International Conference on Information Science and Systems (113-118). https://doi.org/10.1145/3625156.3625173

In recent years, text has been the main form of communication on social media platforms such as Twitter, Reddit, Facebook, Instagram and YouTube. Emotion Recognition from these platforms can be exploited for all sorts of applications. Through the mea... Read More about Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques.

Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap (2023)
Journal Article
El Boudani, B., Dagiuklas, T., Kanaris, L., Iqbal, M., & Chrysoulas, C. (2023). Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap. Electronics, 12(19), Article 4150. https://doi.org/10.3390/electronics12194150

Indoor positioning is a core enabler for various 5G identity and context-aware applications requiring precise and real-time simultaneous localisation and mapping (SLAM). In this work, we propose a K-nearest neighbours and deep neural network (K-DNN)... Read More about Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap.

Edge NLP for Efficient Machine Translation in Low Connectivity Areas (2023)
Conference Proceeding
Watt, T., Chrysoulas, C., & Gkatzia, D. (in press). Edge NLP for Efficient Machine Translation in Low Connectivity Areas.

Machine translation (MT) usually requires connectivity and access to the cloud which is often limited in many parts of the world, including hard to reach rural areas. Edge natural language processing (NLP) aims to solve this problem by processing lan... Read More about Edge NLP for Efficient Machine Translation in Low Connectivity Areas.

Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas (2023)
Conference Proceeding
Josephe, A. O., Chrysoulas, C., Peng, T., El Boudani, B., Iatropoulos, I., & Pitropakis, N. (2023). Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas. In 2023 IEEE IAS Global Conference on Emerging Technologies (GlobConET). https://doi.org/10.1109/GlobConET56651.2023.10150058

Web applications are popular in our world today and every organization or individual either build or access at least one each day. It’s important for every application user to continue accessing contents of a web application irrespective of the netwo... Read More about Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas.

Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System (2023)
Conference Proceeding
Laing, S., Ludwiniak, R., El Boudani, . B., Chrysoulas, C., Ubakanma, G., & Pitropakis, N. (2023). Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System. In 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN). https://doi.org/10.1109/DRCN57075.2023.10108330

The usage of cloud systems is at an all-time high, and with more organizations reaching for Big Data the forensic implications must be analyzed. The Hadoop Distributed File System is widely used both as a cloud service and with organizations implemen... Read More about Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System.

Attacking Windows Hello for Business: Is It What We Were Promised? (2023)
Journal Article
Haddad, J., Pitropakis, N., Chrysoulas, C., Lemoudden, M., & Buchanan, W. J. (2023). Attacking Windows Hello for Business: Is It What We Were Promised?. Cryptography, 7(1), Article 9. https://doi.org/10.3390/cryptography7010009

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to... Read More about Attacking Windows Hello for Business: Is It What We Were Promised?.

Explainable AI-Based DDOS Attack Identification Method for IoT Networks (2023)
Journal Article
Kalutharage, C. S., Liu, X., Chrysoulas, C., Pitropakis, N., & Papadopoulos, P. (2023). Explainable AI-Based DDOS Attack Identification Method for IoT Networks. Computers, 12(2), Article 32. https://doi.org/10.3390/computers12020032

The modern digitized world is mainly dependent on online services. The availability of online systems continues to be seriously challenged by distributed denial of service (DDoS) attacks. The challenge in mitigating attacks is not limited to identify... Read More about Explainable AI-Based DDOS Attack Identification Method for IoT Networks.

Using Social Media & Sentiment Analysis to Make Investment Decisions (2022)
Journal Article
Hasselgren, B., Chrysoulas, C., Pitropakis, N., & Buchanan, W. J. (2023). Using Social Media & Sentiment Analysis to Make Investment Decisions. Future Internet, 15(1), Article 5. https://doi.org/10.3390/fi15010005

Making investment decisions by utilizing sentiment data from social media (SM) is starting to become a more tangible concept. There has been a broad investigation into this field of study over the last decade, and many of the findings have promising... Read More about Using Social Media & Sentiment Analysis to Make Investment Decisions.

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) (2022)
Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022). Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8

Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detecting attacks. However, the lack of transparency in their decision-making pro... Read More about Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract).

Investigating Machine Learning Attacks on Financial Time Series Models (2022)
Journal Article
Gallagher, M., Pitropakis, N., Chrysoulas, C., Papadopoulos, P., Mylonas, A., & Katsikas, S. (2022). Investigating Machine Learning Attacks on Financial Time Series Models. Computers and Security, 123, https://doi.org/10.1016/j.cose.2022.102933

Machine learning and Artificial Intelligence (AI) already support human decision-making and complement professional roles, and are expected in the future to be sufficiently trusted to make autonomous decisions. To trust AI systems with such tasks, a... Read More about Investigating Machine Learning Attacks on Financial Time Series Models.

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture (2022)
Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022). GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291

E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the esta... Read More about GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2022)
Conference Proceeding
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., …Tsolis, D. (2022). GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. In Computer Security. ESORICS 2021 International Workshops. https://doi.org/10.1007/978-3-030-95484-0_3

The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks.... Read More about GLASS: Towards Secure and Decentralized eGovernance Services using IPFS.

An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university (2022)
Conference Proceeding
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (in press). An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university. In Information Systems and Technologies: WorldCIST 2023 Volume 1

This study draws attention to less studied areas of middle management role in business strategy formulation, information strategy formulation, and their alignment in developing countries. It was conducted as a case study at a public university in Mal... Read More about An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university.

A security and authentication layer for SCADA/DCS applications (2021)
Journal Article
Homay, A., Chrysoulas, C., El Boudani, B., de Sousa, M., & Wollschlaeger, M. (2021). A security and authentication layer for SCADA/DCS applications. Microprocessors and Microsystems, 87, Article 103479. https://doi.org/10.1016/j.micpro.2020.103479

Mid 2010, a sophisticated malicious computer worm called Stuxnet targeted major ICS systems around the world causing severe damages to Siemens automation products. Stuxnet proved its ability to infect air-gapped-segregated critical computers control... Read More about A security and authentication layer for SCADA/DCS applications.

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure (2021)
Presentation / Conference
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October). Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online

Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from tw... Read More about Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.

Towards An SDN Assisted IDS (2021)
Conference Proceeding
Sutton, R., Ludwiniak, R., Pitropakis, N., Chrysoulas, C., & Dagiuklas, T. (2021). Towards An SDN Assisted IDS. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). https://doi.org/10.1109/NTMS49979.2021.9432651

Modern Intrusion Detection Systems are able to identify and check all traffic crossing the network segments that they are only set to monitor. Traditional network infrastructures use static detection mechanisms that check and monitor specific types o... Read More about Towards An SDN Assisted IDS.