Leandros Maglaras
leandros maglaras

Prof Leandros Maglaras

Professor

Biography

Dr. Leandros A. Maglaras is a professor of cybersecurity in the School of Computing at Edinburgh Napier University. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained a B.Sc. (M.Sc. equivalent) in Electrical and Computer Engineering from the Aristotle University of Thessaloniki, Greece in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004, and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from the University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield He is featured in Stanford University's list of the world’s Top 2% scientists. He is a Senior Member of the Institute of Electrical & Electronics Engineers (IEEE) and is an author of more than 200 papers in scientific magazines and conferences.

Esteem

Editorial Activity

  • Section Editor in Chief for MDPI Computers
  • Associate Editor for Journal of Information Processing Systems (JIPS)
  • Associate Editor for Journal of Surveillance, Security and Safety (JSSS)
  • Section Editor of Communications and Security for IntechOpen Journal for Computer science, Artificial intelligence and robotics
  • Associate Editor for IEEE Access
  • Executive Editor for Elsevier ICT Express

 

Media Activity

  • Interview - Meet the talent - 4i magazine

 

Visiting Positions

  • Visiting Professor at De Montfort University

 

Date


71 results

Developing cyber peacekeeping: Observation, monitoring and reporting

Journal Article
Robinson, M., Jones, K., Janicke, H., & Maglaras, L. (2019)
Developing cyber peacekeeping: Observation, monitoring and reporting. Government Information Quarterly, 36(2), 276-293. https://doi.org/10.1016/j.giq.2018.12.001
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber warfare increasingly becoming part of future conflicts, new and novel solution...

Blockchain Technologies for the Internet of Things: Research Issues and Challenges

Journal Article
Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2019)
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet of Things, 6(2), 2188-2204. https://doi.org/10.1109/jiot.2018.2882794
This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizi...

HEART-IS: A novel technique for evaluating human error-related information security incidents

Journal Article
Evans, M., He, Y., Maglaras, L., & Janicke, H. (2019)
HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers and Security, 80, 74-89. https://doi.org/10.1016/j.cose.2018.09.002
Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to in...

Vulnerability Analysis of Network Scanning on SCADA Systems

Journal Article
Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018)
Vulnerability Analysis of Network Scanning on SCADA Systems. Security and Communication Networks, 2018, Article 3794603. https://doi.org/10.1155/2018/3794603
Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructur...

Authentication Protocols for Internet of Things: A Comprehensive Survey

Journal Article
Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., & Shu, L. (2017)
Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks, 2017, Article 6562953. https://doi.org/10.1155/2017/6562953
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed fo...

The industrial control system cyber defence triage process

Journal Article
Cook, A., Janicke, H., Smith, R., & Maglaras, L. (2017)
The industrial control system cyber defence triage process. Computers and Security, 70, 467-481. https://doi.org/10.1016/j.cose.2017.07.009
The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats i...

Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems

Journal Article
Yousaf, A., Loan, A., Babiceanu, R. F., Maglaras, L., & Yousaf, O. (2017)
Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. Computers and Security, 70, 124-143. https://doi.org/10.1016/j.cose.2017.05.011
In this paper an analysis of physical layer intruders, for direct sequence spread spectrum systems, is presented. Physical layer intruders are traditional jammers that do not ...

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System

Journal Article
Cook, A., Smith, R. G., Maglaras, L., & Janicke, H. (2017)
SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. International Journal of Cyber Warfare and Terrorism, 7(2), Article 1. https://doi.org/10.4018/ijcwt.2017040101
The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives o...

MIMO Techniques for Jamming Threat Suppression in Vehicular Networks

Journal Article
Kosmanos, D., Prodromou, N., Argyriou, A., Maglaras, L. A., & Janicke, H. (2016)
MIMO Techniques for Jamming Threat Suppression in Vehicular Networks. Mobile Information Systems, 2016, Article 8141204. https://doi.org/10.1155/2016/8141204
Vehicular ad hoc networks have emerged as a promising field of research and development, since they will be able to accommodate a variety of applications, ranging from infotai...

Human behaviour as an aspect of cybersecurity assurance

Journal Article
Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016)
Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667-4679. https://doi.org/10.1002/sec.1657
There continue to be numerous breaches publicised pertaining to cybersecurity despite security practices being applied within industry for many years. This paper is intended t...

Current Post Grad projects