• Login
    Browsing by Author 
    •   DORA Home
    • Browsing by Author
    •   DORA Home
    • Browsing by Author
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing by Author "Maglaras, Leandros"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-20 of 70

    • title
    • publication date
    • submission date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Architectural and Information Theoretic Perspectives of Physical Layer Intruders for Direct Sequence Spread Spectrum Systems 

        Yousaf, Awais; Loan, Asim; Babiceanu, Radu F.; Maglaras, Leandros; Yousaf, Onaiza (Article)
        In this paper an analysis of physical layer intruders, for direct sequence spread spectrum systems, is presented. Physical layer intruders are traditional jammers that do not have any intelligence as compared to smart ...
      • Assessment of Machine Learning Techniques for Building an Efficient IDS 

        Chytas, Sotirios Panagiotis; Maglaras, Leandros; Derhab, Abdelouahid; Stamoulis, George (Conference)
        ntrusion Detection Systems (IDS) are the systems that detect and block any potential threats (e.g. DDoS attacks) in the network. In this project, we explore the performance of several machine learning techniques when used ...
      • Attribution of Cyber Attacks on Industrial Control Systems 

        Cook, Allan; Nicholson, Andrew; Janicke, Helge; Maglaras, Leandros; Smith, Richard (Article)
        In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national ...
      • Authentication Protocols for Internet of Things: A Comprehensive Survey 

        Ferrag, Mohamed Amine; Maglaras, Leandros; Janicke, Helge; Jiang, Jianmin; Shu, Lei (Article)
        In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are ...
      • Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues 

        Ferrag, Mohamed Amine; Maglaras, Leandros; Derhab, Abdelouahid; Janicke, Helge (Article)
        This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for ...
      • Between Location Protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles 

        Babaghayou, Messaoud; Labraoui, Nabila; Ferrag, Mohamed Amine; Maglaras, Leandros (Conference)
        Internet of Vehicles (IoV) capabilities can be used to decrease the number of accidents by sharing information among entities like the location of the Smart Cars (SC). This information is not encrypted due to several ...
      • Blockchain and Random Subspace Learning-based IDS for SDN-enabled Industrial IoT Security 

        Derhab, Abdelouahid; Guerroumi, Mohamed; Gumaei, Abdu; Maglaras, Leandros; Ferrag, Mohamed Amine; Mukherjee, Mithun; Khan, Farrukh Aslam (Article)
        The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies ...
      • Blockchain Based Voting Systems 

        Soni, Yash; Maglaras, Leandros; Ferrag, Mohamed Amine (Conference)
        Voting is an essential tool for any democratic government. It is the most important factor that makes the government for the people, by the people. It is surprising that many countries in the world haven’t moved on from ...
      • Blockchain Technologies for the Internet of Things: Research Issues and Challenges 

        Ferrag, Mohamed Amine; Derdour, Makhlouf; Mukherjee, Mithun; Derhab, Abdelouahid; Maglaras, Leandros; Janicke, Helge (Article)
        This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain ...
      • Blocking Epidemics Propagation in Vehicular Networks 

        Basaras, P.; Belikaidis, I.-P.; Maglaras, Leandros; Katsaros, Dimitrios (Conference)
        The propagation of software viruses over a vehicular network where vehicles communicate via V2V links can have disastrous effects for the vehicles themselves and the ad hoc network. Here, we propose a simple distributed ...
      • Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? 

        Chapman, Samuel; Smith, Richard; Maglaras, Leandros; Janicke, Helge (Article)
        This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject ...
      • Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems 

        Maglaras, Leandros; Jiang, Jianmin; Cruz, Tiago J. (Article)
        Modern Supervisory Control and Data Acquisition SCADA systems used bythe electric utility industry to monitor and control electric power generation,transmission and distribution are recognized today as critical components ...
      • Convergence of Detection Probability, Computational Gains and Asymptotic Analysis of an Algorithm for Physical-Layer Intrusion Detection System 

        Yousaf, A.; Loan, A.; Babiceanu, R. F.; Maglaras, Leandros; Yousaf, O. (Article)
        Asymptotic analysis of an algorithm is crucial for practical engineering design. It provides important information about the performance of an algorithm in terms of time complexity, space complexity, and input scale. Based ...
      • Cooperative approaches for dymanic wireless charging of Electric Vehicles in a smart city 

        Maglaras, Leandros; Topalis, Frangiskos; Maglaras, A. (Conference)
        In this paper, a method of electric vehicles charging with the use of large truck/bus vehicles moving along national highways and provincial roads is proposed and described. The method relies on charging vehicles from ...
      • Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks 

        Kosmanos, Dimitrios; Chatzisavvas, Savvas; Argyriou, Antonios; Maglaras, Leandros (Conference)
        In this paper, we are concerned with the problem of estimating the speed of an RF jammer that moves towards a group/platoon of moving wireless communicating nodes. In our system model, the group of nodes receives an ...
      • Cyber security of critical infrastructures 

        Maglaras, Leandros; Kim, K.; Janicke, Helge; Ferrag, Mohamed Amine; Rallis, S.; Fragkou, P.; Maglaras, A. (Article)
        Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved ...
      • A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems 

        Simoes, P.; Jiang, Jianmin; Lev, L.; Aubigny, M.; Maglaras, Leandros; Proenca, J.; Rosa, L.; Cruz, Tiago J. (Article)
        This paper presents a Distributed Intrusion Detection System (DIDS) for Supervisory Control and Data Acquisition (SCADA) Industrial Control Systems (ICS) that was developed for the CockpitCI project. Its architecture ...
      • Cybersecurity in the Era of Digital Transformation: The case of Greece 

        Maglaras, Leandros; Drivas, George; Chouliaras, Nestoras; Boiten, Eerke; Lambrinoudakis, Costas; Ioannidis, Sotiris (Conference)
        This article presents the cybersecurity progress in Greece since the creation of the Greek National Cyber Security Authority as nation-wide cybersecurity coordination and policy-making unit. During this period, Greece ...
      • Cyberterrorism targeting general public through social media 

        Ayres, Nicholas; Maglaras, Leandros (Article)
        Current literature suggests that critical national infrastructure is the main focus of attack for cyberterrorism but this researchwill address the issue of whether a mimetic virus is a viable cyberterrorist attack ...
      • Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study 

        Ferrag, Mohamed; Maglaras, Leandros; Moschoyiannis, Sotiris; Janicke, Helge (Article)
        In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on ...

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary
         

         

        Browse

        All of DORACommunities & CollectionsAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission Date

        My Account

        Login

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary