Browsing by Author "Janicke, Helge"
Now showing items 1-20 of 89
-
AIDIS: Detecting and Classifying Anomalous Behavior in UbiquitousKernel Processes
Luh, Robert; Janicke, Helge; Schrittweiser, Sebastian (Article)Targeted attacks on IT systems are a rising threat against the confidentiality, integrity, and availability of critical information and infrastructures. With the rising prominence of advanced persistent threats (APTs), ... -
Analysis of published public sector information security incidents and breaches to establish the proportions of human error
Janicke, Helge; Yevseyeva, Iryna; He, Y.; Evans, M. (Conference)The information security field experiences a continuous stream of information security incidents and breaches, which are publicised by the media, public bodies and regulators. Despite the need for information security ... -
Attribution of Cyber Attacks on Industrial Control Systems
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national ... -
Authentication Protocols for Internet of Things: A Comprehensive Survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are ... -
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues
This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for ... -
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
Ferrag, Mohamed Amine; Derdour, Makhlouf; Mukherjee, Mithun; Derhab, Abdelouahid; Maglaras, Leandros; Janicke, Helge (Article)This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain ... -
Building CPU stubs to optimize CPU bound systems: An application of dynamic performance stubs.
Trapp, Peter; Meyer, Markus; Facchi, Christian; Janicke, Helge; Siewe, Francois (Article)Dynamic performance stubs provide a framework for the simulation of the performance behavior of software modules and functions. Hence, they can be used as an exten- sion to software performance engineering methodologies. ... -
Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
Chapman, Samuel; Smith, Richard; Maglaras, Leandros; Janicke, Helge (Article)This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject ... -
Class Balanced Similarity-Based Instance Transfer Learning for Botnet Family Classification
Janicke, Helge; Yerima, Suleiman; Alothman, Basil (Conference)The use of Transfer Learning algorithms for enhancing the performance of machine learning algorithms has gained attention over the last decade. In this paper we introduce an extension and evaluation of our novel approach ... -
Cyber security of critical infrastructures
Maglaras, Leandros; Kim, K.; Janicke, Helge; Ferrag, Mohamed Amine; Rallis, S.; Fragkou, P.; Maglaras, A. (Article)Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved ... -
Data confidentiality in mobile ad hoc networks.
Aldabbas, Hamza; Alwada'n, T.; Janicke, Helge; Al-Bayatti, Ali Hilal (Article)Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes ... -
Decentralized XACML overlay network.
Alzahrani, A.; Janicke, Helge; Abubaker, S. (Conference) -
Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on ... -
Developing Cyber Peacekeeping: Observation, Monitoring and Reporting
Robinson, Michael; Jones, Kevin; Janicke, Helge; Maglaras, Leandros (Article)Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber warfare increasingly becoming part of future conflicts, new and novel solutions are needed to assist governments in securing ... -
The development of secure multi-agent systems
Janicke, Helge (Thesis or dissertation / Doctoral / PhD)