Skip to main content

Research Repository

Advanced Search

Outputs (77)

PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme (2024)
Conference Proceeding
Yaqub, Z., Yigit, Y., Maglaras, L., Tan, Z., & Wooderson, P. (in press). PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.

In the rapidly evolving landscape of Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flow. However, VANETs face significant security and privacy challenges due to... Read More about PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.

Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing (2024)
Journal Article
Bensaid, R., Labraoui, N., Abba Ari, A. A., Maglaras, L., Saidi, H., Abdu Lwahhab, A. M., & Benfriha, S. (2024). Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing. Security and Communication Networks, 2024, Article 6651584. https://doi.org/10.1155/2024/6651584

The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in a short period of time. Therefore, a combination of computing models such a... Read More about Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing.

Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing (2024)
Journal Article
Lambropoulos, G., Mitropoulos, S., Douligeris, C., & Maglaras, L. (2024). Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing. Computers, 13(2), Article 54. https://doi.org/10.3390/computers13020054

The widespread adoption of cloud computing has resulted in centralized datacenter structures; however, there is a requirement for smaller-scale distributed infrastructures to meet the demands for speed, responsiveness, and security for critical appli... Read More about Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing.

Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns (2024)
Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (in press). Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. International Journal of Information Security, https://doi.org/10.1007/s10207-023-00809-5

Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches increasing. Firms and their staff are experiencing mass phishing attacks, several typical precursors to... Read More about Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns.

Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper (2024)
Conference Proceeding
Sarker, I. H., Janicke, H., Maglaras, L., & Camtepe, S. (2024). Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper. In Advanced Research in Technologies, Information, Innovation and Sustainability (ARTIIS 2023), Proceedings, Part II (302-316). https://doi.org/10.1007/978-3-031-48855-9_23

As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today’s digital era. Traditional security measures tend to be insufficient to defend against these persistent and dynamic thre... Read More about Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper.

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks (2023)
Conference Proceeding
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. In 2023 IEEE Globecom Workshops (GC Wkshps). https://doi.org/10.1109/GCWkshps58843.2023.10465218

As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, t... Read More about Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

Reliability Analysis of Fault Tolerant Memory Systems (2023)
Conference Proceeding
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023). Reliability Analysis of Fault Tolerant Memory Systems. In 2023 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). https://doi.org/10.1109/SEEDA-CECNSM61561.2023.10470763

This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction... Read More about Reliability Analysis of Fault Tolerant Memory Systems.

Cyber Malware: Offensive and Defensive Systems (2023)
Book
Almomani, I., Maglaras, L. A., Ferrag, M. A., & Ayres, N. (Eds.). (2023). Cyber Malware: Offensive and Defensive Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-34969-0

This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta... Read More about Cyber Malware: Offensive and Defensive Systems.

Machine Learning for Smart Healthcare Management Using IoT (2023)
Book Chapter
Yigit, Y., Duran, K., Moradpoor, N., Maglaras, L., Van Huynh, N., & Canberk, B. (in press). Machine Learning for Smart Healthcare Management Using IoT. In IoT and ML for Information Management: A Smart Healthcare Perspective. Springer

The convergence of Machine Learning (ML) and the Internet of Things (IoT) has brought about a paradigm shift in healthcare, ushering in a new era of intelligent healthcare management. This powerful amalgamation is driving transformative changes acros... Read More about Machine Learning for Smart Healthcare Management Using IoT.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Conference Proceeding
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (in press). Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis (2023)
Conference Proceeding
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (in press). Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. In 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)

Hybrid Threats, Cyberterrorism and Cyberwarfare (2023)
Book
Ferrag, M. A., Kantzavelou, I., Maglaras, L., & Janicke, H. (Eds.). (2024). Hybrid Threats, Cyberterrorism and Cyberwarfare. Boca Raton: CRC Press. https://doi.org/10.1201/9781003314721

Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism,... Read More about Hybrid Threats, Cyberterrorism and Cyberwarfare.

The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System (2023)
Conference Proceeding
Moradpoor, N., Maglaras, L., Abah, E., & Robles-Durazno, A. (2023). The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System. In 2023 19th IEEE International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) (453-460). https://doi.org/10.1109/DCOSS-IoT58021.2023.00077

The protection of Critical National Infrastructure is extremely important due to nations being dependent on their operation and steadiness. Any disturbance to this infrastructure could have a devastating consequence on physical security, economic wel... Read More about The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System.

A Blockchain-based two Factor Honeytoken Authentication System (2023)
Presentation / Conference
Papaspirou, V., Maglaras, L., Kantzavelou, I., Moradpoor, N., & Katsikas, S. (2023, September). A Blockchain-based two Factor Honeytoken Authentication System. Poster presented at 28th European Symposium on Research in Computer Security (ESORICS), The Hague

This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the authentication method, preventing various attacks, including tampering att... Read More about A Blockchain-based two Factor Honeytoken Authentication System.

A novel autonomous container-based platform for cybersecurity training and research (2023)
Journal Article
Chouliaras, N., Kantzavelou, I., Maglaras, L., Pantziou, G., & Amine Ferrag, M. (2023). A novel autonomous container-based platform for cybersecurity training and research. PeerJ Computer Science, 9, Article e1574. https://doi.org/10.7717/peerj-cs.1574

Cyberattacks, particularly those targeting systems that store or handle sensitive data, have become more sophisticated in recent years. To face increasing threats, continuous capacity building and digital skill competence are needed. Cybersecurity ha... Read More about A novel autonomous container-based platform for cybersecurity training and research.

A Novel Authentication Method That Combines Honeytokens and Google Authenticator (2023)
Journal Article
Papaspirou, V., Papathanasaki, M., Maglaras, L., Kantzavelou, I., Douligeris, C., Ferrag, M. A., & Janicke, H. (2023). A Novel Authentication Method That Combines Honeytokens and Google Authenticator. Information, 14(7), Article 386. https://doi.org/10.3390/info14070386

Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attac... Read More about A Novel Authentication Method That Combines Honeytokens and Google Authenticator.

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise (2023)
Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2023). Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Information and Computer Security, 31(4), 404-426. https://doi.org/10.1108/ICS-05-2022-0085

Purpose This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security posture as it adapts to remote working because of the Coronavir... Read More about Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise.

Digitization of healthcare sector: A study on privacy and security concerns (2023)
Journal Article
Paul, M., Maglaras, L., Ferrag, M. A., & Almomani, I. (2023). Digitization of healthcare sector: A study on privacy and security concerns. ICT Express, 9(4), 571-588. https://doi.org/10.1016/j.icte.2023.02.007

The digital revolution has taken business sectors to a new height through the advancement of technology. The healthcare sector also embraced digital technology to facilitate technological change from mechanical and analogue electronic devices to the... Read More about Digitization of healthcare sector: A study on privacy and security concerns.

IoT: Communication protocols and security threats (2023)
Journal Article
Gerodimos, A., Maglaras, L., Ferrag, M. A., Ayres, N., & Kantzavelou, I. (2023). IoT: Communication protocols and security threats. Internet of Things and Cyber-Physical Systems, 3, 1-13. https://doi.org/10.1016/j.iotcps.2022.12.003

In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, pre... Read More about IoT: Communication protocols and security threats.

A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing (2023)
Journal Article
Babaghayou, M., Chaib, N., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2023). A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing. Sensors, 23(1), Article 531. https://doi.org/10.3390/s23010531

By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), the Internet of Vehicles (IoV) paradigm has attracted the attention of different research and development bodies. However, IoV deployment is still at stake as many security and privac... Read More about A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing.

An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks (2022)
Journal Article
Almomani, I., Ahmed, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (2022). An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks. IEEE Access, 10, 131640-131655. https://doi.org/10.1109/access.2022.3229623

Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets, especially for self-driving cars, as it is essential to send/receive messa... Read More about An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks.

Internet of drones security: taxonomies, open issues, and future directions (2022)
Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023). Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.vehcom.2022.100552

Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions... Read More about Internet of drones security: taxonomies, open issues, and future directions.

DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data (2022)
Journal Article
Saidi, H., Labraoui, N., Ari, A. A. A., Maglaras, L. A., & Emati, J. H. M. (2022). DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data. IEEE Access, 10, 101011-101028. https://doi.org/10.1109/access.2022.3207803

In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite increased attention to the security of electronic health records, patient privacy is still at... Read More about DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data.

Transforming Points of Single Contact Data into Linked Data (2022)
Journal Article
Fragkou, P., & Maglaras, L. (2022). Transforming Points of Single Contact Data into Linked Data. Computers, 11(8), Article 122. https://doi.org/10.3390/computers11080122

Open data portals contain valuable information for citizens and business. However, searching for information can prove to be tiresome even in portals tackling domains similar information. A typical case is the information residing in the European Com... Read More about Transforming Points of Single Contact Data into Linked Data.

Cyber Threats in the Healthcare Sector and Countermeasures (2022)
Book Chapter
Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2022). Cyber Threats in the Healthcare Sector and Countermeasures. In M. Khosrow-Pour (Ed.), Research Anthology on Securing Medical Systems and Records. IGI Global. https://doi.org/10.4018/978-1-6684-6311-6.ch001

Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get una... Read More about Cyber Threats in the Healthcare Sector and Countermeasures.

Artificial Intelligence: Practical and Ethical Challenges (2022)
Book Chapter
Rice, S., & Maglaras, L. (2022). Artificial Intelligence: Practical and Ethical Challenges. In M. Ahmed, S. Rabiul Islam, A. Anwar, N. Moustafa, & A. Khan Pathan (Eds.), Explainable Artificial Intelligence for Cyber Security (59-71). Springer. https://doi.org/10.1007/978-3-030-96630-0_3

Artificial Intelligence (AI) & Machine Learning (ML) is used everywhere in daily life from speech recognition on our phones, targeted marketing strategies & face recognition without the majority of society even realising it. The power of technology a... Read More about Artificial Intelligence: Practical and Ethical Challenges.

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning (2022)
Journal Article
Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access, 10, 40281-40306. https://doi.org/10.1109/access.2022.3165809

In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and... Read More about Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.

SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles (2022)
Conference Proceeding
Babaghayou, M., Labraoui, N., Ari, A. A. A., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2022). SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles. In CROWNCOM 2021, WiCON 2021: Cognitive Radio Oriented Wireless Networks and Wireless Internet (343-360). https://doi.org/10.1007/978-3-030-98002-3_25

The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhancing applications provided by the Internet of Vehicles (IoV) paradigm are on... Read More about SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles.

FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things (2022)
Journal Article
Friha, O., Ferrag, M. A., Shu, L., Maglaras, L., Choo, K. R., & Nafaa, M. (2022). FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. Journal of Parallel and Distributed Computing, 165, 17-31. https://doi.org/10.1016/j.jpdc.2022.03.003

In this paper, we propose a federated learning-based intrusion detection system, named FELIDS, for securing agricultural-IoT infrastructures. Specifically, the FELIDS system protects data privacy through local learning, where devices benefit from the... Read More about FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.

Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure (2022)
Journal Article
He, Y., Maglaras, L., Aliyu, A., & Luo, C. (2022). Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure. Security and Communication Networks, 2022, Article 2775249. https://doi.org/10.1155/2022/2775249

The healthcare information system (HIS) has become a victim of cyberattacks. Traditional ways to handle cyber incidents in healthcare organizations follow a predefined incident response (IR) procedure. However, this procedure is usually reactive, mis... Read More about Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure.

A multiplayer game model to detect insiders in wireless sensor networks (2022)
Journal Article
Kantzavelou, I., Maglaras, L., Tzikopoulos, P. F., & Katsikas, S. (2022). A multiplayer game model to detect insiders in wireless sensor networks. PeerJ Computer Science, 8, Article e791. https://doi.org/10.7717/peerj-cs.791

Insiders might have incentives and objectives opposed to those of the belonging organization. It is hard to detect them because of their privileges that partially protect them. In Wireless Sensor Networks (WSNs), significant security issues arise, in... Read More about A multiplayer game model to detect insiders in wireless sensor networks.

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis (2021)
Journal Article
Ferrag, M. A., Friha, O., Maglaras, L., Janicke, H., & Shu, L. (2021). Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access, 9, 138509-138542. https://doi.org/10.1109/access.2021.3118642

In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications. Specifically, we first provide a review of the federated learning-b... Read More about Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.

A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks (2021)
Journal Article
Lambat, Y., Ayres, N., Maglaras, L., & Ferrag, M. A. (2021). A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks. Applied Sciences, 11(19), Article 9083. https://doi.org/10.3390/app11199083

It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated... Read More about A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks.

Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia (2021)
Journal Article
Almomani, I., Ahmed, M., & Maglaras, L. (2021). Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Computer Science, 7, Article e703. https://doi.org/10.7717/peerj-cs.703

The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regulatory Framework (CRF) and the NCA’s Essential Cybersecurity Controls (ECC) to ensure data and infrastructure security in all IT-based systems. However... Read More about Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia.

A novel Two-Factor HoneyToken Authentication Mechanism (2021)
Conference Proceeding
Papaspirou, V., Maglaras, L., Ferrag, M. A., Kantzavelou, I., Janicke, H., & Douligeris, C. (2021). A novel Two-Factor HoneyToken Authentication Mechanism. In 2021 International Conference on Computer Communications and Networks (ICCCN). https://doi.org/10.1109/icccn52240.2021.9522319

The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the same password for different... Read More about A novel Two-Factor HoneyToken Authentication Mechanism.

Intrusion Detection in Critical Infrastructures: A Literature Review (2021)
Journal Article
Panagiotis, F., Taxiarxchis, K., Georgios, K., Maglaras, L., & Ferrag, M. A. (2021). Intrusion Detection in Critical Infrastructures: A Literature Review. Smart Cities, 4(3), 1146-1157. https://doi.org/10.3390/smartcities4030061

Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we c... Read More about Intrusion Detection in Critical Infrastructures: A Literature Review.

RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks (2021)
Journal Article
Kosmanos, D., Karagiannis, D., Argyriou, A., Lalis, S., & Maglaras, L. (2021). RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks. Security and Communication Networks, 2021, Article 9959310. https://doi.org/10.1155/2021/9959310

Wireless communications are vulnerable against radio frequency (RF) interference which might be caused either intentionally or unintentionally. A particular subset of wireless networks, Vehicular Ad-hoc NETworks (VANET), which incorporate a series of... Read More about RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks.

WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles (2021)
Journal Article
Babaghayou, M., Labraoui, N., Abba Ari, A. A., Ferrag, M. A., Maglaras, L., & Janicke, H. (2021). WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors, 21(7), Article 2443. https://doi.org/10.3390/s21072443

Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts main... Read More about WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.

Cyber Ranges and TestBeds for Education, Training, and Research (2021)
Journal Article
Chouliaras, N., Kittes, G., Kantzavelou, I., Maglaras, L., Pantziou, G., & Ferrag, M. A. (2021). Cyber Ranges and TestBeds for Education, Training, and Research. Applied Sciences, 11(4), Article 1809. https://doi.org/10.3390/app11041809

In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting... Read More about Cyber Ranges and TestBeds for Education, Training, and Research.

A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems (2021)
Journal Article
Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Cook, A., Janicke, H., & Jones, K. (2021). A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems. International Journal of Smart Security Technologies, 8(1), 16-34. https://doi.org/10.4018/ijsst.2021010102

Incident response teams cannot prepare for every situation or predict every crisis, especially when they involve cyber-physical systems. As a result, training activities need to be provided to support operating in challenging situations to develop co... Read More about A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems.

The Cost Perspective of Password Security (2020)
Book Chapter
Maglaras, L., Janicke, H., & Ferrag, M. A. (2020). The Cost Perspective of Password Security. In B. B. Gupta, & D. Gupta (Eds.), Handbook of Research on Multimedia Cyber Security (319-330). IGI Global. https://doi.org/10.4018/978-1-7998-2701-6.ch017

This study technically analyses the maximum number of combinations for common passwords up to 12 characters long. A maximum storage size necessary for the creation of a data base that holds all possible passwords up to 12 characters is also presented... Read More about The Cost Perspective of Password Security.

Cyber Threats in the Healthcare Sector and Countermeasures (2020)
Book Chapter
Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2020). Cyber Threats in the Healthcare Sector and Countermeasures. In A. Masouras, G. Maris, & A. Kavoura (Eds.), Entrepreneurial Development and Innovation in Family Businesses and SMEs (109-124). IGI Global. https://doi.org/10.4018/978-1-7998-3648-3.ch007

Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get una... Read More about Cyber Threats in the Healthcare Sector and Countermeasures.

Developing Cyber Buffer Zones (2020)
Book Chapter
Robinson, M., Jones, K., Janicke, H., & Maglaras, L. (2020). Developing Cyber Buffer Zones. In M. Khosrow-Pour (Ed.), Encyclopedia of Criminal Activities and the Deep Web (287-303). IGI Global. https://doi.org/10.4018/978-1-5225-9715-5.ch019

Cyber peacekeeping is a new and novel field of research that focuses on the ways that nations and society can restore peace and security in the aftermath of cyber warfare. In this article, the authors make an original contribution to the field by dev... Read More about Developing Cyber Buffer Zones.

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks (2020)
Journal Article
Derhab, A., Bouras, A., Belaoued, M., Maglaras, L., & Khan, F. A. (2020). Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors, 20(21), Article 6106. https://doi.org/10.3390/s20216106

In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored nod... Read More about Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.

The Security Aspects of Automotive Over-the-Air Updates (2020)
Journal Article
Howden, J., Maglaras, L., & Ferrag, M. A. (2020). The Security Aspects of Automotive Over-the-Air Updates. International Journal of Cyber Warfare and Terrorism, 10(2), 64-81. https://doi.org/10.4018/ijcwt.2020040104

Over-the-air (OTA) update is a method for vehicle manufacturers to remotely distribute maintenance updates, performance, and feature enhancements through the vehicle's lifespan. Recalls of vehicles cost the manufactures a lot of money. OTA solves the... Read More about The Security Aspects of Automotive Over-the-Air Updates.

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks (2020)
Journal Article
Ferrag, M. A., Maglaras, L., Ahmim, A., Derdour, M., & Janicke, H. (2020). RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet, 12(3), Article 44. https://doi.org/10.3390/fi12030044

This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip a... Read More about RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.

Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems (2020)
Journal Article
Vourgidis, I., Maglaras, L., Alfakeeh, A. S., Al-Bayatti, A. H., & Ferrag, M. A. (2020). Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems. Sensors, 20(4), Article 997. https://doi.org/10.3390/s20040997

The field of cooperative intelligent transport systems and more specifically pedestrians to vehicles could be characterized as quite challenging, since there is a broad research area to be studied, with direct positive results to society. Pedestrians... Read More about Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems.

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed (2019)
Journal Article
Maglaras, L., Cruz, T., Ferrag, M. A., & Janicke, H. (2020). Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technology Letters, 3(1), Article e132. https://doi.org/10.1002/itl2.132

Security of Critical National Infrastructures (CNI) is one of the major concerns to countries both in a European and in a worldwide level. Training on scenarios that involve such systems is important to the effective handling of incidents. Experienti... Read More about Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.

Estimating the Relative Speed of RF Jammers in VANETs (2019)
Journal Article
Kosmanos, D., Argyriou, A., & Maglaras, L. (2019). Estimating the Relative Speed of RF Jammers in VANETs. Security and Communication Networks, 2019, Article 2064348. https://doi.org/10.1155/2019/2064348

Vehicular Ad Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their perform... Read More about Estimating the Relative Speed of RF Jammers in VANETs.

Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems (2019)
Book Chapter
Maglaras, L., Janicke, H., Jiang, J., & Crampton, A. (2019). Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems. In Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications (299-318). IGI Global. https://doi.org/10.4018/978-1-5225-9866-4.ch017

SCADA (Supervisory Control and Data Acquisition) systems are a critical part of modern national critical infrastructure (CI) systems. Due to the rapid increase of sophisticated cyber threats with exponentially destructive effects, intrusion detection... Read More about Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems.

DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services (2019)
Journal Article
Ferrag, M. A., & Maglaras, L. (2019). DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services. Computers, 8(3), Article 58. https://doi.org/10.3390/computers8030058

In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system initialization phase, creat... Read More about DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services.

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security (2019)
Journal Article
Derhab, A., Guerroumi, M., Gumaei, A., Maglaras, L., Ferrag, M. A., Mukherjee, M., & Khan, F. A. (2019). Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors, 19(14), Article 3119. https://doi.org/10.3390/s19143119

The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies and approaches should be... Read More about Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.

DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids (2019)
Journal Article
Ferrag, M. A., & Maglaras, L. (2020). DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids. IEEE Transactions on Engineering Management, 67(4), 1285-1297. https://doi.org/10.1109/tem.2019.2922936

In this paper, we propose a novel deep learning and blockchain-based energy framework for smart grids, entitled DeepCoin. The DeepCoin framework uses two schemes, a blockchain-based scheme and a deep learning-based scheme. The blockchain-based scheme... Read More about DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids.

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends (2019)
Journal Article
Ferrag, M. A., Maglaras, L., & Derhab, A. (2019). Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. Security and Communication Networks, 2019, Article 5452870. https://doi.org/10.1155/2019/5452870

Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summarise the factors that hinder biometrics models’ development and deployment on a large scale, including human physiol... Read More about Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.

Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector (2019)
Journal Article
Evans, M., He, Y., Maglaras, L., Yevseyeva, I., & Janicke, H. (2019). Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. International Journal of Medical Informatics, 127, 109-119. https://doi.org/10.1016/j.ijmedinf.2019.04.019

Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two thirds of these incidents pertain to human error, but despite this, there are... Read More about Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector.

Protecting Civilians from Cyber Warfare with Cyber Buffer Zones (2019)
Journal Article
Robinson, M., Maglaras, L., Jones, K., & Janicke, H. (2019). Protecting Civilians from Cyber Warfare with Cyber Buffer Zones. International Journal of Smart Security Technologies, 6(1), 31-48. https://doi.org/10.4018/ijsst.2019010103

Cyber peacekeeping has quickly risen in prominence as a viable way to regulate the impact cyber warfare has upon civilian security. In this article, the concept of a cyber buffer zone is explored, and proposals are made on how it could be used to fur... Read More about Protecting Civilians from Cyber Warfare with Cyber Buffer Zones.

CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems (2018)
Book Chapter
Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Janicke, H., & Jones, K. (2018). CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (622-637). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch033

Cyber Security of ICS/SCADA systems is a major aspect of current research focus. Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real SCADA systems with low costs. Significantly lacking from current research, is... Read More about CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems.

A Novel Method for Calculating Customer Reviews Ratings (2018)
Book Chapter
Vourgidis, I. S., Carter, J., Maglaras, L., Janicke, H., Folia, Z., & Fragkou, P. (2018). A Novel Method for Calculating Customer Reviews Ratings. In A. Elçi (Ed.), Handbook of Research on Contemporary Perspectives on Web-Based Systems (460-478). IGI Global. https://doi.org/10.4018/978-1-5225-5384-7.ch020

The number of consumers consulting online reviews in order to purchase a product or service, keeps growing. In addition to that, consumers can add an online review in order to express their experience upon the services or products received. This iter... Read More about A Novel Method for Calculating Customer Reviews Ratings.

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (2018)
Book Chapter
Cook, A., Smith, R., Maglaras, L., & Janicke, H. (2018). SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (1168-1183). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch057

The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for inv... Read More about SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.

Developing cyber peacekeeping: Observation, monitoring and reporting (2018)
Journal Article
Robinson, M., Jones, K., Janicke, H., & Maglaras, L. (2019). Developing cyber peacekeeping: Observation, monitoring and reporting. Government Information Quarterly, 36(2), 276-293. https://doi.org/10.1016/j.giq.2018.12.001

Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber warfare increasingly becoming part of future conflicts, new and novel solutions are needed to assist governments in securing their national infrastructur... Read More about Developing cyber peacekeeping: Observation, monitoring and reporting.

Blockchain Technologies for the Internet of Things: Research Issues and Challenges (2018)
Journal Article
Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2019). Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet of Things, 6(2), 2188-2204. https://doi.org/10.1109/jiot.2018.2882794

This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we pr... Read More about Blockchain Technologies for the Internet of Things: Research Issues and Challenges.

HEART-IS: A novel technique for evaluating human error-related information security incidents (2018)
Journal Article
Evans, M., He, Y., Maglaras, L., & Janicke, H. (2019). HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers and Security, 80, 74-89. https://doi.org/10.1016/j.cose.2018.09.002

Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to information security. Despite this level of understanding organisations conti... Read More about HEART-IS: A novel technique for evaluating human error-related information security incidents.

Vulnerability Analysis of Network Scanning on SCADA Systems (2018)
Journal Article
Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018). Vulnerability Analysis of Network Scanning on SCADA Systems. Security and Communication Networks, 2018, Article 3794603. https://doi.org/10.1155/2018/3794603

Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructure environments for decades. With the demand for remote facilities to be con... Read More about Vulnerability Analysis of Network Scanning on SCADA Systems.

Authentication Protocols for Internet of Things: A Comprehensive Survey (2017)
Journal Article
Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., & Shu, L. (2017). Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks, 2017, Article 6562953. https://doi.org/10.1155/2017/6562953

In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail.... Read More about Authentication Protocols for Internet of Things: A Comprehensive Survey.

The industrial control system cyber defence triage process (2017)
Journal Article
Cook, A., Janicke, H., Smith, R., & Maglaras, L. (2017). The industrial control system cyber defence triage process. Computers and Security, 70, 467-481. https://doi.org/10.1016/j.cose.2017.07.009

The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats in an effective and cost-sensitive manner that does not expose their operati... Read More about The industrial control system cyber defence triage process.

Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems (2017)
Journal Article
Yousaf, A., Loan, A., Babiceanu, R. F., Maglaras, L., & Yousaf, O. (2017). Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. Computers and Security, 70, 124-143. https://doi.org/10.1016/j.cose.2017.05.011

In this paper an analysis of physical layer intruders, for direct sequence spread spectrum systems, is presented. Physical layer intruders are traditional jammers that do not have any intelligence as compared to smart jammers that have signal process... Read More about Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems.

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (2017)
Journal Article
Cook, A., Smith, R. G., Maglaras, L., & Janicke, H. (2017). SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. International Journal of Cyber Warfare and Terrorism, 7(2), Article 1. https://doi.org/10.4018/ijcwt.2017040101

The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for inv... Read More about SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.

MIMO Techniques for Jamming Threat Suppression in Vehicular Networks (2016)
Journal Article
Kosmanos, D., Prodromou, N., Argyriou, A., Maglaras, L. A., & Janicke, H. (2016). MIMO Techniques for Jamming Threat Suppression in Vehicular Networks. Mobile Information Systems, 2016, Article 8141204. https://doi.org/10.1155/2016/8141204

Vehicular ad hoc networks have emerged as a promising field of research and development, since they will be able to accommodate a variety of applications, ranging from infotainment to traffic management and road safety. A specific security-related co... Read More about MIMO Techniques for Jamming Threat Suppression in Vehicular Networks.

Human behaviour as an aspect of cybersecurity assurance (2016)
Journal Article
Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667-4679. https://doi.org/10.1002/sec.1657

There continue to be numerous breaches publicised pertaining to cybersecurity despite security practices being applied within industry for many years. This paper is intended to be the first in a number of papers as research into cybersecurity assuran... Read More about Human behaviour as an aspect of cybersecurity assurance.

Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems (2016)
Journal Article
Maglaras, L. A., Jiang, J., & Cruz, T. J. (2016). Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. Journal of Information Security and Applications, 30, 15-26. https://doi.org/10.1016/j.jisa.2016.04.002

Modern Supervisory Control and Data Acquisition (SCADA) systems used by the electric utility industry to monitor and control electric power generation, transmission and distribution are recognized today as critical components of the electric power de... Read More about Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems.