9 results

A novel Two-Factor HoneyToken Authentication Mechanism

Conference Proceeding
Papaspirou, V., Maglaras, L., Ferrag, M. A., Kantzavelou, I., Janicke, H., & Douligeris, C. (2021)
A novel Two-Factor HoneyToken Authentication Mechanism. In 2021 International Conference on Computer Communications and Networks (ICCCN). https://doi.org/10.1109/icccn52240.2021.9522319
The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, reg...

Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper

Conference Proceeding
Sarker, I. H., Janicke, H., Maglaras, L., & Camtepe, S. (2024)
Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper. In Advanced Research in Technologies, Information, Innovation and Sustainability (ARTIIS 2023), Proceedings, Part II (302-316). https://doi.org/10.1007/978-3-031-48855-9_23
As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today’s digital era. Traditional security measures ...

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks

Conference Proceeding
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023)
Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. In 2023 IEEE Globecom Workshops (GC Wkshps). https://doi.org/10.1109/GCWkshps58843.2023.10465218
As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to dep...

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis

Conference Proceeding
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (in press)
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. In 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)

SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles

Conference Proceeding
Babaghayou, M., Labraoui, N., Ari, A. A. A., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2022)
SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles. In CROWNCOM 2021, WiCON 2021: Cognitive Radio Oriented Wireless Networks and Wireless Internet (343-360). https://doi.org/10.1007/978-3-030-98002-3_25
The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhanc...

PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme

Conference Proceeding
Yaqub, Z., Yigit, Y., Maglaras, L., Tan, Z., & Wooderson, P. (in press)
PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.
In the rapidly evolving landscape of Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flo...

Reliability Analysis of Fault Tolerant Memory Systems

Conference Proceeding
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023)
Reliability Analysis of Fault Tolerant Memory Systems. In 2023 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). https://doi.org/10.1109/SEEDA-CECNSM61561.2023.10470763
This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The...

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records

Conference Proceeding
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (in press)
Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.

Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario

Conference Proceeding
Adesanya, O. M., Moradpoor, N., Maglaras, L., Lim, I. S., & Ferrag, M. A. (in press)
Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario.