Research explorer tool

Date


Output Type

Download Available

112 results

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

Journal Article
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021)
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. https://doi.org/10.3390/jcp1020014
As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven In...

Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System

Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Tan, Z. (2021)
Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System  . Ad hoc networks, 120, https://doi.org/10.1016/j.adhoc.2021.102590
Industrial Control Systems (ICS) are hardware, network, and software, upon which a facility depends to allow daily operations to function. In most cases society takes the oper...

Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021)
Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets. Computers and Security, 108, https://doi.org/10.1016/j.cose.2021.102377
The threat from ransomware continues to grow both in the number of affected victims as well as the cost incurred by the people and organisations impacted in a successful attac...

LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments

Journal Article
Kim, T., Kumar, G., Saha, R., Buchanan, W. J., Devgun, T., & Thomas, R. (2021)
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments. IEEE Access, 9, 100972-100980. https://doi.org/10.1109/access.2021.3097267
There is an increasing drive to provide improved levels of trust within an Internet-of-Things (IoTs) environments, but the devices and sensors used tend to be limited in their...

Blockchain for edge-enabled smart cities applications

Journal Article
Jan, M. A., Yeh, K., Tan, Z., & Wu, Y. (2021)
Blockchain for edge-enabled smart cities applications. Journal of Information Security and Applications, 61, 102937. https://doi.org/10.1016/j.jisa.2021.102937
The Internet of Things (IoT)-enabled devices are increasing at an exponential rate and share massive data generated in smart cities around the globe. The time-critical and del...

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

Journal Article
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture

Journal Article
Chrysoulas, C., & Pitropakis, N. (2018)
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Transactions on Ambient Systems, 4(12), 153551. https://doi.org/10.4108/eai.10-1-2018.153551
QoS and Security features are playing an important role in modern network architecures. Dynamic selection of services and by extension of service providers are vital in today’...

If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Journal Article
Pitropakis, N., Anastasopoulou, D., Pikrakis, A., & Lambrinoudakis, C. (2014)
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments. Journal of cloud computing advances, systems and applications, 3(1), https://doi.org/10.1186/s13677-014-0020-6
Computational systems are gradually moving towards Cloud Computing Infrastructures, using the several advantages they have to offer and especially the economic advantages in t...

Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments

Journal Article
Pitropakis, N., Pikrakis, A., & Lambrinoudakis, C. (2015)
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments. International Journal of Information Security, 14(4), 299-305. doi:10.1007/s10207-014-0255-8
Cloud computing is gradually becoming the most popular option of Information Technology infrastructures. However, an important issue that has emerged through that revolution i...

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment

Journal Article
Babar, M., Khan, F., Iqbal, . W., Yahya, A., Arif, F., Tan, Z., & Chuma, J. (2018)
A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access, 6, 43088-43099
Smart societies have an increasing demand for quality-oriented services and infrastructure in an Industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numero...