Skip to main content

Research Repository

Advanced Search

Outputs (5)

Reliability Analysis of Fault Tolerant Memory Systems (2023)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023, November). Reliability Analysis of Fault Tolerant Memory Systems. Presented at The 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2023), Piraeus, Greece

This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction... Read More about Reliability Analysis of Fault Tolerant Memory Systems.

The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System (2023)
Presentation / Conference Contribution
Moradpoor, N., Maglaras, L., Abah, E., & Robles-Durazno, A. (2023, June). The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System. Presented at 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Pafos, Cyprus

The protection of Critical National Infrastructure is extremely important due to nations being dependent on their operation and steadiness. Any disturbance to this infrastructure could have a devastating consequence on physical security, economic wel... Read More about The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System.

A Blockchain-based two Factor Honeytoken Authentication System (2023)
Presentation / Conference Contribution
Papaspirou, V., Maglaras, L., Kantzavelou, I., Moradpoor, N., & Katsikas, S. (2023, September). A Blockchain-based two Factor Honeytoken Authentication System. Poster presented at 28th European Symposium on Research in Computer Security (ESORICS), The Hague

This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the authentication method, preventing various attacks, including tampering att... Read More about A Blockchain-based two Factor Honeytoken Authentication System.

Fake PLC in the cloud, we thought the attackers believed that: How ICS honeypot deception gets impacted by cloud deployments? (2023)
Presentation / Conference Contribution
Ivanova, S., & Moradpoor, N. (2023, April). Fake PLC in the cloud, we thought the attackers believed that: How ICS honeypot deception gets impacted by cloud deployments?. Presented at WFCS 2023: 19th IEEE International Conference on Factory Communication Systems, Pavia, Italy

The Industrial Control System (ICS) industry faces an ever-growing number of cyber threats - defence against which can be strengthened using honeypots. As the systems they mimic, ICS honeypots shall be deployed in a similar context to field ICS syste... Read More about Fake PLC in the cloud, we thought the attackers believed that: How ICS honeypot deception gets impacted by cloud deployments?.

Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain (2023)
Presentation / Conference Contribution
Moradpoor, N., Barati, M., Robles-Durazno, A., Abah, E., & McWhinnie, J. (2022, June). Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain. Presented at Cyber Science 2022: International Conference on Cybersecurity, Situational Awareness and Social Media, Cardiff Metropolitan University, Wales

The protection of critical national infrastructures such as drinking water, gas, and electricity is extremely important as nations are dependent on their operation and steadiness. However, despite the value of such utilities their security issues hav... Read More about Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain.