Skip to main content

Research Repository

Advanced Search

Outputs (53)

Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing (2024)
Journal Article
Bensaid, R., Labraoui, N., Abba Ari, A. A., Maglaras, L., Saidi, H., Abdu Lwahhab, A. M., & Benfriha, S. (2024). Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing. Security and Commu

The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in a short period of time. Therefore, a combination of computing models such a... Read More about Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing.

Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing (2024)
Journal Article
Lambropoulos, G., Mitropoulos, S., Douligeris, C., & Maglaras, L. (2024). Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing. Computers, 13(2), Article 54. https://doi.org/10.3390/computers13020054

The widespread adoption of cloud computing has resulted in centralized datacenter structures; however, there is a requirement for smaller-scale distributed infrastructures to meet the demands for speed, responsiveness, and security for critical appli... Read More about Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing.

Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns (2024)
Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (online). Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. International Journal of Information Security, https://doi.org/10.1007/s1020

Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches increasing. Firms and their staff are experiencing mass phishing attacks, several typical precursors to... Read More about Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns.

A novel autonomous container-based platform for cybersecurity training and research (2023)
Journal Article
Chouliaras, N., Kantzavelou, I., Maglaras, L., Pantziou, G., & Amine Ferrag, M. (2023). A novel autonomous container-based platform for cybersecurity training and research. PeerJ Computer Science, 9, Article e1574. https://doi.org/10.7717/peerj-cs.1574

Cyberattacks, particularly those targeting systems that store or handle sensitive data, have become more sophisticated in recent years. To face increasing threats, continuous capacity building and digital skill competence are needed. Cybersecurity ha... Read More about A novel autonomous container-based platform for cybersecurity training and research.

A Novel Authentication Method That Combines Honeytokens and Google Authenticator (2023)
Journal Article
Papaspirou, V., Papathanasaki, M., Maglaras, L., Kantzavelou, I., Douligeris, C., Ferrag, M. A., & Janicke, H. (2023). A Novel Authentication Method That Combines Honeytokens and Google Authenticator. Information, 14(7), Article 386. https://doi.org/10.33

Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attac... Read More about A Novel Authentication Method That Combines Honeytokens and Google Authenticator.

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise (2023)
Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2023). Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Information and Computer Security, 31(4), 404-426. https:

Purpose This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security posture as it adapts to remote working because of the Coronavir... Read More about Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise.

Digitization of healthcare sector: A study on privacy and security concerns (2023)
Journal Article
Paul, M., Maglaras, L., Ferrag, M. A., & Almomani, I. (2023). Digitization of healthcare sector: A study on privacy and security concerns. ICT Express, 9(4), 571-588. https://doi.org/10.1016/j.icte.2023.02.007

The digital revolution has taken business sectors to a new height through the advancement of technology. The healthcare sector also embraced digital technology to facilitate technological change from mechanical and analogue electronic devices to the... Read More about Digitization of healthcare sector: A study on privacy and security concerns.

IoT: Communication protocols and security threats (2023)
Journal Article
Gerodimos, A., Maglaras, L., Ferrag, M. A., Ayres, N., & Kantzavelou, I. (2023). IoT: Communication protocols and security threats. Internet of Things and Cyber-Physical Systems, 3, 1-13. https://doi.org/10.1016/j.iotcps.2022.12.003

In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, pre... Read More about IoT: Communication protocols and security threats.

A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing (2023)
Journal Article
Babaghayou, M., Chaib, N., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2023). A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing. Sensors, 23(1), Article 531. https://doi.org/10.3390/s23010531

By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), the Internet of Vehicles (IoV) paradigm has attracted the attention of different research and development bodies. However, IoV deployment is still at stake as many security and privac... Read More about A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing.

An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks (2022)
Journal Article
Almomani, I., Ahmed, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (2022). An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks. IEEE Access, 10, 131640-131655. https://doi.org/10.1109/access.2022.3229623

Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets, especially for self-driving cars, as it is essential to send/receive messa... Read More about An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks.

Internet of drones security: taxonomies, open issues, and future directions (2022)
Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023). Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.

Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions... Read More about Internet of drones security: taxonomies, open issues, and future directions.

DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data (2022)
Journal Article
Saidi, H., Labraoui, N., Ari, A. A. A., Maglaras, L. A., & Emati, J. H. M. (2022). DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data. IEEE Access, 10, 101011-101028. https://doi.org/10.1109/acces

In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite increased attention to the security of electronic health records, patient privacy is still at... Read More about DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data.

Transforming Points of Single Contact Data into Linked Data (2022)
Journal Article
Fragkou, P., & Maglaras, L. (2022). Transforming Points of Single Contact Data into Linked Data. Computers, 11(8), Article 122. https://doi.org/10.3390/computers11080122

Open data portals contain valuable information for citizens and business. However, searching for information can prove to be tiresome even in portals tackling domains similar information. A typical case is the information residing in the European Com... Read More about Transforming Points of Single Contact Data into Linked Data.

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning (2022)
Journal Article
Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access, 10, 40281-40306. https://doi.or

In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and... Read More about Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.

FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things (2022)
Journal Article
Friha, O., Ferrag, M. A., Shu, L., Maglaras, L., Choo, K. R., & Nafaa, M. (2022). FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. Journal of Parallel and Distributed Computing, 165, 17-31. https://doi.org/1

In this paper, we propose a federated learning-based intrusion detection system, named FELIDS, for securing agricultural-IoT infrastructures. Specifically, the FELIDS system protects data privacy through local learning, where devices benefit from the... Read More about FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.

Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure (2022)
Journal Article
He, Y., Maglaras, L., Aliyu, A., & Luo, C. (2022). Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure. Security and Communication Networks, 2022, Article 2775249. https://doi.org/10.1155/2022/2775249

The healthcare information system (HIS) has become a victim of cyberattacks. Traditional ways to handle cyber incidents in healthcare organizations follow a predefined incident response (IR) procedure. However, this procedure is usually reactive, mis... Read More about Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure.

A multiplayer game model to detect insiders in wireless sensor networks (2022)
Journal Article
Kantzavelou, I., Maglaras, L., Tzikopoulos, P. F., & Katsikas, S. (2022). A multiplayer game model to detect insiders in wireless sensor networks. PeerJ Computer Science, 8, Article e791. https://doi.org/10.7717/peerj-cs.791

Insiders might have incentives and objectives opposed to those of the belonging organization. It is hard to detect them because of their privileges that partially protect them. In Wireless Sensor Networks (WSNs), significant security issues arise, in... Read More about A multiplayer game model to detect insiders in wireless sensor networks.

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis (2021)
Journal Article
Ferrag, M. A., Friha, O., Maglaras, L., Janicke, H., & Shu, L. (2021). Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access, 9, 138509-138542. https://doi.org/10.1109/access.2

In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications. Specifically, we first provide a review of the federated learning-b... Read More about Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.

A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks (2021)
Journal Article
Lambat, Y., Ayres, N., Maglaras, L., & Ferrag, M. A. (2021). A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks. Applied Sciences, 11(19), Article 9083. https://doi.org/10.3390/app11199083

It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated... Read More about A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks.

Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia (2021)
Journal Article
Almomani, I., Ahmed, M., & Maglaras, L. (2021). Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Computer Science, 7, Article e703. https://doi.org/10.7717/peerj-cs.703

The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regulatory Framework (CRF) and the NCA’s Essential Cybersecurity Controls (ECC) to ensure data and infrastructure security in all IT-based systems. However... Read More about Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia.

Intrusion Detection in Critical Infrastructures: A Literature Review (2021)
Journal Article
Panagiotis, F., Taxiarxchis, K., Georgios, K., Maglaras, L., & Ferrag, M. A. (2021). Intrusion Detection in Critical Infrastructures: A Literature Review. Smart Cities, 4(3), 1146-1157. https://doi.org/10.3390/smartcities4030061

Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we c... Read More about Intrusion Detection in Critical Infrastructures: A Literature Review.

RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks (2021)
Journal Article
Kosmanos, D., Karagiannis, D., Argyriou, A., Lalis, S., & Maglaras, L. (2021). RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks. Security and Communication Networks, 2021, Article 9959310. https://doi.org/10.1155/20

Wireless communications are vulnerable against radio frequency (RF) interference which might be caused either intentionally or unintentionally. A particular subset of wireless networks, Vehicular Ad-hoc NETworks (VANET), which incorporate a series of... Read More about RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks.

WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles (2021)
Journal Article
Babaghayou, M., Labraoui, N., Abba Ari, A. A., Ferrag, M. A., Maglaras, L., & Janicke, H. (2021). WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors, 21(7), Article 2443. https://doi.org/10.33

Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts main... Read More about WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.

Cyber Ranges and TestBeds for Education, Training, and Research (2021)
Journal Article
Chouliaras, N., Kittes, G., Kantzavelou, I., Maglaras, L., Pantziou, G., & Ferrag, M. A. (2021). Cyber Ranges and TestBeds for Education, Training, and Research. Applied Sciences, 11(4), Article 1809. https://doi.org/10.3390/app11041809

In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting... Read More about Cyber Ranges and TestBeds for Education, Training, and Research.

A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems (2021)
Journal Article
Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Cook, A., Janicke, H., & Jones, K. (2021). A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems. International Journal of Smart Security Technologies, 8(1), 16-34. https://doi.org/

Incident response teams cannot prepare for every situation or predict every crisis, especially when they involve cyber-physical systems. As a result, training activities need to be provided to support operating in challenging situations to develop co... Read More about A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems.

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks (2020)
Journal Article
Derhab, A., Bouras, A., Belaoued, M., Maglaras, L., & Khan, F. A. (2020). Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors, 20(21), Article 6106. https://doi

In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored nod... Read More about Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.

The Security Aspects of Automotive Over-the-Air Updates (2020)
Journal Article
Howden, J., Maglaras, L., & Ferrag, M. A. (2020). The Security Aspects of Automotive Over-the-Air Updates. International Journal of Cyber Warfare and Terrorism, 10(2), 64-81. https://doi.org/10.4018/ijcwt.2020040104

Over-the-air (OTA) update is a method for vehicle manufacturers to remotely distribute maintenance updates, performance, and feature enhancements through the vehicle's lifespan. Recalls of vehicles cost the manufactures a lot of money. OTA solves the... Read More about The Security Aspects of Automotive Over-the-Air Updates.

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks (2020)
Journal Article
Ferrag, M. A., Maglaras, L., Ahmim, A., Derdour, M., & Janicke, H. (2020). RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet, 12(3), Article 44. https://doi.org/10.3390/fi12030044

This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip a... Read More about RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.

Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems (2020)
Journal Article
Vourgidis, I., Maglaras, L., Alfakeeh, A. S., Al-Bayatti, A. H., & Ferrag, M. A. (2020). Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Appli

The field of cooperative intelligent transport systems and more specifically pedestrians to vehicles could be characterized as quite challenging, since there is a broad research area to be studied, with direct positive results to society. Pedestrians... Read More about Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems.

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed (2019)
Journal Article
Maglaras, L., Cruz, T., Ferrag, M. A., & Janicke, H. (2020). Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technology Letters, 3(1), Article e132. https://doi.org/10.1002/itl2.132

Security of Critical National Infrastructures (CNI) is one of the major concerns to countries both in a European and in a worldwide level. Training on scenarios that involve such systems is important to the effective handling of incidents. Experienti... Read More about Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.

Estimating the Relative Speed of RF Jammers in VANETs (2019)
Journal Article
Kosmanos, D., Argyriou, A., & Maglaras, L. (2019). Estimating the Relative Speed of RF Jammers in VANETs. Security and Communication Networks, 2019, Article 2064348. https://doi.org/10.1155/2019/2064348

Vehicular Ad Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their perform... Read More about Estimating the Relative Speed of RF Jammers in VANETs.

DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services (2019)
Journal Article
Ferrag, M. A., & Maglaras, L. (2019). DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services. Computers, 8(3), Article 58. https://doi.org/10.3390/computers8030058

In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system initialization phase, creat... Read More about DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services.

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security (2019)
Journal Article
Derhab, A., Guerroumi, M., Gumaei, A., Maglaras, L., Ferrag, M. A., Mukherjee, M., & Khan, F. A. (2019). Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors, 19(14), Article 3119. https://doi.org/10.3390/s191

The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies and approaches should be... Read More about Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.

DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids (2019)
Journal Article
Ferrag, M. A., & Maglaras, L. (2020). DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids. IEEE Transactions on Engineering Management, 67(4), 1285-1297. https://doi.org/10.1109/tem.2019.2922936

In this paper, we propose a novel deep learning and blockchain-based energy framework for smart grids, entitled DeepCoin. The DeepCoin framework uses two schemes, a blockchain-based scheme and a deep learning-based scheme. The blockchain-based scheme... Read More about DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids.

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends (2019)
Journal Article
Ferrag, M. A., Maglaras, L., & Derhab, A. (2019). Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. Security and Communication Networks, 2019, Article 5452870. https://doi.org/10.1155/2019/545287

Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summarise the factors that hinder biometrics models’ development and deployment on a large scale, including human physiol... Read More about Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.

Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector (2019)
Journal Article
Evans, M., He, Y., Maglaras, L., Yevseyeva, I., & Janicke, H. (2019). Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. International Journal of Medical Informatics, 127, 1

Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two thirds of these incidents pertain to human error, but despite this, there are... Read More about Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector.

Protecting Civilians from Cyber Warfare with Cyber Buffer Zones (2019)
Journal Article
Robinson, M., Maglaras, L., Jones, K., & Janicke, H. (2019). Protecting Civilians from Cyber Warfare with Cyber Buffer Zones. International Journal of Smart Security Technologies, 6(1), 31-48. https://doi.org/10.4018/ijsst.2019010103

Cyber peacekeeping has quickly risen in prominence as a viable way to regulate the impact cyber warfare has upon civilian security. In this article, the concept of a cyber buffer zone is explored, and proposals are made on how it could be used to fur... Read More about Protecting Civilians from Cyber Warfare with Cyber Buffer Zones.

Developing cyber peacekeeping: Observation, monitoring and reporting (2018)
Journal Article
Robinson, M., Jones, K., Janicke, H., & Maglaras, L. (2019). Developing cyber peacekeeping: Observation, monitoring and reporting. Government Information Quarterly, 36(2), 276-293. https://doi.org/10.1016/j.giq.2018.12.001

Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber warfare increasingly becoming part of future conflicts, new and novel solutions are needed to assist governments in securing their national infrastructur... Read More about Developing cyber peacekeeping: Observation, monitoring and reporting.

Blockchain Technologies for the Internet of Things: Research Issues and Challenges (2018)
Journal Article
Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2019). Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet of Things, 6(2), 2188-2204. https://doi.org/10.1109/jiot.2018.2882

This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we pr... Read More about Blockchain Technologies for the Internet of Things: Research Issues and Challenges.

HEART-IS: A novel technique for evaluating human error-related information security incidents (2018)
Journal Article
Evans, M., He, Y., Maglaras, L., & Janicke, H. (2019). HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers and Security, 80, 74-89. https://doi.org/10.1016/j.cose.2018.09.002

Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to information security. Despite this level of understanding organisations conti... Read More about HEART-IS: A novel technique for evaluating human error-related information security incidents.

Vulnerability Analysis of Network Scanning on SCADA Systems (2018)
Journal Article
Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018). Vulnerability Analysis of Network Scanning on SCADA Systems. Security and Communication Networks, 2018, Article 3794603. https://doi.org/10.1155/2018/3794603

Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructure environments for decades. With the demand for remote facilities to be con... Read More about Vulnerability Analysis of Network Scanning on SCADA Systems.

Authentication Protocols for Internet of Things: A Comprehensive Survey (2017)
Journal Article
Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., & Shu, L. (2017). Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks, 2017, Article 6562953. https://doi.org/10.1155/2017/6562953

In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail.... Read More about Authentication Protocols for Internet of Things: A Comprehensive Survey.

The industrial control system cyber defence triage process (2017)
Journal Article
Cook, A., Janicke, H., Smith, R., & Maglaras, L. (2017). The industrial control system cyber defence triage process. Computers and Security, 70, 467-481. https://doi.org/10.1016/j.cose.2017.07.009

The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats in an effective and cost-sensitive manner that does not expose their operati... Read More about The industrial control system cyber defence triage process.

Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems (2017)
Journal Article
Yousaf, A., Loan, A., Babiceanu, R. F., Maglaras, L., & Yousaf, O. (2017). Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. Computers and Security, 70, 124-143. https://doi.org/1

In this paper an analysis of physical layer intruders, for direct sequence spread spectrum systems, is presented. Physical layer intruders are traditional jammers that do not have any intelligence as compared to smart jammers that have signal process... Read More about Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems.

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (2017)
Journal Article
Cook, A., Smith, R. G., Maglaras, L., & Janicke, H. (2017). SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. International Journal of Cyber Warfare and Terrorism, 7(2), Article 1. https://doi.org/10.401

The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for inv... Read More about SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.

MIMO Techniques for Jamming Threat Suppression in Vehicular Networks (2016)
Journal Article
Kosmanos, D., Prodromou, N., Argyriou, A., Maglaras, L. A., & Janicke, H. (2016). MIMO Techniques for Jamming Threat Suppression in Vehicular Networks. Mobile Information Systems, 2016, Article 8141204. https://doi.org/10.1155/2016/8141204

Vehicular ad hoc networks have emerged as a promising field of research and development, since they will be able to accommodate a variety of applications, ranging from infotainment to traffic management and road safety. A specific security-related co... Read More about MIMO Techniques for Jamming Threat Suppression in Vehicular Networks.

Human behaviour as an aspect of cybersecurity assurance (2016)
Journal Article
Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667-4679. https://doi.org/10.1002/sec.1657

There continue to be numerous breaches publicised pertaining to cybersecurity despite security practices being applied within industry for many years. This paper is intended to be the first in a number of papers as research into cybersecurity assuran... Read More about Human behaviour as an aspect of cybersecurity assurance.

Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems (2016)
Journal Article
Maglaras, L. A., Jiang, J., & Cruz, T. J. (2016). Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. Journal of Information Security and Applications, 30, 15-26. https://doi.org/1

Modern Supervisory Control and Data Acquisition (SCADA) systems used by the electric utility industry to monitor and control electric power generation, transmission and distribution are recognized today as critical components of the electric power de... Read More about Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems.