Skip to main content

Showing 1–4 of 4 results for author: Loukas, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.07369  [pdf, other

    cs.HC

    A qualitative field study on explainable AI for lay users subjected to AI cyberattacks

    Authors: Kevin McAreavey, Weiru Liu, Kim Bauters, Dennis Ivory, George Loukas, Manos Panaousis, Hsueh-Ju Chen, Rea Gill, Rachael Payler, Asimina Vasalou

    Abstract: In this paper we present results from a qualitative field study on explainable AI (XAI) for lay users (n = 18) who were subjected to AI cyberattacks. The study was based on a custom-built smart heating application called Squid and was conducted over seven weeks in early 2023. Squid combined a smart radiator valve installed in participant homes with a web application that implemented an AI feature… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2304.07411  [pdf, other

    cs.CR

    SoK: The MITRE ATT&CK Framework in Research and Practice

    Authors: Shanto Roy, Emmanouil Panaousis, Cameron Noakes, Aron Laszka, Sakshyam Panda, George Loukas

    Abstract: The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and techniques, has been widely adopted by the cybersecurity industry as well as by academic researchers. Its broad range of industry applications include threat intelligence, threat detection, and incident response, some of which go beyond what it was originally designed for. Despite its popularity, there is a lack of… ▽ More

    Submitted 14 April, 2023; originally announced April 2023.

  3. arXiv:2111.02364  [pdf, other

    cs.CR cs.AI

    HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

    Authors: Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis

    Abstract: The Internet of Vehicles (IoV), whereby interconnected vehicles communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. Data on vehicular attackers can be realistically gathered through cyber threat intelligence using systems like honeypots. Admittedly, configuring honeypots introduces a trade-of… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    MSC Class: 68M25 ACM Class: I.2.11

  4. arXiv:2001.03782  [pdf, other

    cs.CR

    Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users

    Authors: Sakshyam Panda, Emmanouil Panaousis, George Loukas, Christos Laoudias

    Abstract: Cyber hygiene measures are often recommended for strengthening an organization's security posture, especially for protecting against social engineering attacks that target the human element. However, the related recommendations are typically the same for all organizations and their employees, regardless of the nature and the level of risk for different groups of users. Building upon an existing cy… ▽ More

    Submitted 11 January, 2020; originally announced January 2020.