Skip to main content

Showing 1–44 of 44 results for author: Maglaras, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12513  [pdf, other

    cs.CR

    Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs

    Authors: Ahmad Mohsin, Helge Janicke, Adrian Wood, Iqbal H. Sarker, Leandros Maglaras, Naeem Janjua

    Abstract: Large Language Models (LLMs) such as ChatGPT and GitHub Copilot have revolutionized automated code generation in software engineering. However, as these models are increasingly utilized for software development, concerns have arisen regarding the security and quality of the generated code. These concerns stem from LLMs being primarily trained on publicly available code repositories and internet-ba… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 27 pages, Standard Journal Paper submitted to Q1 Elsevier

  2. arXiv:2405.08026  [pdf, other

    cs.LG

    ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis

    Authors: Mohammad Amaz Uddin, Muhammad Nazrul Islam, Leandros Maglaras, Helge Janicke, Iqbal H. Sarker

    Abstract: SMS, or short messaging service, is a widely used and cost-effective communication medium that has sadly turned into a haven for unwanted messages, commonly known as SMS spam. With the rapid adoption of smartphones and Internet connectivity, SMS spam has emerged as a prevalent threat. Spammers have taken notice of the significance of SMS for mobile phone users. Consequently, with the emergence of… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  3. arXiv:2405.04874  [pdf, other

    cs.CR

    Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities

    Authors: Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke

    Abstract: Critical National Infrastructure (CNI) encompasses a nation's essential assets that are fundamental to the operation of society and the economy, ensuring the provision of vital utilities such as energy, water, transportation, and communication. Nevertheless, growing cybersecurity threats targeting these infrastructures can potentially interfere with operations and seriously risk national security… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  4. arXiv:2403.17571  [pdf, other

    cs.CR

    Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems

    Authors: Salko Korac, Leandros Maglaras, Naghmeh Moradpoor, Bill Buchanan, Berk Canberk

    Abstract: Ransomware has been predominantly a threat to Windows systems. But, Linux systems became interesting for cybercriminals and this trend is expected to continue. This endangers IoT ecosystems, whereas many IoT systems are based on Linux (e.g. cloud infrastructure and gateways). This paper researches how currently employed forensic techniques can be applied to Linux ransomware and evaluates the matur… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  5. arXiv:2403.08701  [pdf, other

    cs.CR

    Review of Generative AI Methods in Cybersecurity

    Authors: Yagmur Yigit, William J Buchanan, Madjid G Tehrani, Leandros Maglaras

    Abstract: Over the last decade, Artificial Intelligence (AI) has become increasingly popular, especially with the use of chatbots such as ChatGPT, Gemini, and DALL-E. With this rise, large language models (LLMs) and Generative AI (GenAI) have also become more prevalent in everyday use. These advancements strengthen cybersecurity's defensive posture and open up new attack avenues for adversaries as well. Thi… ▽ More

    Submitted 19 March, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    Comments: 40 pages

  6. arXiv:2401.14005  [pdf, other

    cs.CR

    Cyber-Twin: Digital Twin-boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks

    Authors: Yagmur Yigit, Ioannis Panitsas, Leandros Maglaras, Leandros Tassiulas, Berk Canberk

    Abstract: The rapid evolution of Vehicular Ad-hoc NETworks (VANETs) has ushered in a transformative era for intelligent transportation systems (ITS), significantly enhancing road safety and vehicular communication. However, the intricate and dynamic nature of VANETs presents formidable challenges, particularly in vehicle-to-infrastructure (V2I) communications. Roadside Units (RSUs), integral components of V… ▽ More

    Submitted 15 March, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: 6 pages, 5 figures, IEEE International Conference on Communications (ICC) 2024

  7. arXiv:2311.15633  [pdf, other

    cs.CR

    Toward a real-time TCP SYN Flood DDoS mitigation using Adaptive Neuro-Fuzzy classifier and SDN Assistance in Fog Computing

    Authors: Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Leandros Maglaras, Hafida Saidi, Ahmed Mahmoud Abdu Lwahhab, Sihem Benfriha

    Abstract: The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data is generated and needs to be processed in a short period of time. Therefore, the combination of computing models such as cloud computing is necessary. The main disadvantage of the cloud platform is its high latency due to the centralized mainframe. Fortunately, a dis… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

    Comments: 16 pages

  8. arXiv:2311.14308  [pdf, other

    cs.CR

    Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing

    Authors: Messaoud Babaghayou, Noureddine Chaib, Leandros Maglaras, Yagmur Yigit, Mohamed Amine Ferrag

    Abstract: This paper addresses the challenge of efficiently offloading heavy computing tasks from ground mobile devices to the satellite-based mist computing environment. With ground-based edge and cloud servers often being inaccessible, the exploitation of satellite mist computing becomes imperative. Existing offloading algorithms have shown limitations in adapting to the unique characteristics of heavy co… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

    Comments: 8 pages

  9. arXiv:2311.12849  [pdf, other

    cs.DC

    Reliability Analysis of Fault Tolerant Memory Systems

    Authors: Yagmur Yigit, Leandros Maglaras, Mohamed Amine Ferrag, Naghmeh Moradpoor, Georgios Lambropoulos

    Abstract: This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modeled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction with Single Error Correction and Double Error Detection (SEC-DED) codes. It explores three primary models: 1) Exponentially distributed scrubbing, invo… ▽ More

    Submitted 23 November, 2023; v1 submitted 16 October, 2023; originally announced November 2023.

    Comments: 6 pages

  10. arXiv:2310.04898  [pdf, other

    cs.CR

    Scalable Multi-domain Trust Infrastructures for Segmented Networks

    Authors: Sam Grierson, William J Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras, Chris Eckl

    Abstract: Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the authenticity of the public key. However, what happens when external entities are not trusted to verify the public key or in cases where there is no Inte… ▽ More

    Submitted 10 October, 2023; v1 submitted 7 October, 2023; originally announced October 2023.

  11. arXiv:2310.03554  [pdf, other

    cs.CR cs.NI eess.SP

    Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks

    Authors: Yagmur Yigit, Christos Chrysoulas, Gokhan Yurdakul, Leandros Maglaras, Berk Canberk

    Abstract: As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, the growing EoT network expands the attack surface, necessitating robust and proactive security measures. Traditional solutions fall short against dyna… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  12. arXiv:2308.15009  [pdf, ps, other

    cs.CR

    Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations

    Authors: Sam Grierson, Konstantinos Chalkias, William J Buchanan, Leandros Maglaras

    Abstract: EdDSA is a standardised elliptic curve digital signature scheme introduced to overcome some of the issues prevalent in the more established ECDSA standard. Due to the EdDSA standard specifying that the EdDSA signature be deterministic, if the signing function were to be used as a public key signing oracle for the attacker, the unforgeability notion of security of the scheme can be broken. This pap… ▽ More

    Submitted 10 October, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  13. arXiv:2308.05126  [pdf, other

    cs.CR

    Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper

    Authors: Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe

    Abstract: As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today's digital era. Traditional security measures tend to be insufficient to defend against these persistent and dynamic threats because they are mainly intuitional. One of the most promising ways to handle this ongoing problem is utilizing the potential of data-driven intel… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: 15 pages, Springer

  14. arXiv:2307.05047  [pdf, other

    cs.CR

    A Blockchain-based two Factor Honeytoken Authentication System

    Authors: Vasilis Papaspirou, Leandros Maglaras, Ioanna Kantzavelou, Naghmeh Moradpoor, Sokratis Katsikas

    Abstract: This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the authentication method to prevent many attacks including tampering attacks. Evaluation results show that integrating blockchain into the Honeytoken method could improve performance and operational efficiency.

    Submitted 12 July, 2023; v1 submitted 11 July, 2023; originally announced July 2023.

  15. arXiv:2304.05644  [pdf, other

    cs.CR

    Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things

    Authors: Mohamed Amine Ferrag, Djallel Hamouda, Merouane Debbah, Leandros Maglaras, Abderrahmane Lakas

    Abstract: While the benefits of 6G-enabled Internet of Things (IoT) are numerous, providing high-speed, low-latency communication that brings new opportunities for innovation and forms the foundation for continued growth in the IoT industry, it is also important to consider the security challenges and risks associated with the technology. In this paper, we propose a two-stage intrusion detection framework f… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    Comments: The paper is accepted and will be published in the IEEE DCOSS-IoT 2023 Conference Proceedings

  16. arXiv:2303.14785  [pdf, ps, other

    cs.CR

    Review of the NIST Light-weight Cryptography Finalists

    Authors: William J Buchanan, Leandros Maglaras

    Abstract: Since 2016, NIST has been assessing lightweight encryption methods, and, in 2022, NIST published the final 10: ASCON, Elephant, GIFT-COFB, Grain128-AEAD, ISAP, Photon-Beetle, Romulus, Sparkle, TinyJambu, and Xoodyak. At the time that the article was written, NISC announced ASCOn as the chosen method that will be published as NIST'S lightweight cryptography standard later in 2023. In this article,… ▽ More

    Submitted 28 March, 2023; v1 submitted 26 March, 2023; originally announced March 2023.

    Comments: 6 pages

  17. arXiv:2211.05935  [pdf, other

    eess.SY cs.AI q-bio.MN

    Inferring probabilistic Boolean networks from steady-state gene data samples

    Authors: Vytenis Å liogeris, Leandros Maglaras, Sotiris Moschoyiannis

    Abstract: Probabilistic Boolean Networks have been proposed for estimating the behaviour of dynamical systems as they combine rule-based modelling with uncertainty principles. Inferring PBNs directly from gene data is challenging however, especially when data is costly to collect and/or noisy, e.g., in the case of gene expression profile data. In this paper, we present a reproducible method for inferring PB… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

  18. arXiv:2211.01332  [pdf

    cs.IR

    A Health Focused Text Classification Tool (HFTCT)

    Authors: Baadr Suleman M Alwheepy, Leandros Maglaras, Nick Ayres

    Abstract: Due to the high number of users on social media and the massive amounts of queries requested every second to share a new video, picture, or message, social platforms struggle to manage this humungous amount of data that is endlessly coming in. HFTCT relies on wordlists to classify opinions. It can carry out its tasks reasonably well; however, sometimes, the wordlists themselves fail to be reliable… ▽ More

    Submitted 23 October, 2022; originally announced November 2022.

    Comments: 12 pages

  19. arXiv:2112.08431  [pdf, other

    cs.CR

    Cybersecurity Revisited: Honeytokens meet Google Authenticator

    Authors: Vasilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke

    Abstract: Although sufficient authentication mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have shown they are also vulnerable. This research work proposes a novel two factor authentication system that incorporates honeytokens into the two factor authentication process. The current implementation c… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

    Comments: 6 pages, 1 figure

  20. arXiv:2012.08782  [pdf, other

    cs.CR

    A novel Two-Factor HoneyToken Authentication Mechanism

    Authors: Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris

    Abstract: The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files for flaws that might lead to a successful cracking, and the lack of a tight security policy regar… ▽ More

    Submitted 20 January, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: 7 pages, 6 figures

  21. arXiv:2010.15394  [pdf, other

    cs.CR

    Smart Homes: Security Challenges and Privacy Concerns

    Authors: Fraser Hall, Leandros Maglaras, Theodoros Aivaliotis, Loukas Xagoraris, Ioanna Kantzavelou

    Abstract: Development and growth of Internet of Things (IoT) technology has exponentially increased over the course of the last 10 years since its inception, and as a result has directly influenced the popularity and size of smart homes. In this article we present the main technologies and applications that constitute a smart home, we identify the main security and privacy challenges that smart home face an… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: 6 pages

  22. arXiv:2010.07041  [pdf, other

    cs.CY cs.CR

    From Cyber Terrorism to Cyber Peacekee**: Are we there yet?

    Authors: Maria Papathanasaki, Georgios Dimitriou, Leandros Maglaras, Ismini Vasileiou, Helge Janicke

    Abstract: In Cyberspace nowadays, there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. In this… ▽ More

    Submitted 27 September, 2020; originally announced October 2020.

  23. arXiv:2006.09990  [pdf

    cs.CR

    ZKPs: Does This Make The Cut? Recent Advances and Success of Zero-Knowledge Security Protocols

    Authors: Stavros Kassaras, Leandros Maglaras

    Abstract: How someone can get health insurance without sharing his health information? How you can get a loan without disclosing your credit score? There is a method to certify certain attributes of various data, either this is health metrics or finance information, without revealing the data itself or any other kind of personal data. This method is known as zero-knowledge proofs. Zero-Knowledge techniques… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

    Comments: 13 pages

  24. arXiv:2004.10411  [pdf, other

    cs.CR

    A NIS Directive compliant Cybersecurity Maturity Assessment Framework

    Authors: George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook, Helge Janicke

    Abstract: The NIS Directive introduces obligations for the security of the network and information systems of operators of essential services and of digital service providers and require from the national competent authorities to assess their compliance to these obligations. This paper describes a novel cybersecurity maturity assessment framework (CMAF) that is tailored to the NIS Directive requirements and… ▽ More

    Submitted 22 April, 2020; originally announced April 2020.

    Comments: 6 pages, 2 figures

  25. arXiv:2004.09909  [pdf, other

    eess.SP cs.CR

    Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks

    Authors: Dimitrios Kosmanos, Savvas Chatzisavvas, Antonios Argyriou, Leandros Maglaras

    Abstract: In this paper, we are concerned with the problem of estimating the speed of an RF jammer that moves towards a group/platoon of moving wireless communicating nodes. In our system model, the group of nodes receives an information signal from a master node, that they want to decode, while the Radio Frequency (RF) jammer desires to disrupt this communication as it approaches them. For this system mode… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

  26. arXiv:1901.09374  [pdf, other

    cs.CR

    Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab

    Abstract: Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models' development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The differen… ▽ More

    Submitted 27 January, 2019; originally announced January 2019.

    Comments: 13 pages, figure 6, tables 5

  27. arXiv:1901.03899  [pdf, other

    cs.CR

    Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures

    Authors: Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis

    Abstract: As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation. Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace. In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are… ▽ More

    Submitted 12 January, 2019; originally announced January 2019.

  28. arXiv:1812.11900  [pdf

    cs.CY cs.CR

    Develo** Cyber Buffer Zones

    Authors: Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras

    Abstract: The United Nations conducts peace operations around the world, aiming tomaintain peace and security in conflict torn areas. Whilst early operations werelargely successful, the changing nature of warfare and conflict has often left peaceoperations strugglingto adapt. In this article, we make a contribution towardsefforts to plan for the next evolution in both intra and inter-state conflict: cyberwa… ▽ More

    Submitted 31 December, 2018; originally announced December 2018.

  29. arXiv:1812.11886  [pdf, other

    cs.CR

    RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks

    Authors: Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras

    Abstract: Wireless communications are vulnerable against radio frequency (RF) jamming which might be caused either intentionally or unintentionally. A particular subset of wireless networks, vehicular ad-hoc networks (VANET) which incorporate a series of safety-critical applications, may be a potential target of RF jamming with detrimental safety effects. To ensure secure communication and defend it against… ▽ More

    Submitted 31 December, 2018; originally announced December 2018.

  30. arXiv:1812.11811  [pdf, other

    cs.CR eess.SP

    Estimating the Relative Speed of RF Jammers in VANETs

    Authors: Dimitrios Kosmanos, Antonios Argyriou, Leandros Maglaras

    Abstract: Vehicular Ad-Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their performance. In this paper, we propose a novel Relative Speed Estimation Algorithm (RSEA) of a moving interfering vehicle that approaches a Transmitter (… ▽ More

    Submitted 31 December, 2018; originally announced December 2018.

    Comments: 13 pages, 7 figures

  31. arXiv:1812.09059  [pdf, other

    cs.CR

    A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models

    Authors: Ahmed Ahmim, Leandros Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke

    Abstract: This paper proposes a novel intrusion detection system (IDS) that combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm and Forest PA. Specifically, the first and second method take as inputs features of the data set, and classify the network traffic as Attack/Benign. The third classifier uses features of the initial da… ▽ More

    Submitted 21 December, 2018; originally announced December 2018.

    Comments: 6 pages, 1 figure

  32. Blockchain Technologies for the Internet of Things: Research Issues and Challenges

    Authors: Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke

    Abstract: This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we provide an overview of the application domains of blockchain technologies in IoT, e.g, Internet of Vehicles, Internet of Energy, Internet of Cloud, Fog… ▽ More

    Submitted 24 June, 2018; originally announced June 2018.

    Comments: 14 pages, 5 figures

  33. arXiv:1806.02608  [pdf, other

    cs.CY

    Develo** Cyber Peacekee**: Observation, Monitoring and Reporting

    Authors: Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras

    Abstract: Cyber peacekee** is an emerging and multi-disciplinary field of research, touching upon technical, political and societal domains of thought. In this article we build upon previous works by develo** the cyber peacekee** activity of observation, monitoring and reporting. We take a practical approach: describing a scenario in which two countries request UN support in drawing up and overseeing… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

  34. arXiv:1803.10281  [pdf, other

    cs.CR

    Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke

    Abstract: This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for mobile devices. Then, we describe and give a classification of threat models in smart mobile devices in five categories, including, identity-based attacks, eavesdrop**-based at… ▽ More

    Submitted 8 March, 2019; v1 submitted 27 March, 2018; originally announced March 2018.

    Comments: 22 pages, 9 figures

  35. arXiv:1711.00525  [pdf, other

    cs.CR

    Internet of Cloud: Security and Privacy issues

    Authors: Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, Helge Janicke

    Abstract: The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that the… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

    Comments: 27 pages, 4 figures

  36. arXiv:1710.09616  [pdf, other

    cs.CY

    An Introduction to Cyber Peacekee**

    Authors: Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras

    Abstract: Peacekee** is a noble and essential activity, hel** to bring peace to conflict torn areas and providing security to millions of people around the world. Peacekeepers operate in all domains of war: buffer zones on land, no fly zones in the air and ensuring free passage at sea. With the emergence of cyberspace as a domain of war, questions on the role of peacekee** in this domain naturally ari… ▽ More

    Submitted 24 April, 2018; v1 submitted 26 October, 2017; originally announced October 2017.

    Comments: This is an updated version, submitted to the Journal of Networking and Computer Applications

  37. arXiv:1708.04027  [pdf, other

    cs.CR

    Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke

    Abstract: This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks against… ▽ More

    Submitted 14 August, 2017; originally announced August 2017.

    Comments: 24 pages, 14 figures

  38. arXiv:1612.07206  [pdf, other

    cs.CR

    Authentication Protocols for Internet of Things: A Comprehensive Survey

    Authors: Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang

    Abstract: In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT). Specifically, we select and in-detail examine more than forty authentication protocols developed for or applied in the context of the IoT under four environments, including: (1) Machine to machine communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Inte… ▽ More

    Submitted 21 December, 2016; originally announced December 2016.

    Comments: 62 pages, 8 figures

  39. arXiv:1611.07722  [pdf, other

    cs.CR

    A Survey on Privacy-preserving Schemes for Smart Grid Communications

    Authors: Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang

    Abstract: In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications. Specifically, we select and in-detail examine thirty privacy preserving schemes developed for or applied in the context of Smart Grids. Based on the communication and system models, we classify these schemes that are published between 2013 and 2016, in five categories, including, 1) Smart… ▽ More

    Submitted 23 November, 2016; originally announced November 2016.

    Comments: 30 pages, 13 figures, 15 tables

  40. arXiv:1610.06095  [pdf, other

    cs.CR

    Privacy-preserving schemes for Ad Hoc Social Networks: A survey

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim

    Abstract: In this paper, we review the state of the art of privacy-preserving schemes for ad hoc social networks, including, mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically, we select and in-detail examine thirty-three privacy preserving schemes developed for or applied in the context of ad hoc social networks. These schemes are published between 2008 and 2016. Based on this… ▽ More

    Submitted 19 October, 2016; originally announced October 2016.

    Comments: 27 pages, 7 figures

  41. A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development

    Authors: Steve Harrison, Antonis Tzounis, Leandros A. Maglaras, Francois Siewe, Richard Smith, Helge Janicke

    Abstract: This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been used for several years. We discuss the pros and cons of Waterfall before moving onto the Agile Scrum methodology. Agile has been adopted by the majority of Government digital departments including the G… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: 19 pages, 4 figures, International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016

  42. arXiv:1601.03921  [pdf

    cs.CR cs.CY

    Human Behaviour as an aspect of Cyber Security Assurance

    Authors: Mark Evans, Leandros A. Maglaras, Ying He, Helge Janicke

    Abstract: There continue to be numerous breaches publicised pertaining to cyber security despite security practices being applied within industry for many years. This article is intended to be the first in a number of articles as research into cyber security assurance processes. This article is compiled based on current research related to cyber security assurance and the impact of the human element on it.… ▽ More

    Submitted 15 January, 2016; originally announced January 2016.

    Comments: 22 pages, 5 Figures

  43. arXiv:1507.02825  [pdf, other

    cs.CR

    Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems

    Authors: Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz

    Abstract: Modern Supervisory Control and Data Acquisition SCADA systems used by the electric utility industry to monitor and control electric power generation, transmission and distribution are recognized today as critical components of the electric power delivery infrastructure. SCADA systems are large, complex and incorporate increasing numbers of widely distributed components. The presence of a real time… ▽ More

    Submitted 16 July, 2015; v1 submitted 10 July, 2015; originally announced July 2015.

    Comments: 25 pages, 15 figures

    MSC Class: 68T05

  44. arXiv:1506.05017  [pdf, other

    cs.CR

    A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks

    Authors: Pavlos Basaras, Leandros Maglaras, Dimitrios Katsaros, Helge Janicke

    Abstract: Vehicular networks have a diverse range of applications that vary from safety, to traffic management and comfort. Vehicular communications (VC) can assist in the ecorouting of vehicles in order to reduce the overall mileage and CO2 emissions by the exchange of data among vehicle-entities. However, the trustworthiness of these data is crucial as false information can heavily affect the performance… ▽ More

    Submitted 25 June, 2015; v1 submitted 16 June, 2015; originally announced June 2015.

    Comments: 8 pages, 8 figures

    MSC Class: 68U20 ACM Class: C.2.1