59 results

Browsers’ Private Mode: Is It What We Were Promised?

Journal Article
Hughes, K., Papadopoulos, P., Pitropakis, N., Smales, A., Ahmad, J., & Buchanan, W. J. (2021)
Browsers’ Private Mode: Is It What We Were Promised?. Computers, 10(12), Article 165. https://doi.org/10.3390/computers10120165
Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine ...

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

Presentation / Conference
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October)
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online
Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine ...

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT

Journal Article
Almas Khan, M., Khan, M. A., Ullah Jan, S., Ahmad, J., Jamal, S. S., Shah, A. A., …Markakis, E. K. (2021)
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors, 21(21), Article 7016. https://doi.org/10.3390/s21217016
A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely ...

Launching Adversarial Label Contamination Attacks Against Malicious URL Detection

Conference Proceeding
Marchand, B., Pitropakis, N., Buchanan, W. J., & Lambrinoudakis, C. (2021)
Launching Adversarial Label Contamination Attacks Against Malicious URL Detection. In Trust, Privacy and Security in Digital Business: 18th International Conference, TrustBus 2021, Virtual Event, September 27–30, 2021, Proceedings (69-82). https://doi.org/10.1007/978-3-030-86586-3_5
Web addresses, or Uniform Resource Locators (URLs), represent a vector by which attackers are able to deliver a multitude of unwanted and potentially harmful effects to users ...

PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform

Journal Article
Abramson, W., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2021)
PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform. Software Impacts, 9, https://doi.org/10.1016/j.simpa.2021.100101
PyDentity lowers the entry barrier for parties interested in experimenting with the Hyperledger’s verifiable information exchange platform. It enables educators, developers an...

Towards Lightweight URL-Based Phishing Detection

Journal Article
Butnaru, A., Mylonas, A., & Pitropakis, N. (2021)
Towards Lightweight URL-Based Phishing Detection. Future Internet, 13(6), https://doi.org/10.3390/fi13060154
Nowadays, the majority of everyday computing devices, irrespective of their size and operating system, allow access to information and online services through web browsers. Ho...

SANCUS–Towards Unifying the Analysis and Control of Security, Privacy and Service Reliability

Presentation / Conference
Zarakovitis, C., Pitropakis, N., Klonidis, D., & Khalife, H. (2021, June)
SANCUS–Towards Unifying the Analysis and Control of Security, Privacy and Service Reliability. Poster presented at EuCNC & 6G Summit, Grenoble, France
The arrival of new technologies change the global digital landscape in many ways. In the past years, for example, network virtualization and cloud computing have given raise t...

Towards An SDN Assisted IDS

Conference Proceeding
Sutton, R., Ludwiniak, R., Pitropakis, N., Chrysoulas, C., & Dagiuklas, T. (2021)
Towards An SDN Assisted IDS. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)https://doi.org/10.1109/NTMS49979.2021.9432651
Modern Intrusion Detection Systems are able to identify and check all traffic crossing the network segments that they are only set to monitor. Traditional network infrastructu...

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

Journal Article
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021)
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. https://doi.org/10.3390/jcp1020014
As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven In...

A Comparative Analysis of Honeypots on Different Cloud Platforms

Journal Article
Kelly, C., Pitropakis, N., Mylonas, A., McKeown, S., & Buchanan, W. J. (2021)
A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors, 21(7), https://doi.org/10.3390/s21072433
In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The ...
8 results

Information Security Conference & Privacy Conference 2024

2023 - 2025
This project is about the 39th International Conference on ICT Systems Security and Privacy Protection (SEC 2024) organisation. The SEC conferences are a series of well-established international confe...
Funder: Edinburgh Napier Funded

TrueDeploy - CyberASAP 2023-2024 - Phase 1

2023 - 2023
The way in which we develop, supply, and secure software is often weak and lacks digital trust. The dominance of open-source software and the interconnectedness of software between organisations has r...
Funder: Innovate UK | Value: £31,818

TrueDeploy - Scottish Enterprise HGSP Company Creation

2022 - 2024
The way in which we develop, supply, and secure software is often weak and lacks digital trust. The dominance of open-source software and the interconnectedness of software between organisations has r...
Funder: Scottish Enterprise | Value: £198,161

TRUST AND PRIVACY PRESERVING COMPUTING PLATFORM FOR CROSSBORDER FEDERATION OF PERSONAL DATA

2022 - 2025
As we live in a data-driven era, the emergence of interdisciplinary, geographically dispersed, data repositories, is inevitable. The fact that these repositories do not necessarily abide with existing...
Funder: UK Research and Innovation | Value: £310,843

Cyber Hunt

2022 - 2025
Automated Cyberthreat Hunting and Cyber-relevant Incident Response for Critical Infrastructures. CyberHunt will develop highly innovative cybersecurity technologies that can sense, detect, analyse, d...
Funder: The Research Funding Council of Norway | Value: £37,500

TrueDeploy - CyberASAP Phase 1

2022 - 2022
The way in which we develop and supply secure, trusted software is broken. The dominance of open-source software and the interconnectedness of software between organisations has raised cybersecurity r...
Funder: Innovate UK | Value: £31,969

AI-based privacy-preserving biometric authentication with mass-market smart devices

2021 - 2024
Increasingly our identity is key to our online security, and where online services must integrate with these, in order to provide increased levels of trust. But there are now many constraints in how b...
Funder: Data Lab | Value: £65,756

OPTIMSING U>P Security and Anonymised Data Cloud Analysis for Duty of Care and Business Continuity

2020 - 2021
This project will build on the work that has already been done by U>P to develop the MVP (Minimum Viable Product), which delivers people analytics data through active data gathering, and the work done...
Funder: Scottish Funding Council | Value: £15,000

Date