• Login
    Search 
    •   DORA Home
    • Faculty of Computing, Engineering and Media
    • School of Computer Science and Informatics
    • Search
    •   DORA Home
    • Faculty of Computing, Engineering and Media
    • School of Computer Science and Informatics
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 65

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Improved Security Performance for VANET Simulations 

    Riebl, Raphael; Monz, Markus; Varga , Simon; Janicke, Helge; Maglaras, Leandros; Al-Bayatti, Ali Hilal; Facchi, Christian (4th IFAC Symposium on Telematics Applications, 2016-12-06)
    Upcoming deployments of Vehicular Ad Hoc Networks (VANETs) in Europe are expected to sign and verify packets secured by cryptographic signatures by default. Thus, when VANET simulations are used for development and test ...
    Thumbnail

    A Security Architectural Pattern for Risk Management of Industry Control Systems within Critical National Infrastructure 

    Wood, Andy; He, Ying; Maglaras, Leandros; Janicke, Helge (Inderscience, 2017-11-22)
    SCADA and ICS security have been focusing on addressing issues such as vulnerability discovery and intrusion detection within critical national infrastructure. Less attention has been paid to architectural solutions to the ...

    Exploiting SCADA vulnerabilities using a Human Interface Device 

    Tzokatziou, Grigoris; Maglaras, Leandros; Janicke, Helge; He, Ying (The Science and InformationOrganization, 2015)
    SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic ...
    Thumbnail

    A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development 

    Harrison, Steve; Tzounis, Antonis; Maglaras, Leandros; Siewe, Francois; Smith, Richard; Janicke, Helge (2016-03)
    This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been ...
    Thumbnail

    SSH Honeypot: Building, Deploying and Analysis 

    Doubleday, Harry; Maglaras, Leandros; Janicke, Helge (SAI Organisation, 2016-05)
    This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are to ...
    Thumbnail

    HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents 

    Evans, M.; He, Ying; Maglaras, Leandros; Janicke, Helge (Elsevier, 2018-09-25)
    Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to information security. Despite this level of ...
    Thumbnail

    Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? 

    Chapman, Samuel; Smith, Richard; Maglaras, Leandros; Janicke, Helge (MDPI, 2017-08-11)
    This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject ...
    Thumbnail

    The Industrial Control System Cyber Defence Triage Process 

    Cook, Allan; Janicke, Helge; Smith, Richard; Maglaras, Leandros (Elsevier, 2017-07-24)
    The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats in an effective and cost-sensitive manner that ...
    Thumbnail

    Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities 

    AlMajed, Najlaa; Maglaras, Leandros; Siewe, Francois; Janicke, Helge; Bagheri Zadeh, P. (EAI Transactions on Secutiry and Safety, 2015-11-28)
    Online shopping and banking institutes are a current trend in e-commerce, where online shopping and banking are frequently used over the Internet. With the fast growth of the technology and on-line practices, criminal ...
    Thumbnail

    The mimetic virus: A vector for cyber security 

    Ayres, Nicholas; Maglaras, Leandros; Janicke, Helge; Smith, Richard; He, Ying (Inderscience, 2016)
    Like conventional terrorism, cyberterrorism has the same aims and goals but the act is done exclusively within cyberspace where the computer is both weapon and target. Unlike conventional terrorism, ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 7
    Feed iconrss
    Bookmark icon Bookmark Search

    Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
    DMU LIbrary
     

     

    Browse

    All of DORACommunities & CollectionsAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission DateThis CollectionAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission Date

    My Account

    Login

    Discover

    Author
    Maglaras, Leandros (65)
    Janicke, Helge (37)Ferrag, Mohamed Amine (13)He, Ying (11)Smith, Richard (8)Argyriou, Antonios (6)Cook, Allan (6)Kosmanos, Dimitrios (6)Siewe, Francois (6)Derhab, Abdelouahid (5)... View MoreSubjectSCADA (6)Blockchain (5)Cyber Security (4)Human Error Related Information Security Incidents (3)Human Reliability Analysis (HRA) (3)ICS (3)Information Security (3)Intrusion Detection Systems (3)NSID (3)security (3)... View MoreDate Issued2016 (15)2020 (13)2019 (12)2017 (9)2018 (9)2015 (5)2011 (1)2014 (1)Has File(s)Yes (48)No (17)

    Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
    DMU LIbrary