Browsing by Author "Maglaras, Leandros"
Now showing items 1-20 of 70
-
Architectural and Information Theoretic Perspectives of Physical Layer Intruders for Direct Sequence Spread Spectrum Systems
In this paper an analysis of physical layer intruders, for direct sequence spread spectrum systems, is presented. Physical layer intruders are traditional jammers that do not have any intelligence as compared to smart ... -
Assessment of Machine Learning Techniques for Building an Efficient IDS
Chytas, Sotirios Panagiotis; Maglaras, Leandros; Derhab, Abdelouahid; Stamoulis, George (Conference)ntrusion Detection Systems (IDS) are the systems that detect and block any potential threats (e.g. DDoS attacks) in the network. In this project, we explore the performance of several machine learning techniques when used ... -
Attribution of Cyber Attacks on Industrial Control Systems
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national ... -
Authentication Protocols for Internet of Things: A Comprehensive Survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are ... -
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues
This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for ... -
Between Location Protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles
Babaghayou, Messaoud; Labraoui, Nabila; Ferrag, Mohamed Amine; Maglaras, Leandros (Conference)Internet of Vehicles (IoV) capabilities can be used to decrease the number of accidents by sharing information among entities like the location of the Smart Cars (SC). This information is not encrypted due to several ... -
Blockchain and Random Subspace Learning-based IDS for SDN-enabled Industrial IoT Security
Derhab, Abdelouahid; Guerroumi, Mohamed; Gumaei, Abdu; Maglaras, Leandros; Ferrag, Mohamed Amine; Mukherjee, Mithun; Khan, Farrukh Aslam (Article)The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies ... -
Blockchain Based Voting Systems
Soni, Yash; Maglaras, Leandros; Ferrag, Mohamed Amine (Conference)Voting is an essential tool for any democratic government. It is the most important factor that makes the government for the people, by the people. It is surprising that many countries in the world haven’t moved on from ... -
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
Ferrag, Mohamed Amine; Derdour, Makhlouf; Mukherjee, Mithun; Derhab, Abdelouahid; Maglaras, Leandros; Janicke, Helge (Article)This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain ... -
Blocking Epidemics Propagation in Vehicular Networks
Basaras, P.; Belikaidis, I.-P.; Maglaras, Leandros; Katsaros, Dimitrios (Conference)The propagation of software viruses over a vehicular network where vehicles communicate via V2V links can have disastrous effects for the vehicles themselves and the ad hoc network. Here, we propose a simple distributed ... -
Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
Chapman, Samuel; Smith, Richard; Maglaras, Leandros; Janicke, Helge (Article)This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject ... -
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
Maglaras, Leandros; Jiang, Jianmin; Cruz, Tiago J. (Article)Modern Supervisory Control and Data Acquisition SCADA systems used bythe electric utility industry to monitor and control electric power generation,transmission and distribution are recognized today as critical components ... -
Convergence of Detection Probability, Computational Gains and Asymptotic Analysis of an Algorithm for Physical-Layer Intrusion Detection System
Yousaf, A.; Loan, A.; Babiceanu, R. F.; Maglaras, Leandros; Yousaf, O. (Article)Asymptotic analysis of an algorithm is crucial for practical engineering design. It provides important information about the performance of an algorithm in terms of time complexity, space complexity, and input scale. Based ... -
Cooperative approaches for dymanic wireless charging of Electric Vehicles in a smart city
Maglaras, Leandros; Topalis, Frangiskos; Maglaras, A. (Conference)In this paper, a method of electric vehicles charging with the use of large truck/bus vehicles moving along national highways and provincial roads is proposed and described. The method relies on charging vehicles from ... -
Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks
Kosmanos, Dimitrios; Chatzisavvas, Savvas; Argyriou, Antonios; Maglaras, Leandros (Conference)In this paper, we are concerned with the problem of estimating the speed of an RF jammer that moves towards a group/platoon of moving wireless communicating nodes. In our system model, the group of nodes receives an ... -
Cyber security of critical infrastructures
Maglaras, Leandros; Kim, K.; Janicke, Helge; Ferrag, Mohamed Amine; Rallis, S.; Fragkou, P.; Maglaras, A. (Article)Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved ... -
A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems
Simoes, P.; Jiang, Jianmin; Lev, L.; Aubigny, M.; Maglaras, Leandros; Proenca, J.; Rosa, L.; Cruz, Tiago J. (Article)This paper presents a Distributed Intrusion Detection System (DIDS) for Supervisory Control and Data Acquisition (SCADA) Industrial Control Systems (ICS) that was developed for the CockpitCI project. Its architecture ... -
Cybersecurity in the Era of Digital Transformation: The case of Greece
Maglaras, Leandros; Drivas, George; Chouliaras, Nestoras; Boiten, Eerke; Lambrinoudakis, Costas; Ioannidis, Sotiris (Conference)This article presents the cybersecurity progress in Greece since the creation of the Greek National Cyber Security Authority as nation-wide cybersecurity coordination and policy-making unit. During this period, Greece ... -
Cyberterrorism targeting general public through social media
Ayres, Nicholas; Maglaras, Leandros (Article)Current literature suggests that critical national infrastructure is the main focus of attack for cyberterrorism but this researchwill address the issue of whether a mimetic virus is a viable cyberterrorist attack ... -
Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on ...