39 results

PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme

Conference Proceeding
Yaqub, Z., Yigit, Y., Maglaras, L., Tan, Z., & Wooderson, P. (in press)
PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.
In the rapidly evolving landscape of Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flo...

Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing

Journal Article
Bensaid, R., Labraoui, N., Abba Ari, A. A., Maglaras, L., Saidi, H., Abdu Lwahhab, A. M., & Benfriha, S. (2024)
Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing. Security and Communication Networks, 2024, Article 6651584. https://doi.org/10.1155/2024/6651584
The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in ...

Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing

Journal Article
Lambropoulos, G., Mitropoulos, S., Douligeris, C., & Maglaras, L. (2024)
Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing. Computers, 13(2), Article 54. https://doi.org/10.3390/computers13020054
The widespread adoption of cloud computing has resulted in centralized datacenter structures; however, there is a requirement for smaller-scale distributed infrastructures to ...

Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns

Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (in press)
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. International Journal of Information Security, https://doi.org/10.1007/s10207-023-00809-5
Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches increasing. Firms and their ...

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks

Conference Proceeding
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023)
Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. In 2023 IEEE Globecom Workshops (GC Wkshps). https://doi.org/10.1109/GCWkshps58843.2023.10465218
As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to dep...

Machine Learning for Smart Healthcare Management Using IoT

Book Chapter
Yigit, Y., Duran, K., Moradpoor, N., Maglaras, L., Van Huynh, N., & Canberk, B. (in press)
Machine Learning for Smart Healthcare Management Using IoT. In IoT and ML for Information Management: A Smart Healthcare Perspective. Springer
The convergence of Machine Learning (ML) and the Internet of Things (IoT) has brought about a paradigm shift in healthcare, ushering in a new era of intelligent healthcare man...

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise

Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2023)
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Information and Computer Security, 31(4), 404-426. https://doi.org/10.1108/ICS-05-2022-0085
Purpose This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business'...

IoT: Communication protocols and security threats

Journal Article
Gerodimos, A., Maglaras, L., Ferrag, M. A., Ayres, N., & Kantzavelou, I. (in press)
IoT: Communication protocols and security threats. Internet of Things and Cyber-Physical Systems, https://doi.org/10.1016/j.iotcps.2022.12.003
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. More...

A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing

Journal Article
Babaghayou, M., Chaib, N., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2023)
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing. Sensors, 23(1), Article 531. https://doi.org/10.3390/s23010531
By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), the Internet of Vehicles (IoV) paradigm has attracted the attention of different research and development bo...

An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks

Journal Article
Almomani, I., Ahmed, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (2022)
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks. IEEE Access, 10, 131640-131655. https://doi.org/10.1109/access.2022.3229623
Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets,...

Date


Date


Date


Date