• A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      ontemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation ...
    • A Survey of QoS Multicast in Ad Hoc Networks 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (Journal article; Peer reviewed, 2010-09-14)
      This survey on Quality of Service (QoS) in multicast ad hoc networks uses a framework based on the mechanisms in three important elements: resource estimations, multicast tree/mesh administration, and multicast routing. ...
    • A Systematic Literature Review on Military Software Defined Networks 

      Gkioulos, Vasileios; Gunleifsen, Håkon; Weldehawaryat, Goitom Kahsay (Journal article; Peer reviewed, 2018)
      Software Defined Networking (SDN) is an evolving network architecture paradigm that focuses on the separation of control and data planes. SDN receives increasing attention both from academia and industry, across a multitude ...
    • Aribc: Online reporting based on identity-based cryptography 

      Goudosis, Athanasios; Katsikas, Sokratis (Peer reviewed; Journal article, 2021)
      The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. ...
    • Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets 

      Spathoulas, Georgios; Giachoudis, Nikolaos; Damiris, Georgios-Paraskevas; Theodoridis, Georgios (Peer reviewed; Journal article, 2019)
      Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high ...
    • Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services. As safety and security have ...
    • EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things 

      Aman, Waqas; Snekkenes, Einar (Journal article; Peer reviewed, 2015)
      In Internet of Things (IoT), the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing ...
    • PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting 

      Kumar, Ajit; Agarwal, Vinti; Kumar Shandilya, Shishir; Shalaginov, Andrii; Upadhyay, Saket; Yadav, Bhawna (Peer reviewed; Journal article, 2020)
      Android malware has become the topmost threat for the ubiquitous and useful Android ecosystem. Multiple solutions leveraging big data and machine-learning capabilities to detect Android malware are being constantly developed. ...
    • Risk Perceptions on Social Media Use in Norway 

      Nyblom, Philip Johannes Brugmans; Wangen, Gaute; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      Social media are getting more and more ingrained into everybody’s lives. With people’s more substantial presence on social media, threat actors exploit the platforms and the information that people share there to deploy ...
    • A Systematic Review of Cybersecurity Risks in Higher Education 

      Ulven, Joachim Bjørge; Wangen, Gaute Bjørklund (Peer reviewed; Journal article, 2021)
      The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive ...
    • A Systematic Review of Cybersecurity Risks in Higher Education 

      Ulven, Joachim Bjørge; Wangen, Gaute Bjørklund (Peer reviewed; Journal article, 2021)
      The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive ...
    • Threat Analysis for Smart Homes 

      Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen (Journal article; Peer reviewed, 2019)
      The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments ...
    • User Modeling Validation Over the Security Awareness of Digital Natives 

      Gkioulos, Vasileios; Wangen, Gaute; Katsikas, Sokratis (Journal article; Peer reviewed, 2017)
      Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices ...
    • Using Financial Instruments to Transfer the Information Security Risks 

      Pandey, Pankaj; Snekkenes, Einar (Journal article; Peer reviewed, 2016)
      For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem ...