• Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework 

      Oruc, Aybars; Amro, Ahmed Walid; Gkioulos, Vasileios (Journal article; Peer reviewed, 2022)
      Shipping performed by contemporary vessels is the backbone of global trade. Modern vessels are equipped with many computerized systems to enhance safety and operational efficiency. One such system developed is the integrated ...
    • Automatic Verification and Execution of Cyber Attack on IoT Devices 

      Færøy, Fartein Lemjan; Yamin, Muhammad Mudassar; Shukla, Ankur; Katt, Basel (Journal article; Peer reviewed, 2023)
    • Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems 

      Kavallieratos, Georgios; Spathoulas, Georgios; Katsikas, Sokratis (Peer reviewed; Journal article, 2021)
      The increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other ...
    • Hybrid IoT Cyber Range 

      Edvard Balto, Karl; Yamin, Muhammad Mudassar; Shalaginov, Andrii; Katt, Basel (Peer reviewed; Journal article, 2023)
      The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT ...
    • Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems 

      Akbarzadeh, Aida; Katsikas, Sokratis K. (Peer reviewed; Journal article, 2021)
      Contemporary Critical Infrastructures (CIs), such as the power grid, comprise cyber physical systems that are tightly coupled, to form a complex system of interconnected components with interacting dependencies. Modelling ...
    • Light fields for face analysis 

      Galdi, Chiara; Chiesa, Valeria; Busch, Christoph; Correia, Paulo Lobato; Dugelay, Jean-Luc; Guillemot, Christine (Peer reviewed; Journal article, 2019)
      The term “plenoptic” comes from the Latin words plenus (“full”) + optic. The plenoptic function is the 7-dimensional function representing the intensity of the light observed from every position and direction in 3-dimensional ...
    • LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution 

      Bouzidi, Mohammed; Amro, Ahmed Walid; Dalveren, Yaser; Alaya Cheikh, Faouzi; Derawi, Mohammad (Peer reviewed; Journal article, 2023)
      Low-power wide area network (LPWAN) technologies such as IQRF are becoming increasingly popular for a variety of Internet of Things (IoT) applications, including smart cities, industrial control, and home automation. ...
    • Metaheuristic Based Scheduling Meta-Tasks in Distributed Heterogeneous Computing Systems 

      Izakian, Hesam; Abraham, Ajith; Snasel, Vaclav (Journal article; Peer reviewed, 2009)
      Scheduling is a key problem in distributed heterogeneous computing systems in order to benefit from the large computing capacity of such systems and is an NP-complete problem. In this paper, we present a metaheuristic ...
    • Multi-Objective Differential Evolution for Automatic Clustering with Application to Micro-Array Data Analysis 

      Suresh, K; Kundu, D; Ghosh, S; Das, S; Abraham, Ajith; Han, SY (Journal article; Peer reviewed, 2009)
      This paper applies the Differential Evolution (DE) algorithm to the task of automatic fuzzy clustering in a Multi-objective Optimization (MO) framework. It compares the performances of two multi-objective variants of DE ...
    • Optimized Self Organized Sensor Networks 

      Park, Sungyun; Shin, Kwangcheol; Abraham, Ajith; Han, SangYong (Journal article; Peer reviewed, 2007)
      Wireless sensor networks are composed of a huge number of sensor nodes, which have limited resources - energy, memory and computation power. Energies are directly related to the lifetime of sensor network. If sensor nodes ...
    • Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level 

      Yang, Bian; Busch, Christoph; Groot, Koen de; Xu, Haiyun; Veldhuis, Raymond N.J. (Journal article; Peer reviewed, 2012)
      In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a ...
    • Performance evaluation of hybrid crowdsensing and fixed sensor systems for event detection in urban environments 

      Hirth, Matthias; Seufert, Michael; Lange, Stanislav; Meixner, Markus; Tran-Gia, Phuoc (Journal article; Peer reviewed, 2021)
      Crowdsensing offers a cost-effective way to collect large amounts of environmental sensor data; however, the spatial distribution of crowdsensing sensors can hardly be influenced, as the participants carry the sensors, ...
    • A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric 

      Stamatellis, Charalampos; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Katsikas, Sokratis; Buchanan, William (Peer reviewed; Journal article, 2020)
      Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record ...
    • Probabilistic Deep Learning to Quantify Uncertainty in Air Quality Forecasting 

      Murad, Abdulmajid; Kraemer, Frank Alexander; Bach, Kerstin; Taylor, Gavin (Peer reviewed; Journal article, 2021)
      Data-driven forecasts of air quality have recently achieved more accurate short-term predictions. However, despite their success, most of the current data-driven solutions lack proper quantifications of model uncertainty ...
    • RESPOnSE—A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments 

      Michailidou, Christina; Gkioulos, Vasileios; Shalaginov, Andrii; Rizos, Athanasios; Saracino, Andrea (Peer reviewed; Journal article, 2020)
      The enforcement of fine-grained access control policies in constrained dynamic networks can become a challenging task. The inherit constraints present in those networks, which result from the limitations of the edge devices ...
    • Robust Identification and Segmentation of the Outer Skin Layers in Volumetric Fingerprint Data 

      Kirfel, Alexander; Scheer, Tobias; Jung, Norbert; Busch, Christoph (Peer reviewed; Journal article, 2022)
      Despite the long history of fingerprint biometrics and its use to authenticate individuals, there are still some unsolved challenges with fingerprint acquisition and presentation attack detection (PAD). Currently available ...
    • A Survey of 802.15.4 TSCH Schedulers for a Standardized Industrial Internet of Things 

      Urke, Andreas Ramstad; Kure, Øivind; Øvsthus, Knut (Peer reviewed; Journal article, 2021)
      Concepts such as Industry 4.0 and Cyber-Physical Systems may bring forward a new industrial revolution. These concepts require extensive connectivity far beyond what is provided by traditional industrial networks. The ...
    • Towards secure, decentralised, and privacy friendly forensic analysis of vehicular data 

      Negka, Lydia; Spathoulas, Georgios (Journal article; Peer reviewed, 2021)
    • Tracing your smart-home devices conversations: A real world iot traffic data-set 

      Anagnostopoulos, Marios; Spathoulas, Georgios; Viaño, Brais; Augusto-Gonzalez, Javier (Peer reviewed; Journal article, 2020)
      Smart-home installations exponential growth has raised major security concerns. To this direction, the GHOST project, a European Union Horizon 2020 Research and Innovation funded project, aims to develop a reference ...