Leandros Maglaras
leandros maglaras

Prof Leandros Maglaras

Professor

Biography

Dr. Leandros A. Maglaras is a professor of cybersecurity in the School of Computing at Edinburgh Napier University. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained a B.Sc. (M.Sc. equivalent) in Electrical and Computer Engineering from the Aristotle University of Thessaloniki, Greece in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004, and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from the University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield He is featured in Stanford University's list of the world’s Top 2% scientists. He is a Senior Member of the Institute of Electrical & Electronics Engineers (IEEE) and is an author of more than 200 papers in scientific magazines and conferences.

Esteem

Editorial Activity

  • Associate Editor for Journal of Information Processing Systems (JIPS)
  • Section Editor in Chief for MDPI Computers
  • Section Editor of Communications and Security for IntechOpen Journal for Computer science, Artificial intelligence and robotics
  • Associate Editor for Journal of Surveillance, Security and Safety (JSSS)
  • Executive Editor for Elsevier ICT Express
  • Associate Editor for IEEE Access

 

Media Activity

  • Interview - Meet the talent - 4i magazine

 

Visiting Positions

  • Visiting Professor at De Montfort University

 

Date


71 results

Combining Security and Reliability of Critical Infrastructures: The Concept of Securability

Journal Article
Maglaras, L., Janicke, H., & Ferrag, M. A. (2022)
Combining Security and Reliability of Critical Infrastructures: The Concept of Securability. Applied Sciences, 12(20), Article 10387. https://doi.org/10.3390/app122010387

DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data

Journal Article
Saidi, H., Labraoui, N., Ari, A. A. A., Maglaras, L. A., & Emati, J. H. M. (2022)
DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data. IEEE Access, 10, 101011-101028. https://doi.org/10.1109/access.2022.3207803
In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite increased attention...

Transforming Points of Single Contact Data into Linked Data

Journal Article
Fragkou, P., & Maglaras, L. (2022)
Transforming Points of Single Contact Data into Linked Data. Computers, 11(8), Article 122. https://doi.org/10.3390/computers11080122
Open data portals contain valuable information for citizens and business. However, searching for information can prove to be tiresome even in portals tackling domains similar ...

Cybersecurity of Critical Infrastructures: Challenges and Solutions

Journal Article
Maglaras, L., Janicke, H., & Ferrag, M. A. (2022)
Cybersecurity of Critical Infrastructures: Challenges and Solutions. Sensors, 22(14), Article 5105. https://doi.org/10.3390/s22145105

Cyber Threats in the Healthcare Sector and Countermeasures

Book Chapter
Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2022)
Cyber Threats in the Healthcare Sector and Countermeasures. In Research Anthology on Securing Medical Systems and Records. IGI Global. https://doi.org/10.4018/978-1-6684-6311-6.ch001
Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabiliti...

Artificial Intelligence: Practical and Ethical Challenges

Book Chapter
Rice, S., & Maglaras, L. (2022)
Artificial Intelligence: Practical and Ethical Challenges. In M. Ahmed, S. Rabiul Islam, A. Anwar, N. Moustafa, & A. Khan Pathan (Eds.), Explainable Artificial Intelligence for Cyber Security (59-71). Springer. https://doi.org/10.1007/978-3-030-96630-0_3
Artificial Intelligence (AI) & Machine Learning (ML) is used everywhere in daily life from speech recognition on our phones, targeted marketing strategies & face recognition w...

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning

Journal Article
Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022)
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access, 10, 40281-40306. https://doi.org/10.1109/access.2022.3165809
In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based i...

SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles

Conference Proceeding
Babaghayou, M., Labraoui, N., Ari, A. A. A., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2022)
SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles. In CROWNCOM 2021, WiCON 2021: Cognitive Radio Oriented Wireless Networks and Wireless Internet (343-360). https://doi.org/10.1007/978-3-030-98002-3_25
The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhanc...

FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things

Journal Article
Friha, O., Ferrag, M. A., Shu, L., Maglaras, L., Choo, K. R., & Nafaa, M. (2022)
FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. Journal of Parallel and Distributed Computing, 165, 17-31. https://doi.org/10.1016/j.jpdc.2022.03.003
In this paper, we propose a federated learning-based intrusion detection system, named FELIDS, for securing agricultural-IoT infrastructures. Specifically, the FELIDS system p...

Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure

Journal Article
He, Y., Maglaras, L., Aliyu, A., & Luo, C. (2022)
Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure. Security and Communication Networks, 2022, Article 2775249. https://doi.org/10.1155/2022/2775249
The healthcare information system (HIS) has become a victim of cyberattacks. Traditional ways to handle cyber incidents in healthcare organizations follow a predefined inciden...

Current Post Grad projects