Machine Learning for Smart Healthcare Management Using IoT
Book Chapter
Yigit, Y., Duran, K., Moradpoor, N., Maglaras, L., Van Huynh, N., & Canberk, B. (in press)
Machine Learning for Smart Healthcare Management Using IoT. In IoT and ML for Information Management: A Smart Healthcare Perspective. Springer
The convergence of Machine Learning (ML) and the Internet of Things (IoT) has brought about a paradigm shift in healthcare, ushering in a new era of intelligent healthcare man...
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis
Conference Proceeding
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (in press)
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. In 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
Hybrid Threats, Cyberterrorism and Cyberwarfare
Book
Ferrag, M. A., Kantzavelou, I., Maglaras, L., & Janicke, H. (Eds.)
(2024). Hybrid Threats, Cyberterrorism and Cyberwarfare. Boca Raton: CRC Press. https://doi.org/10.1201/9781003314721
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers fo...
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise
Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2023)
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Information and Computer Security, 31(4), 404-426. https://doi.org/10.1108/ICS-05-2022-0085
Purpose
This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business'...
IoT: Communication protocols and security threats
Journal Article
Gerodimos, A., Maglaras, L., Ferrag, M. A., Ayres, N., & Kantzavelou, I. (in press)
IoT: Communication protocols and security threats. Internet of Things and Cyber-Physical Systems, https://doi.org/10.1016/j.iotcps.2022.12.003
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. More...
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing
Journal Article
Babaghayou, M., Chaib, N., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2023)
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing. Sensors, 23(1), Article 531. https://doi.org/10.3390/s23010531
By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), the Internet of Vehicles (IoV) paradigm has attracted the attention of different research and development bo...
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
Journal Article
Almomani, I., Ahmed, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (2022)
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks. IEEE Access, 10, 131640-131655. https://doi.org/10.1109/access.2022.3229623
Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets,...
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad hoc Networks
Journal Article
Almomani, I., Ahmad, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (in press)
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad hoc Networks. IEEE Access,
Jamming is a terrifying attack that could harm the 802.11p-based vehicular communications by occupying the communication channels through overwhelming the network with jamming...
Internet of drones security: taxonomies, open issues, and future directions
Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023)
Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.vehcom.2022.100552
Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast arra...
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity
Journal Article
Maglaras, L. (2022)
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity. Computers, 11(11), Article 159. https://doi.org/10.3390/computers11110159