Leandros Maglaras
leandros maglaras

Prof Leandros Maglaras

Professor

Biography

Dr. Leandros A. Maglaras is a professor of cybersecurity in the School of Computing at Edinburgh Napier University. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained a B.Sc. (M.Sc. equivalent) in Electrical and Computer Engineering from the Aristotle University of Thessaloniki, Greece in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004, and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from the University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield He is featured in Stanford University's list of the world’s Top 2% scientists. He is a Senior Member of the Institute of Electrical & Electronics Engineers (IEEE) and is an author of more than 200 papers in scientific magazines and conferences.

Esteem

Editorial Activity

  • Associate Editor for Journal of Information Processing Systems (JIPS)
  • Section Editor in Chief for MDPI Computers
  • Section Editor of Communications and Security for IntechOpen Journal for Computer science, Artificial intelligence and robotics
  • Associate Editor for Journal of Surveillance, Security and Safety (JSSS)
  • Executive Editor for Elsevier ICT Express
  • Associate Editor for IEEE Access

 

Media Activity

  • Interview - Meet the talent - 4i magazine

 

Visiting Positions

  • Visiting Professor at De Montfort University

 

Date


71 results

Machine Learning for Smart Healthcare Management Using IoT

Book Chapter
Yigit, Y., Duran, K., Moradpoor, N., Maglaras, L., Van Huynh, N., & Canberk, B. (in press)
Machine Learning for Smart Healthcare Management Using IoT. In IoT and ML for Information Management: A Smart Healthcare Perspective. Springer
The convergence of Machine Learning (ML) and the Internet of Things (IoT) has brought about a paradigm shift in healthcare, ushering in a new era of intelligent healthcare man...

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis

Conference Proceeding
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (in press)
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. In 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)

Hybrid Threats, Cyberterrorism and Cyberwarfare

Book
Ferrag, M. A., Kantzavelou, I., Maglaras, L., & Janicke, H. (Eds.)
(2024). Hybrid Threats, Cyberterrorism and Cyberwarfare. Boca Raton: CRC Press. https://doi.org/10.1201/9781003314721
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers fo...

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise

Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2023)
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Information and Computer Security, 31(4), 404-426. https://doi.org/10.1108/ICS-05-2022-0085
Purpose This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business'...

IoT: Communication protocols and security threats

Journal Article
Gerodimos, A., Maglaras, L., Ferrag, M. A., Ayres, N., & Kantzavelou, I. (in press)
IoT: Communication protocols and security threats. Internet of Things and Cyber-Physical Systems, https://doi.org/10.1016/j.iotcps.2022.12.003
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. More...

A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing

Journal Article
Babaghayou, M., Chaib, N., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2023)
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing. Sensors, 23(1), Article 531. https://doi.org/10.3390/s23010531
By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), the Internet of Vehicles (IoV) paradigm has attracted the attention of different research and development bo...

An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks

Journal Article
Almomani, I., Ahmed, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (2022)
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks. IEEE Access, 10, 131640-131655. https://doi.org/10.1109/access.2022.3229623
Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets,...

An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad hoc Networks

Journal Article
Almomani, I., Ahmad, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (in press)
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad hoc Networks. IEEE Access,
Jamming is a terrifying attack that could harm the 802.11p-based vehicular communications by occupying the communication channels through overwhelming the network with jamming...

Internet of drones security: taxonomies, open issues, and future directions

Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023)
Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.vehcom.2022.100552
Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast arra...

From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity

Journal Article
Maglaras, L. (2022)
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity. Computers, 11(11), Article 159. https://doi.org/10.3390/computers11110159

Current Post Grad projects