Skip to main content

Research Repository

Advanced Search

Outputs (37)

Internet of drones security: taxonomies, open issues, and future directions (2022)
Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023). Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.

Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions... Read More about Internet of drones security: taxonomies, open issues, and future directions.

DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data (2022)
Journal Article
Saidi, H., Labraoui, N., Ari, A. A. A., Maglaras, L. A., & Emati, J. H. M. (2022). DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data. IEEE Access, 10, 101011-101028. https://doi.org/10.1109/acces

In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite increased attention to the security of electronic health records, patient privacy is still at... Read More about DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data.

Transforming Points of Single Contact Data into Linked Data (2022)
Journal Article
Fragkou, P., & Maglaras, L. (2022). Transforming Points of Single Contact Data into Linked Data. Computers, 11(8), Article 122. https://doi.org/10.3390/computers11080122

Open data portals contain valuable information for citizens and business. However, searching for information can prove to be tiresome even in portals tackling domains similar information. A typical case is the information residing in the European Com... Read More about Transforming Points of Single Contact Data into Linked Data.

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning (2022)
Journal Article
Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access, 10, 40281-40306. https://doi.or

In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and... Read More about Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.

FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things (2022)
Journal Article
Friha, O., Ferrag, M. A., Shu, L., Maglaras, L., Choo, K. R., & Nafaa, M. (2022). FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. Journal of Parallel and Distributed Computing, 165, 17-31. https://doi.org/1

In this paper, we propose a federated learning-based intrusion detection system, named FELIDS, for securing agricultural-IoT infrastructures. Specifically, the FELIDS system protects data privacy through local learning, where devices benefit from the... Read More about FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.

Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure (2022)
Journal Article
He, Y., Maglaras, L., Aliyu, A., & Luo, C. (2022). Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure. Security and Communication Networks, 2022, Article 2775249. https://doi.org/10.1155/2022/2775249

The healthcare information system (HIS) has become a victim of cyberattacks. Traditional ways to handle cyber incidents in healthcare organizations follow a predefined incident response (IR) procedure. However, this procedure is usually reactive, mis... Read More about Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure.

A multiplayer game model to detect insiders in wireless sensor networks (2022)
Journal Article
Kantzavelou, I., Maglaras, L., Tzikopoulos, P. F., & Katsikas, S. (2022). A multiplayer game model to detect insiders in wireless sensor networks. PeerJ Computer Science, 8, Article e791. https://doi.org/10.7717/peerj-cs.791

Insiders might have incentives and objectives opposed to those of the belonging organization. It is hard to detect them because of their privileges that partially protect them. In Wireless Sensor Networks (WSNs), significant security issues arise, in... Read More about A multiplayer game model to detect insiders in wireless sensor networks.

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis (2021)
Journal Article
Ferrag, M. A., Friha, O., Maglaras, L., Janicke, H., & Shu, L. (2021). Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access, 9, 138509-138542. https://doi.org/10.1109/access.2

In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications. Specifically, we first provide a review of the federated learning-b... Read More about Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.

A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks (2021)
Journal Article
Lambat, Y., Ayres, N., Maglaras, L., & Ferrag, M. A. (2021). A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks. Applied Sciences, 11(19), Article 9083. https://doi.org/10.3390/app11199083

It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated... Read More about A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks.

Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia (2021)
Journal Article
Almomani, I., Ahmed, M., & Maglaras, L. (2021). Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Computer Science, 7, Article e703. https://doi.org/10.7717/peerj-cs.703

The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regulatory Framework (CRF) and the NCA’s Essential Cybersecurity Controls (ECC) to ensure data and infrastructure security in all IT-based systems. However... Read More about Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia.

Intrusion Detection in Critical Infrastructures: A Literature Review (2021)
Journal Article
Panagiotis, F., Taxiarxchis, K., Georgios, K., Maglaras, L., & Ferrag, M. A. (2021). Intrusion Detection in Critical Infrastructures: A Literature Review. Smart Cities, 4(3), 1146-1157. https://doi.org/10.3390/smartcities4030061

Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we c... Read More about Intrusion Detection in Critical Infrastructures: A Literature Review.

RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks (2021)
Journal Article
Kosmanos, D., Karagiannis, D., Argyriou, A., Lalis, S., & Maglaras, L. (2021). RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks. Security and Communication Networks, 2021, Article 9959310. https://doi.org/10.1155/20

Wireless communications are vulnerable against radio frequency (RF) interference which might be caused either intentionally or unintentionally. A particular subset of wireless networks, Vehicular Ad-hoc NETworks (VANET), which incorporate a series of... Read More about RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks.

WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles (2021)
Journal Article
Babaghayou, M., Labraoui, N., Abba Ari, A. A., Ferrag, M. A., Maglaras, L., & Janicke, H. (2021). WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors, 21(7), Article 2443. https://doi.org/10.33

Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts main... Read More about WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.

Cyber Ranges and TestBeds for Education, Training, and Research (2021)
Journal Article
Chouliaras, N., Kittes, G., Kantzavelou, I., Maglaras, L., Pantziou, G., & Ferrag, M. A. (2021). Cyber Ranges and TestBeds for Education, Training, and Research. Applied Sciences, 11(4), Article 1809. https://doi.org/10.3390/app11041809

In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting... Read More about Cyber Ranges and TestBeds for Education, Training, and Research.

A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems (2021)
Journal Article
Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Cook, A., Janicke, H., & Jones, K. (2021). A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems. International Journal of Smart Security Technologies, 8(1), 16-34. https://doi.org/

Incident response teams cannot prepare for every situation or predict every crisis, especially when they involve cyber-physical systems. As a result, training activities need to be provided to support operating in challenging situations to develop co... Read More about A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems.

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks (2020)
Journal Article
Derhab, A., Bouras, A., Belaoued, M., Maglaras, L., & Khan, F. A. (2020). Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors, 20(21), Article 6106. https://doi

In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored nod... Read More about Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.

The Security Aspects of Automotive Over-the-Air Updates (2020)
Journal Article
Howden, J., Maglaras, L., & Ferrag, M. A. (2020). The Security Aspects of Automotive Over-the-Air Updates. International Journal of Cyber Warfare and Terrorism, 10(2), 64-81. https://doi.org/10.4018/ijcwt.2020040104

Over-the-air (OTA) update is a method for vehicle manufacturers to remotely distribute maintenance updates, performance, and feature enhancements through the vehicle's lifespan. Recalls of vehicles cost the manufactures a lot of money. OTA solves the... Read More about The Security Aspects of Automotive Over-the-Air Updates.

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks (2020)
Journal Article
Ferrag, M. A., Maglaras, L., Ahmim, A., Derdour, M., & Janicke, H. (2020). RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet, 12(3), Article 44. https://doi.org/10.3390/fi12030044

This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip a... Read More about RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.

Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems (2020)
Journal Article
Vourgidis, I., Maglaras, L., Alfakeeh, A. S., Al-Bayatti, A. H., & Ferrag, M. A. (2020). Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Appli

The field of cooperative intelligent transport systems and more specifically pedestrians to vehicles could be characterized as quite challenging, since there is a broad research area to be studied, with direct positive results to society. Pedestrians... Read More about Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems.

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed (2019)
Journal Article
Maglaras, L., Cruz, T., Ferrag, M. A., & Janicke, H. (2020). Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technology Letters, 3(1), Article e132. https://doi.org/10.1002/itl2.132

Security of Critical National Infrastructures (CNI) is one of the major concerns to countries both in a European and in a worldwide level. Training on scenarios that involve such systems is important to the effective handling of incidents. Experienti... Read More about Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.

Estimating the Relative Speed of RF Jammers in VANETs (2019)
Journal Article
Kosmanos, D., Argyriou, A., & Maglaras, L. (2019). Estimating the Relative Speed of RF Jammers in VANETs. Security and Communication Networks, 2019, Article 2064348. https://doi.org/10.1155/2019/2064348

Vehicular Ad Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their perform... Read More about Estimating the Relative Speed of RF Jammers in VANETs.

DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services (2019)
Journal Article
Ferrag, M. A., & Maglaras, L. (2019). DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services. Computers, 8(3), Article 58. https://doi.org/10.3390/computers8030058

In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system initialization phase, creat... Read More about DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services.

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security (2019)
Journal Article
Derhab, A., Guerroumi, M., Gumaei, A., Maglaras, L., Ferrag, M. A., Mukherjee, M., & Khan, F. A. (2019). Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors, 19(14), Article 3119. https://doi.org/10.3390/s191

The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies and approaches should be... Read More about Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.

DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids (2019)
Journal Article
Ferrag, M. A., & Maglaras, L. (2020). DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids. IEEE Transactions on Engineering Management, 67(4), 1285-1297. https://doi.org/10.1109/tem.2019.2922936

In this paper, we propose a novel deep learning and blockchain-based energy framework for smart grids, entitled DeepCoin. The DeepCoin framework uses two schemes, a blockchain-based scheme and a deep learning-based scheme. The blockchain-based scheme... Read More about DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids.

Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector (2019)
Journal Article
Evans, M., He, Y., Maglaras, L., Yevseyeva, I., & Janicke, H. (2019). Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. International Journal of Medical Informatics, 127, 1

Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two thirds of these incidents pertain to human error, but despite this, there are... Read More about Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector.

Protecting Civilians from Cyber Warfare with Cyber Buffer Zones (2019)
Journal Article
Robinson, M., Maglaras, L., Jones, K., & Janicke, H. (2019). Protecting Civilians from Cyber Warfare with Cyber Buffer Zones. International Journal of Smart Security Technologies, 6(1), 31-48. https://doi.org/10.4018/ijsst.2019010103

Cyber peacekeeping has quickly risen in prominence as a viable way to regulate the impact cyber warfare has upon civilian security. In this article, the concept of a cyber buffer zone is explored, and proposals are made on how it could be used to fur... Read More about Protecting Civilians from Cyber Warfare with Cyber Buffer Zones.

Blockchain Technologies for the Internet of Things: Research Issues and Challenges (2018)
Journal Article
Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2019). Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet of Things, 6(2), 2188-2204. https://doi.org/10.1109/jiot.2018.2882

This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we pr... Read More about Blockchain Technologies for the Internet of Things: Research Issues and Challenges.

HEART-IS: A novel technique for evaluating human error-related information security incidents (2018)
Journal Article
Evans, M., He, Y., Maglaras, L., & Janicke, H. (2019). HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers and Security, 80, 74-89. https://doi.org/10.1016/j.cose.2018.09.002

Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to information security. Despite this level of understanding organisations conti... Read More about HEART-IS: A novel technique for evaluating human error-related information security incidents.

The industrial control system cyber defence triage process (2017)
Journal Article
Cook, A., Janicke, H., Smith, R., & Maglaras, L. (2017). The industrial control system cyber defence triage process. Computers and Security, 70, 467-481. https://doi.org/10.1016/j.cose.2017.07.009

The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats in an effective and cost-sensitive manner that does not expose their operati... Read More about The industrial control system cyber defence triage process.

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (2017)
Journal Article
Cook, A., Smith, R. G., Maglaras, L., & Janicke, H. (2017). SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. International Journal of Cyber Warfare and Terrorism, 7(2), Article 1. https://doi.org/10.401

The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for inv... Read More about SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.

MIMO Techniques for Jamming Threat Suppression in Vehicular Networks (2016)
Journal Article
Kosmanos, D., Prodromou, N., Argyriou, A., Maglaras, L. A., & Janicke, H. (2016). MIMO Techniques for Jamming Threat Suppression in Vehicular Networks. Mobile Information Systems, 2016, Article 8141204. https://doi.org/10.1155/2016/8141204

Vehicular ad hoc networks have emerged as a promising field of research and development, since they will be able to accommodate a variety of applications, ranging from infotainment to traffic management and road safety. A specific security-related co... Read More about MIMO Techniques for Jamming Threat Suppression in Vehicular Networks.

Human behaviour as an aspect of cybersecurity assurance (2016)
Journal Article
Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667-4679. https://doi.org/10.1002/sec.1657

There continue to be numerous breaches publicised pertaining to cybersecurity despite security practices being applied within industry for many years. This paper is intended to be the first in a number of papers as research into cybersecurity assuran... Read More about Human behaviour as an aspect of cybersecurity assurance.

Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems (2016)
Journal Article
Maglaras, L. A., Jiang, J., & Cruz, T. J. (2016). Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. Journal of Information Security and Applications, 30, 15-26. https://doi.org/1

Modern Supervisory Control and Data Acquisition (SCADA) systems used by the electric utility industry to monitor and control electric power generation, transmission and distribution are recognized today as critical components of the electric power de... Read More about Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems.