Skip to main content

Research Repository

Advanced Search

Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution (2023)
Conference Proceeding
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (2023). Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution. In P. Kommers, I. Arnedillo Sánchez, & P. Isaías (Eds.), PROCEEDINGS OF THE 16 th IADIS INTERNATIONAL CONFERENCE INFORMATION SYSTEMS 2023 (21-28)

This article is a report on the lessons learned when conducting an interpretive case study in a developing country. From the literature review, it was apparent that there are few reported lessons from pilot studies about strategic alignment in higher... Read More about Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution.

Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas (2023)
Conference Proceeding
Josephe, A. O., Chrysoulas, C., Peng, T., El Boudani, B., Iatropoulos, I., & Pitropakis, N. (2023). Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas. In 2023 IEEE IAS Global Conference on Emerging Technologies (GlobConET). https://doi.org/10.1109/GlobConET56651.2023.10150058

Web applications are popular in our world today and every organization or individual either build or access at least one each day. It’s important for every application user to continue accessing contents of a web application irrespective of the netwo... Read More about Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas.

Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System (2023)
Conference Proceeding
Laing, S., Ludwiniak, R., El Boudani, . B., Chrysoulas, C., Ubakanma, G., & Pitropakis, N. (2023). Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System. In 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN). https://doi.org/10.1109/DRCN57075.2023.10108330

The usage of cloud systems is at an all-time high, and with more organizations reaching for Big Data the forensic implications must be analyzed. The Hadoop Distributed File System is widely used both as a cloud service and with organizations implemen... Read More about Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System.

Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques (2023)
Conference Proceeding
Gomez Luis, R., Babaagba, K. O., Chrysoulas, C., Homay, A., Rangarajan, R., & Liu, X. (in press). Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques.

In recent years, text has been the main form of communication on social media platforms such as Twitter, Reddit, Facebook, Instagram and YouTube. Emotion Recognition from these platforms can be exploited for all sorts of applications. Through the mea... Read More about Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques.

Attacking Windows Hello for Business: Is It What We Were Promised? (2023)
Journal Article
Haddad, J., Pitropakis, N., Chrysoulas, C., Lemoudden, M., & Buchanan, W. J. (2023). Attacking Windows Hello for Business: Is It What We Were Promised?. Cryptography, 7(1), Article 9. https://doi.org/10.3390/cryptography7010009

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to... Read More about Attacking Windows Hello for Business: Is It What We Were Promised?.

Explainable AI-Based DDOS Attack Identification Method for IoT Networks (2023)
Journal Article
Kalutharage, C. S., Liu, X., Chrysoulas, C., Pitropakis, N., & Papadopoulos, P. (2023). Explainable AI-Based DDOS Attack Identification Method for IoT Networks. Computers, 12(2), Article 32. https://doi.org/10.3390/computers12020032

The modern digitized world is mainly dependent on online services. The availability of online systems continues to be seriously challenged by distributed denial of service (DDoS) attacks. The challenge in mitigating attacks is not limited to identify... Read More about Explainable AI-Based DDOS Attack Identification Method for IoT Networks.

Using Social Media & Sentiment Analysis to Make Investment Decisions (2022)
Journal Article
Hasselgren, B., Chrysoulas, C., Pitropakis, N., & Buchanan, W. J. (2023). Using Social Media & Sentiment Analysis to Make Investment Decisions. Future Internet, 15(1), Article 5. https://doi.org/10.3390/fi15010005

Making investment decisions by utilizing sentiment data from social media (SM) is starting to become a more tangible concept. There has been a broad investigation into this field of study over the last decade, and many of the findings have promising... Read More about Using Social Media & Sentiment Analysis to Make Investment Decisions.

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) (2022)
Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022). Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8

Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detecting attacks. However, the lack of transparency in their decision-making pro... Read More about Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract).

Investigating Machine Learning Attacks on Financial Time Series Models (2022)
Journal Article
Gallagher, M., Pitropakis, N., Chrysoulas, C., Papadopoulos, P., Mylonas, A., & Katsikas, S. (2022). Investigating Machine Learning Attacks on Financial Time Series Models. Computers and Security, 123, https://doi.org/10.1016/j.cose.2022.102933

Machine learning and Artificial Intelligence (AI) already support human decision-making and complement professional roles, and are expected in the future to be sufficiently trusted to make autonomous decisions. To trust AI systems with such tasks, a... Read More about Investigating Machine Learning Attacks on Financial Time Series Models.

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture (2022)
Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022). GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291

E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the esta... Read More about GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2022)
Conference Proceeding
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., …Tsolis, D. (2022). GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. In Computer Security. ESORICS 2021 International Workshops. https://doi.org/10.1007/978-3-030-95484-0_3

The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks.... Read More about GLASS: Towards Secure and Decentralized eGovernance Services using IPFS.

An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university (2022)
Conference Proceeding
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (in press). An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university. In WorldCist'23: 11th World Conference on Information Systems and Technologies

This study draws attention to less studied areas of middle management role in business strategy formulation, information strategy formulation, and their alignment in developing countries. It was conducted as a case study at a public university in Mal... Read More about An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university.

A security and authentication layer for SCADA/DCS applications (2021)
Journal Article
Homay, A., Chrysoulas, C., El Boudani, B., de Sousa, M., & Wollschlaeger, M. (2021). A security and authentication layer for SCADA/DCS applications. Microprocessors and Microsystems, 87, Article 103479. https://doi.org/10.1016/j.micpro.2020.103479

Mid 2010, a sophisticated malicious computer worm called Stuxnet targeted major ICS systems around the world causing severe damages to Siemens automation products. Stuxnet proved its ability to infect air-gapped-segregated critical computers control... Read More about A security and authentication layer for SCADA/DCS applications.

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure (2021)
Presentation / Conference
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October). Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online

Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from tw... Read More about Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.

Towards An SDN Assisted IDS (2021)
Conference Proceeding
Sutton, R., Ludwiniak, R., Pitropakis, N., Chrysoulas, C., & Dagiuklas, T. (2021). Towards An SDN Assisted IDS. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). https://doi.org/10.1109/NTMS49979.2021.9432651

Modern Intrusion Detection Systems are able to identify and check all traffic crossing the network segments that they are only set to monitor. Traditional network infrastructures use static detection mechanisms that check and monitor specific types o... Read More about Towards An SDN Assisted IDS.

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT (2021)
Journal Article
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021). Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. https://doi.org/10.3390/jcp1020014

As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defe... Read More about Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.

Programming Languages: A Usage-based Statistical Analysis and Visualization (2021)
Conference Proceeding
Orlowska, A., Chrysoulas, C., Jaroucheh, Z., & Liu, X. (2021). Programming Languages: A Usage-based Statistical Analysis and Visualization. In ICISS 2021: 2021 The 4th International Conference on Information Science and Systems (143-148). https://doi.org/10.1145/3459955.3460614

Understanding the popularity, and its trend, of programming languages can be important to anticipate which languages are best studied for future use, which are widely supported for use in enterprise projects, and investigate which skills are easiest... Read More about Programming Languages: A Usage-based Statistical Analysis and Visualization.

A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda (2020)
Journal Article
Muller, L., Chrysoulas, C., Pitropakis, N., & Barclay, P. J. (2020). A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda. Big Data and Cognitive Computing, 4(4), Article 38. https://doi.org/10.3390/bdcc4040038

The shift towards microservisation which can be observed in recent developments of the cloud landscape for applications has led towards the emergence of the Function as a Service (FaaS) concept, also called Serverless. This term describes the event-d... Read More about A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda.

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing (2020)
Journal Article
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., …Papadopoulos, P. (2020). Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communications and Networks, https://doi.org/10.3389/frcmn.2020.583376

The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways... Read More about Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.

Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture) (2020)
Journal Article
El Boudani, B., Kanaris, L., Kokkinis, A., Kyriacou, M., Chrysoulas, C., Stavrou, S., & Dagiuklas, T. (2020). Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture). Sensors, 20(19), Article 5495. https://doi.org/10.3390/s20195495

In the near future, the fifth-generation wireless technology is expected to be rolled out, offering low latency, high bandwidth and multiple antennas deployed in a single access point. This ecosystem will help further enhance various location-based s... Read More about Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture).