• Analysis of the effect of InfoRanking on content pollution in peer-to-peer systems 

      Zhang, Peiqing; Fotiou, Nikos; Helvik, Bjarne Emil; Marias, Giannis F.; Polyzos, George C. (Journal article; Peer reviewed, 2014)
      Content pollution is one of the most common attacks against peer-to-peer file-sharing systems. As such, systems are usually open to users, and the deployed security mechanisms merely examine the sanity of the downloaded ...
    • Augmented Data Selector to Initiate Text-Based CAPTCHA Attack 

      Che, Aolin; Liu, Yalin; Xiao, Hong; Wang, Hao; Zhang, Ke; Dai, Hong-Ning (Peer reviewed; Journal article, 2021)
      In the past decades, due to the low design cost and easy maintenance, text-based CAPTCHAs have been extensively used in constructing security mechanisms for user authentications. With the recent advances in machine/deep ...
    • Combining expert knowledge with automatic feature extraction for reliable web attack detection 

      Torrano-Gimenez, Carmen; Nguyen, Hai Thanh; Alvarez, Gonzalo; Franke, Katrin (Journal article; Peer reviewed, 2012)
      In the detection of web attacks, it is necessary that Web Application Firewalls (WAFs) are effective, at the same time than efficient. In this paper, we propose a new methodology for web attack detection that enhances these ...
    • Integrating Security Mechanisms into Embedded Systems by Domain-specific Modelling 

      Vasilevskaya, Maria; Gunawan, Linda Ariani; Nadjm-Tehrani, Simin; Herrmann, Peter Michael (Journal article; Peer reviewed, 2014)
      Embedded devices are crucial enablers of the Internet of Things and become increasingly common in our daily life. They store, manipulate and transmit sensitive information and, therefore, must be protected against security ...
    • Recent Advancements in Intrusion Detection Systems for the Internet of Things 

      Khan, Zeeshan Ali; Herrmann, Peter (Journal article; Peer reviewed, 2019)
      Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms ...
    • V2X-Based Mobile Localization in 3D Wireless Sensor Network 

      Javed, Iram; Tang, Xianlun; Shaukat, Kamran; Sarwar, Muhammed Umer; Alam, Talha Mahboob; Hameed, Ibrahim A.; Saleem, Muhammad Asim (Peer reviewed; Journal article, 2021)
      In a wireless sensor network (WSN), node localization is a key requirement for many applications. The concept of mobile anchorbased localization is not a new concept; however, the localization of mobile anchor nodes gains ...
    • Why securing smart grids is not just a straightforward consultancy exercise 

      Line, Maria Bartnes (Journal article; Peer reviewed, 2014)
      The long-term vision for modernization of power management and control systems, Smart Grid, is rather complex. It comprises several scientific traditions; SCADA and automation systems, information and communication technology, ...