71 results

Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario

Conference Proceeding
Adesanya, O. M., Moradpoor, N., Maglaras, L., Lim, I. S., & Ferrag, M. A. (in press)
Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario.

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records

Conference Proceeding
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (in press)
Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.

PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme

Conference Proceeding
Yaqub, Z., Yigit, Y., Maglaras, L., Tan, Z., & Wooderson, P. (in press)
PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.
In the rapidly evolving landscape of Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flo...

Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing

Journal Article
Bensaid, R., Labraoui, N., Abba Ari, A. A., Maglaras, L., Saidi, H., Abdu Lwahhab, A. M., & Benfriha, S. (2024)
Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing. Security and Communication Networks, 2024, Article 6651584. https://doi.org/10.1155/2024/6651584
The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in ...

Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing

Journal Article
Lambropoulos, G., Mitropoulos, S., Douligeris, C., & Maglaras, L. (2024)
Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing. Computers, 13(2), Article 54. https://doi.org/10.3390/computers13020054
The widespread adoption of cloud computing has resulted in centralized datacenter structures; however, there is a requirement for smaller-scale distributed infrastructures to ...

Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns

Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (in press)
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. International Journal of Information Security, https://doi.org/10.1007/s10207-023-00809-5
Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches increasing. Firms and their ...

Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper

Conference Proceeding
Sarker, I. H., Janicke, H., Maglaras, L., & Camtepe, S. (2024)
Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper. In Advanced Research in Technologies, Information, Innovation and Sustainability (ARTIIS 2023), Proceedings, Part II (302-316). https://doi.org/10.1007/978-3-031-48855-9_23
As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today’s digital era. Traditional security measures ...

Reliability Analysis of Fault Tolerant Memory Systems

Conference Proceeding
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023)
Reliability Analysis of Fault Tolerant Memory Systems. In 2023 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). https://doi.org/10.1109/SEEDA-CECNSM61561.2023.10470763
This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The...

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks

Conference Proceeding
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023)
Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. In 2023 IEEE Globecom Workshops (GC Wkshps). https://doi.org/10.1109/GCWkshps58843.2023.10465218
As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to dep...

Cyber Malware: Offensive and Defensive Systems

Book
Almomani, I., Maglaras, L. A., Ferrag, M. A., & Ayres, N. (Eds.)
(2023). Cyber Malware: Offensive and Defensive Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-34969-0
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge ...

Date


Date