ISEC Research Group

QM412,

University of Greenwich,

Old Royal Naval College,

London, UK

SE109LS

Tel: +44 (0)20 8331 9612

email: g.loukas at gre.ac.uk

 

Publications

Publications of the group from 2014 onwards. Most impact factors are provided by JCR.

Journals

 
 

2019

“Automatic Repair of Timestamp Comparisons” 

Liva Giovanni, Muhammad Taimoor Khan, Martin Pinzger, Francesco Spegni, Luca Spalazzi. IEEE Transactions on Software Engineering, (in press)

IF 2018: 4.778.

 Formal methods   Program analysis  

“A Taxonomy and Survey of Attacks Against Machine Learning” 

Nikolaos Pitropakis, Emmanouil Panaousis, Thanassis Giannetsos, Eleftherios Anastasiadis, George Loukas.

Computer Science Review, (in press)

 Game theory   Machine Learning  

“Indexing of real time geospatial data by IoT enabled devices: Opportunities, challenges, and design considerations” 

Natalia Chaudhry, Muhammad Murtaza Yousaf, Muhammad Taimoor Khan

Journal of Ambient Intelligence and Smart Environments (in press)

IF 2018: 1.186.

 IoT/CPS  

“Security Assessment of Data Management Systems for Cyber Physical System Applications”  

Natalia Chaudhry, Muhammad Murtaza Yousaf, Muhammad Taimoor Khan.

Journal of Software : Evolution and Process (in press)

IF 2018: 1.305.

 IoT/CPS  

"Post-Incident Audits on Cyber Insurance Discounts"
Sakshyam Panda, Daniel W Woods, Aron Laszka,
Andrew Fielder, Emmanouil Panaousis.
Computers & Security, 87:101593, November 2019.

IF 2018: 3.062.

 Game theory   Security economics 

“Distributed Key Management in Microgrids” 

Vaios Bolgouras, Christoforos Ntantogian, Emmanouil PanaousisChristos Xenakis.

IEEE Transactions on Industrial Informatics, September 2019.

IF 2018: 7.377.

 Cryptography   IoT/CPS 

“Security of Cyber Physical Systems: Chaining Induction and Deduction” 

Muhammad Taimoor Khan, Dimitrios Serpanos, Howard Shrobe.

Computer 52(7): 72-75, July 2019.

IF 2018: 3.564.

 Formal methods 

“Runtime Protection of Real-time Critical Control Applications against Known Threats”  

Muhammad Taimoor Khan, Martin Pinzger, Dimitrios Serpanos, Howard Shrobe.

IEEE Design & Test, July 2019.

IF 2018: 3.022.

 IoT/CPS  

“Using Sparse Representation to Detect Anomalies in Complex WSNs”

Xiao Ming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen. 

ACM Transactions on Intelligent Systems and Technology, 2019 (in press).

IF 2018: 2.861.

 IoT/CPS   Machine Learning  

“Semantics-Driven Extraction of Timed Automata from Java Programs”  

Liva Giovanni, Muhammad Taimoor Khan, Martin Pinzger.

Empirical Software Engineering, March 2019.

IF 2019: 4.457, publisher

 Formal methods 

“Apparatus: A Framework for Security Analysis in Internet of Things Systems”

Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis.

Ad Hoc Networks, 92: 101743, September 2019.

IF 2018: 3.490.

 IoT/CPS 

 

"TAW: Cost-Effective Threshold Authentication with Weights for Internet of Things"

Zhenhu Ning, Guangquan Xu, Naixue Xiong, Yongli Yang, Changxiang Shen, Emmanouil Panaousis, Hao Wang, Kaitai Liang. 

IEEE Access, 7: 30112-30125, March 2019.

IF 2018: 4.098.

 Cryptography   IoT/CPS 

 

“A Taxonomy and Survey of Cyber-Physical Intrusion Detection Approaches for Vehicles”

George Loukas, Eirini Karapistoli, Emmanouil Panaousis,

Panagiotis Sarigiannidis, Anatolij Bezemskij, Tuan Vuong.

Ad Hoc Networks, 84: 124-147, March 2019.

IF 2018: 3.490.

 IoT/CPS   Machine Learning  

 

“Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation”

Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen.

Symmetry, 11(2): 272, February 2019.

IF 2018: 2.143.

 Cryptography 

 

 

 

2018

"A taxonomy of cyber-physical threats and impact in the smart home" 

Ryan HeartfieldGeorge Loukas, Sanja Budimir, Anatolij Bezemskij, Johnny Fontaine, 

Avgoustinos Filippoupolitis, Etienne Roesch.

Computers & Security. 2018 Sep 1; 78: 398-428.

IF 2018: 3.062.

 Human factors   IoT/CPS   Machine Learning 

“Designing Safe and Secure Industrial Control Systems: A Tutorial Review”  

Dimitrios Serpanos, Muhammad Taimoor Khan, Howard Shrobe.

IEEE Design & Test, 35(3): 73-88, March 2018.

IF 2018: 3.022.

 IoT/CPS 

“Risk Assessment Uncertainties in Cybersecurity Investments”

Andrew Fielder, Sandra König, Emmanouil Panaousis,

Stefan Schauer, Stefan Rass. 

Games, 9(2): 34, June 2018.

IF 2018: 0.9.

 Game theory   Security economics 

"Blockchain-based Mobile Edge Computing Framework for Secure Therapy Applications"

Md. Abdur Rahman, M. Shamim Hossain, George Loukas, Elham Hassanain, Syed Sadiqur Rahman, Mohammed F. Alhamid, and Mohsen Guizani. 

IEEE Access, 6: 72469 - 72478, November 2018.

IF 2018: 4.098.

 Cryptography   IoT/CPS  

"Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework"

Ryan Heartfield, George Loukas.

Computers & Security, 76: 101-127, July 2018.

IF 2018: 3.062.

 Human factors   Machine Learning 

 

 

 

2017

"Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning".

George Loukas, Tuan Vuong, Ryan Heartfield, Georgia Sakellari, Yongpil Yoon,

Diane Gan.

IEEE Access, 6: 3491 - 3508, December 2017.

IF 2017: 3.557.

 IoT/CPS   Machine Learning  

“An Options Approach to Cybersecurity Investment”

Michail Chronopoulos, Emmanouil Panaousis, Jens Grossklags. 

IEEE Access, 6: 12175-12186, November 2017.

IF 2017: 3.557.

 Security economics 

 

"COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks"

Dionisis Kandris, George Tselikis, Eleftherios Anastasiadis, Emmanouil Panaousis,

Tasos Dagiuklas.

Sensors, 17.11: 2502, October 2017.

IF 2016: 2.677.

 IoT/CPS

"A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols”

Ivana Tomić, Julie A. McCann.

IEEE Internet Things Journal, September 2017.

IF 2017: 5.863.

 IoT/CPS

"A Conceptual Model to Support Security Analysis in the Internet of Things"

Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis,

Christos Kalloniatis. 

Computer Science and Information Systems, 14.2 (2017): 557-578.

 IoT/CPS  

“ARMET: Behavior-based Secure and Resilient Industrial Control Systems”  

Muhammad Taimoor Khan, Dimitrios Serpanos, Howard Shrobe.

Proceedings of the IEEE, 106(1), 129-143, August 2017.

IF 2017: 9.107.

 IoT/CPS 

“A Formally Reliable Cognitive Middleware for the Security of Industrial Control Systems”  

Muhammad Taimoor Khan, Dimitrios Serpanos, Howard Shrobe.

Electronics, 6(58), August 2017.

IF 2018: 2.110.

 IoT/CPS   Formal methods 

"Computation offloading of a vehicle's continuous intrusion detection workload for energy efficiency and performance"

George Loukas, Yongpil Yoon, Georgia Sakellari, Tuan Vuong, Ryan Heartfield.

Simulation Modelling Practice and Theory, 73: 83-94, April 2017.

IF 2018:  2.426

 IoT/CPS   Machine Learning  

"Game Theoretic Path Selection to Support Security in Device-to-Device Communications"

Emmanouil Panaousis, Eirini Karapistoli, Hadeer Elsemary, Tansu Alpcan, MHR Khuzani, Anastasios A. Economides.

Ad Hoc Networks, 56: 28-42, March 2017.

IF 2017: 3.151.

 Game theory   IoT/CPS 

"A Location-Enhanced Activity Recognition in Indoor Environments using Off the Shelf Smart Watch Technology and BLE Beacons"

Avgoustinos Filippoupolitis, William Oliff, Babak Takand, George Loukas.

Sensors, MDPI, 2017.

IF 2017: 2.7.

 IoT/CPS   Localisation   Machine Learning 

 

2016

"You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks"

Ryan Heartfield, George Loukas, Diane Gan

IEEE Access, 6910 - 6928, October 2016.

IF 2016: 3.244.

 Human factors   Machine Learning 

"Neighbour-Disjoint Multipath for Low-Power and Lossy Networks" 

A.K.M. Mahtab Hossain, Cormac J. Sreenan, Rodolfo de Paz Alberola

ACM Transactions on Sensor Networks12(3): 23, August 2016.
IF 2016: 3.58.

 IoT/CPS  

"Decision Support Approaches for Cyber Security Investment"

Andrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin,

Fabrizio Smeraldi. 

Decision Support Systems, 86: 13-23, June 2016.

IF 2016: 3.222.

 Game theory   Security economics 

"A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks"

Ryan Heartfield, George Loukas

ACM Computing Surveys (CSUR), 48(3), 2016.

IF 2016: 6.7.

 Human factors 

"Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history"

David Gresty, Diane Gan, George Loukas, Cos Ierotheou.

Digital Investigation. 2016 Mar; 16:S124-33.

IF 2016: 1.7.

 Forensics

 

2015

"A survey of calibration-free indoor positioning systems"

AKM Mahtab Hossain, Wee-Seng Soh.

Computer Communications, (66) pages: 1-13, 2015. 

IF 2015: 2.099.

 IoT/CPS   Localisation 

2014

"A Hop-Count Based Positioning Algorithm for Wireless Ad-hoc Networks"

Sarita Gurung, A.K.M. Mahtab Hossain, and Kanchana Kanchanasut

Wireless Networks, 20(6): 1431-1444, August 2014. 

IF 2014: 1.43.

 IoT/CPS   Localisation 

Conferences

 
 

2019

“Participatory Location Fingerprinting through Stationary Crowd in a Public or Commercial Indoor Environment”

AKM Mahtab Hossain, George Loukas.

16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.

(MobiQuitous 2019), Houston, United States, November 12 - 14, 2019.

 Localisation  

“Honeypot Type Selection Games for Smart Grid Networks”
Nadia Boumkheld, Sakshyam Panda, Stefan Rass, Emmanouil Panaousis.
10th Conference on Decision and Game Theory for Security.
(GameSec 2019), Stockholm, Sweden,  October 30 - November 1, 2019.

 Game theory   IoT/CPS 

“Cut-The-Rope: A Game of Stealthy Intrusion”
Stefan Rass, Sandra Konig, Emmanouil Panaousis.
10th Conference on Decision and Game Theory for Security.
(GameSec 2019), Stockholm, Sweden, October 30 - November 1, 2019.

 Game theory   IoT/CPS 

“On Synthesis of Runtime Security Monitor for Real-time IoT Applications”

Muhammad Taimoor Khan, Dimitrios Serpanos, Howard Shrobe.

6th International Symposium for ICS & SCADA Cyber Security Research.

(ICS-CSR 2019), Athens, Greece, September 10-12, 2019.

 IoT/CPS   Formal methods 

"Asynchronous Sampling for Decentralized Periodic Event-Triggered Control"

Anqi Fu, Ivana Tomić, Julie A. McCann.

2019 American Control Conference.

(ACC 2019), Philadelphia, USA, July 10-12, 2019.

 Control 

“Attacking IEC-60870-5-104 SCADA Systems”
Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis, Ioannis Giannoulakis, Emmanouil Kafetzakis, Emmanouil Panaousis.
1st IEEE Services Workshop On Cyber Security and Resilience in the Internet of Things.
(CSRIoT 2019), Milan, Italy, July 8 - 9, 2019.

IoT/CPS 

“Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective” (Demo)

Md. Abdur-Rahman, George Loukas, Syed Maruf Abdullah, Areej Abdu, Syed Sadiqur Rahman, Elham Hassanain, Yasmine Arafa.

ACM International Conference on Multimedia Retrieval.

(ICMR 2019), Ottawa, Canada, June 10-13, 2019.

 Cryptography   IoT/CPS 

"Jamming-Resilient Control and Communication Framework for Cyber Physical Systems"

Ivana Tomić, Michael Breza, Julie A. McCann.

2nd Living in the Internet of Things Conference.

(LIOT 2019), London, United Kingdom, May 1-2, 2019.

 IoT/CPS  

 

“Users’ Perceptions and Responses to Cyber-Physical Attacks on IoT Devices in the Home Environment: A Naturalistic Field Experiment”

Nicole Huijts, Antal Haans, Sanja Budimir, Johnny Fontaine, George Loukas, Etienne Roesch, Anatolij Bezemski, Anne-Marie Oostveen, Wijnand IJsselsteijn.

2019 Society for Risk Analysis Benelux Conference.

(SRA-Benelux 2019), Luxembourg City, Luxembourg, March 25-26, 2019.

 Human factors   IoT/CPS 

2018

"Antilizer: Run Time Self-Healing Security for Wireless Sensor Networks"

Ivana Tomić, Po Yu Chen, Michael Breza, Julie A. McCann.

15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.

(MobiQuitous 2018), New York, USA, November 5-7, 2018.

 IoT/CPS 

"LPWA-MAC - A Low Power Wide Area Network MAC Protocol for Cyber-Physical Systems"

Laksh Bhatia, Ivana Tomić, Julie A. McCann.

16th ACM Conference on Embedded Networked Sensor Systems.

(Sensys 2018), Shenzhen, China, November 4-7, 2018.

 IoT/CPS 

“Cyber-Insurance as a Signaling Game: Self-Reporting and External Security Audits”
Aron Laszka, Emmanouil Panaousis, Jens Grossklags.
9th Conference on Decision and Game Theory for Security.
(GameSec 2018), Seattle, WA, USA, October 29 - 31, 2018.

 Game theory   Security economics 

"Highly Assured Safety and Security of e-Health Applications"

Muhammad Taimoor Khan, Dimitrios Serpanos, Howard Shrobe.

14th International Conference on Wireless and Mobile Computing, Networking and Communications.

(WiMob 2018), Limassol, Cyprus, October 15-17, 2018.

“Towards the Definition of a Security Incident Response Modelling Language”
Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis, Michalis Pavlidis, Emmanouil Panaousis.
International Conference on Trust and Privacy in Digital Business.
(TrustBus 2018), Regensburg, Germany, September 5-6, 2018.

"The Limits of LoRaWAN in Event-Triggered Wireless Networked Control Systems"

Ivana Tomić, Laksh Bhatia, Michael Breza, Julie A. McCann.

UKACC 12th International Conference on Control.

(Control 2018), Sheffield, September 5-7, 2018.

 IoT/CPS 

“An Enhanced Cyber Attack Attribution Framework”
Nikolaos Pitropakis, Emmanouil Panaousis, Alkiviadis Giannakoulias, George Kalpakis, Rodrigo Diaz Rodriguez, Panayiotis Sarigiannidis.
15th International Conference on Trust, Privacy & Security in Digital Business.
(TrustBus 2018), Regensburg, Germany, September 5-6, 2018.

"Design and Evaluation of Jamming Resilient Cyber-Physical Systems"

Ivana Tomić, Michael Breza, Greg Jackson, Laksh Bhatia, Julie A. McCann.

IEEE International Conference on Cyber, Physical and Social Computing.

(CPSCom 2018), Halifax, Canada, July 30 - August 3, 2018.

 IoT/CPS 

“Unsupervised Learning for Trustworthy IoT”
Nikhil Banerjee, Thanassis Giannetsos, Emmanouil Panaousis, Clive Cheong Took.
2018 IEEE International Conference on Fuzzy Systems.
(FUZZ 2018), Rio de Janeiro, Brazil, Jul 8-13, 2018.

 IoT/CPS  Machine Learning  

"Modeling Time in Java Programs for Automatic Error Detection"

Giovanni Liva, Muhammad Taimoor Khan, Francesco Spegni, Luca Spalazzi, Andreas Bollin, Martin Pinzger.

6th Conference on Formal Methods in Software Engineering.

(FormaliSE 2018), Gothenburg, Sweden, May 27 - June 3, 2018.

“On the Successful Deployment of Community Policing Services: the TRILLION Project Case”

Charalampos Z. Patrikakis, Dimitrios G. Kogias, George Loukas, Avgoustinos Filippoupolitis, William Oliff, Syed Sadiqur Rahman, Silvio Sorace, Ernesto La Mattina, Quercia Elisabeth.

IEEE International Conference on Consumer Electronics.

(ICCE 2018), Las Vegas, USA January 12-15, 2018.

 

2017

"Extracting Timed Automata from Java Methods”

Giovanni Liva, Muhammad Taimoor Khan, Martin Pinzger.

17th International Working Conference on Source Code Analysis and Manipulation.

(SCAM 2017), Shanghai, China, September 17-18, 2017.

“Selecting Security Mechanisms in Secure Tropos”
Michalis Pavlidis, Haralambos Mouratidis, Emmanouil Panaousis, Nikolaos Argyropoulos.
14th International Conference on Trust, Privacy & Security in Digital Business.
(TrustBus 2017), Lyon, France, August 28-31, 2017.

“ASTo: A Tool for Security Analysis of IoT Systems”
Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis.
1st IEEE SERA Workshop on the Internet of People And Things.
(IPAT 2017), Old Royal Naval College, London, UK, June 7-9, 2017.

 IoT/CPS 

“Security Requirements Modelling for Virtualized 5G Small Cell Networks”
Vassilios G. Vassilakis, Haralambos Mouratidis, Emmanouil Panaousis, Ioannis D. Moscholios, Michael D. Logothetis.
24th International Conference on Telecommunications.
(ICT 2017), Limassol, Cyprus, May, 2017.

“The applicability of Ambient Sensors as Proximity Evidence for NFC Transactions”
Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes.
IEEE Security and Privacy Workshops.
(MOST 2017), San Jose, CA, May 25, 2017.

 IoT/CPS  

2016

 

“Bluetooth Low Energy based Occupancy Detection for Emergency Management”

Avgoustinos Filippoupolitis, William OliffGeorge Loukas.

15th International Conference on Ubiquitous Computing and Communications.

 (IUCC), Granada, Spain, 14-16 Dec. 2016.

 IoT/CPS 

“A Rigorous and Efficient Run-Time Security Monitor for Real-Time Critical Embedded System Applications”

Muhammad Taimoor Khan, Dimitrios Serpanos, Howard Shrobe.

3rd World Forum on Internet of Things.

(WF-IoT 2016), Reston, USA, December 12-14, 2016.

“Activity Recognition in a Home Setting using Off the Shelf Smart Watch Technology”

Avgoustinos Filippoupolitis, Babak Takand, George Loukas.

Smart Ubiquitous Technologies for Human Behaviour Coaching.

(SUTCoaching 2016), Granada, Spain, December 14-16, 2016.

 IoT/CPS 

“Behaviour-based Anomaly Detection of Cyber-Physical Attacks on a Robotic Vehicle”

Anatolij Bezemskij, George Loukas, Richard Anthony, Diane Gan.

8th International Symposium on Cyberspace Safety and Security.

(CSS 2016), Granada, Spain, December 14-16, 2016.

 IoT/CPS   Machine Learning 

“A Safeguard against Fast Self-propagating Malware”

Muhammad Aminu Ahmad, Steve Woodhead, Diane Gan.

6th International Conference on Communication and Network Security.

(ICCNS 2016), Singapore, November 26-29, 2016.

​​“Evaluating Case-based Reasoning Knowledge Discovery in Fraud Detection”

Adeyinka Adedoyin, Stelios Kapetanakis, Miltos Petridis, Emmanouil Panaousis.

24th International Conference in Case-based Reasoning.

(ICCBR 2016), Atlanta, GA, October 31 - November 2, 2016.

“Occupancy Detection for Building Emergency Management using BLE Beacons”

Avgoustinos Filippoupolitis, William OliffGeorge Loukas.

31st International Symposium on Computer and Information Sciences.

(ISCIS 2016), Krakow, Poland, October 27-28, 2016.

 Localisation 

“Energy-efficiency Evaluation of Computation Offloading in Personal Computing”

Yongpil Yoon, Georgia Sakellari, Richard J. Anthony, Avgoustinos Filippoupolitis.

International Symposium on Computer and Information Sciences.

(ISCIS 2016), Krakow, Poland, October 27-28, 2016.

“Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments”Vassilios Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis.

10th WISTP International Conference on Information Security Theory and Practice.

(WISTP 2016), Crete, Greece, September 26-27, 2016.

“Early Containment of Fast Network Worm Malware”

Muhammad Aminu Ahmad, Steve Woodhead, Diane Gan.

3rd National Foundation for Science and Technology Development Conference on Information and Computer Science.

(NICS 2016), Danang, Vietnam, September 14-16, 2016.

“Performance Analysis of Distributed Control Configurations in LQR Multi-Agent System Design”

Ivana Tomić, George D. Halikias.

UKACC 11th International Conference on Control.

(Control 2016), Belfast, United Kingdom, August 31 - September 2, 2016.

“LQR Distributed Cooperative Control of a Formation of Low-Speed Experimental UAVs”

Ivana Tomić, Efstathios Milonidis, George D. Halikias.

UKACC 11th International Conference on Control.

(Control 2016), Belfast, United Kingdom, August 31 - September 2, 2016.

“Threat Evaluation Based on Automatic Sensor Signal Characterisation and Anomaly Detection”

Anatolij Bezemskij, Richard John Anthony, George LoukasDiane Gan.

12th International Conference on Autonomic and Autonomous Systems.

(ICAS 2016), Lisbon, Portugal, June 26-30, 2016.

“Robustness Properties of Distributed Configurations in Multi-Agent Systems”

Ivana Tomić, George D. Halikias.

6th IFAC Symp. on System Structure and Control.

(SSSC 2016), istanbul, Turkey, June 22-24, 2016.

“APPARATUS: Reasoning about Security Requirements in the Internet of Things”
Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis, Christos Kalloniatis.

28th International Conference on Advanced Information Systems Engineering.
(CAiSE 2016), Ljubljana, Slovenia, June 13-17, 2016.

 IoT/CPS 

“A Countermeasure Mechanism for Fast Scanning Malware”

Muhammad Aminu Ahmad, Steve Woodhead, Diane Gan.

International Conference On Cyber Security And Protection Of Digital Services.

(Cyber Security 2016), London, United Kingdom, June 13-14, 2016.

“Evaluating the Reliability of Users as Human Sensors of Social Media Security Threats”

Ryan HeartfieldGeorge Loukas.

2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment.

(CyberSA 2016), London, United Kingdom, June 13-14, 2016.

“The V-network Testbed for Malware Analysis”

Muhammad Aminu Ahmad, Steve Woodhead, Diane Gan.

International Conference on Advanced Communication Control and Computing Technologies.

(ICACCCT 2016), Ramanathapuram, India, May 25-27, 2016.

2015

“Decision Tree-based Detection of Denial of Service and Command Injection attacks on Robotic Vehicles”

Tuan Vuong, George Loukas, Diane Gan, Anatolij Bezemskij.

7th International Workshop on Information Forensics and Security.

(WIFS 2015), Rome, Italy, November 16-19, 2015.

 

“Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle”

Tuan Vuong, George Loukas, Diane Gan.

13th International Conference on Pervasive Intelligence and Computing.

(IEEE-PICOM 2015), Liverpool, United Kingdom, October 26-28, 2015.

“Abstract Data Machine: Data Classifier for Reliable Embedded Systems Software” 

Muhammad Taimoor Khan, Anastasios Fragopoulos, Dimitrios Serpanos, Howard Shrobe.

Workshop on Embedded Systems Security.

(WESS 2015), Amsterdam, Netherlands, October 4 - 9, 2015.

“Game-Theoretic Model of Incentivizing Privacy-aware Users to consent to Location Tracking”
Emmanouil Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan.
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
(IEEE Trustcom/BigDataSE/ISPA 2015), Helsinki, Finland, August 20-22, 2015.

 Game theory   IoT/CPS 

 

“A Game-Theoretic Approach for minimizing Security Risks in the Internet-of-Things”
George Rontidis, Emmanouil Panaousis, Aron Laszka, Tasos Dagiuklas, Pasquale Malacaria, Tansu Alpcan.
2015 IEEE International Conference on Communication Workshop (ICCW).
(IEEE ICC 2015 - IoT/CPS Security), London, United Kingdom, June 8-12, 2015.

 Game theory   IoT/CPS 

2014

 

“Profiling Cyber Attackers using Case-based Reasoning”

Stelios Kapetanakis, Avgoustinos Filippoupolitis, George Loukas, Tariq Saad Al Murayziq.

19th UK Workshop on Case-Based Reasoning.

(UK-CBR 2014), Cambridge, United Kingdom, December 9, 2014.

“Cybersecurity Games and Investments: a Decision Support Approach”
Emmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi.
5th Conference on Decision and Game Theory for Security.
(GameSec 2014), Los Angeles, CA, USA, November 6-7, 2014.

“Secure Message Delivery Games for Device-to-Device Communications”
Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti.
5th Conference on Decision and Game Theory for Security.
(GameSec 2014), Los Angeles, CA, USA, November 6-7, 2014.

“On the Behavioural Formalization of the Cognitive Middleware AWDRAT”

Muhammad Taimoor Khan, Dimitrios Serpanos, and Howard Shrobe.

26th Nordic Workshop on Programming Theory.

(NWPT 2014), Halmstad, Sweden, October 29-31, 2014.

“Towards real-time profiling of human attackers and bot detection”

Avgoustinos Filippoupolitis, George Loukas, Stelios Kapetanakis.

7th International Conference on Cybercrime Forensics Education and Training.

(CFET 2014), Canterbury, United Kingdom, July 10-11 2014.

“Investigation into the Privacy Issues of using Social Media”

Lily R. Jenkins, Diane Gan.

7th International Conference on Cybercrime Forensics Education & Training.

(CFET 2014), Canterbury, United Kingdom, July 10-11,2014. 

“Digital Forensic Analysis of Internet History Using Principal Component Analysis”

David Gresty, Diane Gan, George Loukas.

15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting.

(PGNet 2014), Liverpool, United Kingdom, June 23-24, 2014.

“Designing interactive systems to encourage empathy between users”

Paul Coulton, Jonny Huck, Andrew Hudson-Smith, Ralph Barthel, Panagiotis Mavros, Jennifer Roberts, Philip Powell.

Designing Interactive Systems Conference.

(DIS 2014), Vancouver, Canada, June 21-25, 2014.

“Game Theory meets Information Security Management”

Andrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi.

29th IFIP International Information Security and Privacy Conference.

(IFIP SEC 2014), Marrakech, Morocco, June 2-4, 2014.

“A neighbour disjoint multipath scheme for fault tolerant wireless sensor networks”

AKM Mahtab Hossain, Cormac J. Sreenan, Szymon Fedor.

IEEE International Conference on Distributed Computing in Sensor Systems.

(DCOSS 2014), Marina Del Rey, May 26-28,  2014.

“Physical Indicators of Cyber Attacks Against a Rescue Robot”

Tuan Vuong, Avgoustinos Filippoupolitis, George Loukas, Diane Gan.

IEEE International Conference on Pervasive Computing and Communications.

(PERCOM 2014), Budapest, Hungary, March 24-28, 2014.

Used tags

 Control  Cryptography   Human factors    Game theory   IoT/CPS   Forensics   Formal methods 

  Localisation   Machine Learning   Program analysis   Security economics