Skip to main content

Showing 1–7 of 7 results for author: Maglaras, L A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.04874  [pdf, other

    cs.CR

    Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities

    Authors: Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke

    Abstract: Critical National Infrastructure (CNI) encompasses a nation's essential assets that are fundamental to the operation of society and the economy, ensuring the provision of vital utilities such as energy, water, transportation, and communication. Nevertheless, growing cybersecurity threats targeting these infrastructures can potentially interfere with operations and seriously risk national security… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  2. arXiv:1711.00525  [pdf, other

    cs.CR

    Internet of Cloud: Security and Privacy issues

    Authors: Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, Helge Janicke

    Abstract: The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that the… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

    Comments: 27 pages, 4 figures

  3. arXiv:1612.07206  [pdf, other

    cs.CR

    Authentication Protocols for Internet of Things: A Comprehensive Survey

    Authors: Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang

    Abstract: In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT). Specifically, we select and in-detail examine more than forty authentication protocols developed for or applied in the context of the IoT under four environments, including: (1) Machine to machine communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Inte… ▽ More

    Submitted 21 December, 2016; originally announced December 2016.

    Comments: 62 pages, 8 figures

  4. arXiv:1611.07722  [pdf, other

    cs.CR

    A Survey on Privacy-preserving Schemes for Smart Grid Communications

    Authors: Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang

    Abstract: In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications. Specifically, we select and in-detail examine thirty privacy preserving schemes developed for or applied in the context of Smart Grids. Based on the communication and system models, we classify these schemes that are published between 2013 and 2016, in five categories, including, 1) Smart… ▽ More

    Submitted 23 November, 2016; originally announced November 2016.

    Comments: 30 pages, 13 figures, 15 tables

  5. A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development

    Authors: Steve Harrison, Antonis Tzounis, Leandros A. Maglaras, Francois Siewe, Richard Smith, Helge Janicke

    Abstract: This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been used for several years. We discuss the pros and cons of Waterfall before moving onto the Agile Scrum methodology. Agile has been adopted by the majority of Government digital departments including the G… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: 19 pages, 4 figures, International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016

  6. arXiv:1601.03921  [pdf

    cs.CR cs.CY

    Human Behaviour as an aspect of Cyber Security Assurance

    Authors: Mark Evans, Leandros A. Maglaras, Ying He, Helge Janicke

    Abstract: There continue to be numerous breaches publicised pertaining to cyber security despite security practices being applied within industry for many years. This article is intended to be the first in a number of articles as research into cyber security assurance processes. This article is compiled based on current research related to cyber security assurance and the impact of the human element on it.… ▽ More

    Submitted 15 January, 2016; originally announced January 2016.

    Comments: 22 pages, 5 Figures

  7. arXiv:1507.02825  [pdf, other

    cs.CR

    Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems

    Authors: Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz

    Abstract: Modern Supervisory Control and Data Acquisition SCADA systems used by the electric utility industry to monitor and control electric power generation, transmission and distribution are recognized today as critical components of the electric power delivery infrastructure. SCADA systems are large, complex and incorporate increasing numbers of widely distributed components. The presence of a real time… ▽ More

    Submitted 16 July, 2015; v1 submitted 10 July, 2015; originally announced July 2015.

    Comments: 25 pages, 15 figures

    MSC Class: 68T05