Skip to main content

Showing 1–15 of 15 results for author: Moschoyiannis, S

.
  1. arXiv:2211.05935  [pdf, other

    eess.SY cs.AI q-bio.MN

    Inferring probabilistic Boolean networks from steady-state gene data samples

    Authors: Vytenis Šliogeris, Leandros Maglaras, Sotiris Moschoyiannis

    Abstract: Probabilistic Boolean Networks have been proposed for estimating the behaviour of dynamical systems as they combine rule-based modelling with uncertainty principles. Inferring PBNs directly from gene data is challenging however, especially when data is costly to collect and/or noisy, e.g., in the case of gene expression profile data. In this paper, we present a reproducible method for inferring PB… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

  2. arXiv:2210.12229  [pdf, other

    cs.LG cs.AI eess.SY math.OC

    Deep Reinforcement Learning for Stabilization of Large-scale Probabilistic Boolean Networks

    Authors: Sotiris Moschoyiannis, Evangelos Chatzaroulas, Vytenis Sliogeris, Yuhu Wu

    Abstract: The ability to direct a Probabilistic Boolean Network (PBN) to a desired state is important to applications such as targeted therapeutics in cancer biology. Reinforcement Learning (RL) has been proposed as a framework that solves a discrete-time optimal control problem cast as a Markov Decision Process. We focus on an integrative framework powered by a model-free deep RL method that can address di… ▽ More

    Submitted 25 October, 2022; v1 submitted 21 October, 2022; originally announced October 2022.

  3. Electric Vehicle Charging: a Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP)

    Authors: Z. Garofalaki, D. Kosmanos, S. Moschoyiannis, D. Kallergis, C. Douligeris

    Abstract: The increased use of smart Electric Vehicles (EVs) and Plug-in Electric Vehicles (PEV) opened a new area of research and development. The number of EV charging sites has considerably increased in residential as well as in public areas. Within these EV charging sites, various entities need to communicate in a secure and efficient way. The Open Charge Point Protocol (OCPP) offers a way to coordinate… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

  4. arXiv:2204.11956  [pdf, other

    physics.soc-ph cond-mat.dis-nn cs.AI cs.FL

    Spontaneous Emergence of Computation in Network Cascades

    Authors: Galen Wilkerson, Sotiris Moschoyiannis, Henrik Jeldtoft Jensen

    Abstract: Neuronal network computation and computation by avalanche supporting networks are of interest to the fields of physics, computer science (computation theory as well as statistical or machine learning) and neuroscience. Here we show that computation of complex Boolean functions arises spontaneously in threshold networks as a function of connectivity and antagonism (inhibition), computed by logic au… ▽ More

    Submitted 27 April, 2022; v1 submitted 25 April, 2022; originally announced April 2022.

    Comments: 11 pages, 7 figures, 1 table, includes supplementary information

    MSC Class: 03; 05; 08; 20; 47; 62; 68; 82; 91; 92; 94 ACM Class: B.2; B.7; C.1; C.5; E.4; F.1; F.4; G.2; G.2.2; G.3; G.4; I.1; I.2; I.6; K.2

  5. arXiv:2111.02364  [pdf, other

    cs.CR cs.AI

    HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

    Authors: Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis

    Abstract: The Internet of Vehicles (IoV), whereby interconnected vehicles communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. Data on vehicular attackers can be realistically gathered through cyber threat intelligence using systems like honeypots. Admittedly, configuring honeypots introduces a trade-of… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    MSC Class: 68M25 ACM Class: I.2.11

  6. arXiv:2108.11207  [pdf, other

    cs.CR

    Multi-Stage Threat Modelling and Security Monitoring in 5GCN

    Authors: Robert Pell, Sotiris Moschoyiannis, Emmanouil Panaousis

    Abstract: The fifth generation of mobile networks (5G) promises a range of new capabilities including higher data rates and more connected users. To support the new capabilities and use cases the 5G Core Network (5GCN) will be dynamic and reconfigurable in nature to deal with demand. It is these improvements which also introduce issues for traditional security monitoring methods and techniques which need to… ▽ More

    Submitted 25 August, 2021; originally announced August 2021.

  7. arXiv:2108.11206  [pdf, other

    cs.CR

    Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT&CK

    Authors: Robert Pell, Sotiris Moschoyiannis, Emmanouil Panaousis, Ryan Heartfield

    Abstract: This article discusses how the gap between early 5G network threat assessments and an adversarial Tactics, Techniques, Procedures (TTPs) knowledge base for future use in the MITRE ATT&CK threat modelling framework can be bridged. We identify knowledge gaps in the existing framework for key 5G technology enablers such as SDN, NFV, and 5G specific signalling protocols of the core network. We adopt a… ▽ More

    Submitted 14 October, 2021; v1 submitted 25 August, 2021; originally announced August 2021.

  8. Synthesis and Pruning as a Dynamic Compression Strategy for Efficient Deep Neural Networks

    Authors: Alastair Finlinson, Sotiris Moschoyiannis

    Abstract: The brain is a highly reconfigurable machine capable of task-specific adaptations. The brain continually rewires itself for a more optimal configuration to solve problems. We propose a novel strategic synthesis algorithm for feedforward networks that draws directly from the brain's behaviours when learning. The proposed approach analyses the network and ranks weights based on their magnitude. Unli… ▽ More

    Submitted 23 November, 2020; originally announced November 2020.

    Comments: 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 9th International Symposium DATAMOD 2020 FROM DATA TO MODELS AND BACK, 16 Pages, 7 Figures, 3 Tables, 2 Equations

  9. arXiv:2011.02901  [pdf, other

    cs.CR

    Lessons Learnt from a 2FA roll out within a higher education organisation

    Authors: Abideen Tetlay, Helen Treharne, Tom Ascroft, Sotiris Moschoyiannis

    Abstract: Rolling out a new security mechanism in an organisation requires planning, good communication, adoption from users, iterations of reflection on the challenges experienced and how they were overcome. Our case study elicited users' perceptions to reflect on the adoption and usage of the two factor authentication (2FA) mechanism being rolled out within our higher education organisation. This was achi… ▽ More

    Submitted 5 November, 2020; originally announced November 2020.

  10. arXiv:1910.10472  [pdf

    cs.SI physics.bio-ph physics.data-an physics.soc-ph

    Universal Boolean Logic in Cascading Networks

    Authors: Galen Wilkerson, Sotiris Moschoyiannis

    Abstract: Computational properties of networks that can undergo cascades are examined. It is shown that universal Boolean logic circuits can be computed by a global cascade having antagonistic interactions. Determinism and cascade frequency of this antagonistic model are explored,as well as its ability to perform classification. Universality of cascade logic may have far-reaching consequences, in that it ca… ▽ More

    Submitted 12 October, 2019; originally announced October 2019.

    Comments: 12 pages, 8 figures

  11. arXiv:1909.03331  [pdf, other

    cs.LG cs.AI eess.SY

    Deep Reinforcement Learning for Control of Probabilistic Boolean Networks

    Authors: Georgios Papagiannis, Sotiris Moschoyiannis

    Abstract: Probabilistic Boolean Networks (PBNs) were introduced as a computational model for the study of complex dynamical systems, such as Gene Regulatory Networks (GRNs). Controllability in this context is the process of making strategic interventions to the state of a network in order to drive it towards some other state that exhibits favourable biological properties. In this paper we study the ability… ▽ More

    Submitted 7 September, 2020; v1 submitted 7 September, 2019; originally announced September 2019.

  12. arXiv:1906.08874  [pdf, other

    cs.AI cs.DB

    Customer Segmentation of Wireless Trajectory Data

    Authors: Matthew R Karlsen, Sotiris K. Moschoyiannis

    Abstract: Wireless trajectory data consists of a number of (time, point) entries where each point is associated with a particular wireless device (WAP or BLE beacon) tied to a location identifier, such as a place name. A trajectory relates to a particular mobile device. Such data can be clustered `semantically' to identify similar trajectories, where similarity relates to non-geographic characteristics such… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Comments: Technical Report, University of Surrey, UK, 2018

  13. arXiv:1710.03726  [pdf, other

    eess.SY

    Route Optimization of Electric Vehicles based on Dynamic Wireless Charging

    Authors: Dimitrios Kosmanos, Leandros Maglaras, Michalis Mavrovouniotis, Sotiris Moschoyiannis, Antonios Argyriou, Athanasios Maglaras, Helge Janicke

    Abstract: One of the barriers to adoption of Electric Vehicles (EVs) is the anxiety around the limited driving range. Recent proposals have explored charging EVs on the move, using dynamic wireless charging which enables power exchange between the vehicle and the grid while the vehicle is moving. In this article, we focus on the intelligent routing of EVs in need of charging so that they can make most effic… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: 11 pages, 5 figures

  14. A Web-based Tool for Identifying Strategic Intervention Points in Complex Systems

    Authors: Sotiris Moschoyiannis, Nicholas Elia, Alexandra S. Penn, David J. B. Lloyd, Chris Knight

    Abstract: Steering a complex system towards a desired outcome is a challenging task. The lack of clarity on the system's exact architecture and the often scarce scientific data upon which to base the operationalisation of the dynamic rules that underpin the interactions between participant entities are two contributing factors. We describe an analytical approach that builds on Fuzzy Cognitive Map** (FCM)… ▽ More

    Submitted 1 August, 2016; originally announced August 2016.

    Comments: In Proceedings Cassting'16/SynCoP'16, arXiv:1608.00177

    Journal ref: EPTCS 220, 2016, pp. 39-52

  15. Service Choreography, SBVR, and Time

    Authors: Nurulhuda A. Manaf, Sotiris Moschoyiannis, Paul Krause

    Abstract: We propose the use of structured natural language (English) in specifying service choreographies, focusing on the what rather than the how of the required coordination of participant services in realising a business application scenario. The declarative approach we propose uses the OMG standard Semantics of Business Vocabulary and Rules (SBVR) as a modelling language. The service choreography appr… ▽ More

    Submitted 23 December, 2015; originally announced December 2015.

    Comments: In Proceedings FOCLASA 2015, arXiv:1512.06947

    Journal ref: EPTCS 201, 2015, pp. 63-77