default search action
Leandros Maglaras
Person information
- affiliation: De Montfort University, School of Computer Science and Informatics, Leicester, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c59]Yagmur Yigit, Kitty Kioskli, Laura Bishop, Nestoras Chouliaras, Leandros Maglaras, Helge Janicke:
Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins. WoWMoM 2025: 24-32 - 2024
- [j91]Georgios Lambropoulos, Sarandis Mitropoulos, Christos Douligeris, Leandros Maglaras:
Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing. Comput. 13(2): 54 (2024) - [j90]Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, Asif Gill, Leandros Maglaras:
Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects. ICT Express 10(4): 935-958 (2024) - [j89]Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras:
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. Int. J. Inf. Sec. 23(3): 1679-1693 (2024) - [j88]Yagmur Yigit, Leandros A. Maglaras, William J. Buchanan, Berk Canberk, Hyundong Shin, Trung Q. Duong:
AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks. IEEE Internet Things J. 11(22): 36168-36181 (2024) - [j87]Md. Zubair, Helge Janicke, Ahmad Mohsin, Leandros Maglaras, Iqbal H. Sarker:
Automated Sensor Node Malicious Activity Detection with Explainability Analysis. Sensors 24(12): 3712 (2024) - [c58]Vassilis Papaspirou, Ioanna Kantzavelou, Yagmur Yigit, Leandros Maglaras, Sokratis K. Katsikas:
A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism. ARES 2024: 46:1-46:9 - [c57]Zohaib Yaqub, Yagmur Yigit, Leandros Maglaras, Zhiyan Tan, Paul Wooderson:
PULRAS: A Novel PUF-based Lightweight Robust Authentication Scheme. DCOSS-IoT 2024: 430-439 - [c56]Md Shahed Islam Noyon, Naghmeh Moradpoor, Leandros Maglaras, Jawad Ahmad:
Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records. DCOSS-IoT 2024: 516-523 - [c55]Olanrewaju Mueez Adesanya, Naghmeh Moradpoor, Leandros Maglaras, Ik Soo Lim, Mohamed Amine Ferrag:
Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario. DCOSS-IoT 2024: 556-563 - [c54]Yagmur Yigit, Ioannis Panitsas, Leandros Maglaras, Leandros Tassiulas, Berk Canberk:
Cyber-Twin: Digital Twin-Boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks. ICC 2024: 2167-2172 - [c53]Aydin E. Homay, Christos Chrysoulas, Tess Watt, Martin Wollschlaeger, Mário de Sousa, Leandros Maglaras:
Broker-Less OPC UA PubSub Communication Model Performance Analysis. ICT 2024: 1-5 - [e2]Leandros A. Maglaras, Christos Douligeris:
Wireless Internet - 16th EAI International Conference, WiCON 2023, Athens, Greece, December 15-16, 2023, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 527, Springer 2024, ISBN 978-3-031-58052-9 [contents] - [i46]Yagmur Yigit, Ioannis Panitsas, Leandros Maglaras, Leandros Tassiulas, Berk Canberk:
Cyber-Twin: Digital Twin-boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks. CoRR abs/2401.14005 (2024) - [i45]Yagmur Yigit, William J. Buchanan, Madjid G. Tehrani, Leandros Maglaras:
Review of Generative AI Methods in Cybersecurity. CoRR abs/2403.08701 (2024) - [i44]Salko Korac, Leandros Maglaras, Naghmeh Moradpoor, Bill Buchanan, Berk Canberk:
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems. CoRR abs/2403.17571 (2024) - [i43]Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke:
Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities. CoRR abs/2405.04874 (2024) - [i42]Mohammad Amaz Uddin, Muhammad Nazrul Islam, Leandros Maglaras, Helge Janicke, Iqbal H. Sarker:
ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis. CoRR abs/2405.08026 (2024) - [i41]Ahmad Mohsin, Helge Janicke, Adrian Wood, Iqbal H. Sarker, Leandros Maglaras, Naeem Janjua:
Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs. CoRR abs/2406.12513 (2024) - [i40]Hamish Alsop, Douglas Alsop, Joseph Solomon, Liam Aumento, Mark Butters, Cameron Millar, Yagmur Yigit, Leandros Maglaras, Naghmeh Moradpoor:
ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality. CoRR abs/2409.04457 (2024) - [i39]Abdulaziz Gulay, Leandros Maglaras:
Alignment of Cybersecurity Incident Prioritisation with Incident Response Management Maturity Capabilities. CoRR abs/2410.02259 (2024) - [i38]Amanda Thomson, Leandros Maglaras, Naghmeh Moradpoor:
A novel TLS-based Fingerprinting approach that combines feature expansion and similarity mapping. CoRR abs/2410.03817 (2024) - 2023
- [j86]Metty Paul, Leandros Maglaras, Mohamed Amine Ferrag, Iman M. Almomani:
Digitization of healthcare sector: A study on privacy and security concerns. ICT Express 9(4): 571-588 (2023) - [j85]Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras:
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Inf. Comput. Secur. 31(4): 404-426 (2023) - [j84]Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke:
A Novel Authentication Method That Combines Honeytokens and Google Authenticator. Inf. 14(7): 386 (2023) - [j83]Mohamed Amine Ferrag, Leandros Maglaras, Mohamed Benbouzid:
Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications. J. Sens. Actuator Networks 12(3): 40 (2023) - [j82]Nestoras Chouliaras, Ioanna Kantzavelou, Leandros Maglaras, Grammati E. Pantziou, Mohamed Amine Ferrag:
A novel autonomous container-based platform for cybersecurity training and research. PeerJ Comput. Sci. 9: e1574 (2023) - [j81]Messaoud Babaghayou, Noureddine Chaib, Nasreddine Lagraa, Mohamed Amine Ferrag, Leandros Maglaras:
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing. Sensors 23(1): 531 (2023) - [j80]Abdelouahid Derhab, Omar Cheikhrouhou, Azza Allouch, Anis Koubaa, Basit Qureshi, Mohamed Amine Ferrag, Leandros Maglaras, Farrukh Aslam Khan:
Internet of drones security: Taxonomies, open issues, and future directions. Veh. Commun. 39: 100552 (2023) - [j79]Marwa Ahmim, Ahmed Ahmim, Mohamed Amine Ferrag, Nacira Ghoualmi-Zine, Leandros Maglaras:
ESIKE: An Efficient and Secure Internet Key Exchange Protocol. Wirel. Pers. Commun. 128(2): 1309-1324 (2023) - [c52]Andrew Thaeler, Yagmur Yigit, Leandros Maglaras, William J. Buchanan, Naghmeh Moradpoor, Gordon Russell:
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. CAMAD 2023: 170-175 - [c51]Sam Grierson, William J. Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras, Chris Eckl:
Scalable Multi-domain Trust Infrastructures for Segmented Networks. CAMAD 2023: 182-187 - [c50]Sam Grierson, Konstantinos Chalkias, William J. Buchanan, Leandros Maglaras:
Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations. CAMAD 2023: 194-199 - [c49]Mohamed Amine Ferrag, Djallel Hamouda, Mérouane Debbah, Leandros Maglaras, Abderrahmane Lakas:
Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things. DCOSS-IoT 2023: 196-200 - [c48]Naghmeh Moradpoor, Leandros Maglaras, Ezra Abah, Andres Robles-Durazno:
The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System. DCOSS-IoT 2023: 453-460 - [c47]William J. Buchanan, Leandros Maglaras:
Review of the NIST Light-Weight Cryptography Finalists. DCOSS-IoT 2023: 469-474 - [c46]Yagmur Yigit, Christos Chrysoulas, Gökhan Yurdakul, Leandros Maglaras, Berk Canberk:
Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. GLOBECOM (Workshops) 2023: 178-183 - [c45]Yagmur Yigit, Leandros Maglaras, Mohamed Amine Ferrag, Naghmeh Moradpoor, Georgios Lambropoulos:
Reliability Analysis of Fault Tolerant Memory Systems. SEEDA-CECNSM 2023: 1-6 - [c44]Messaoud Babaghayou, Noureddine Chaib, Leandros Maglaras, Yagmur Yigit, Mohamed Amine Ferrag, Carol Marsh:
Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing. WiCON 2023: 29-44 - [d2]Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Yagmur Yigit, Leandros Maglaras:
RF Jamming Dataset for Vehicular Wireless Networks. IEEE DataPort, 2023 - [i37]William J. Buchanan, Leandros Maglaras:
Review of the NIST Light-weight Cryptography Finalists. CoRR abs/2303.14785 (2023) - [i36]Mohamed Amine Ferrag, Djallel Hamouda, Mérouane Debbah, Leandros Maglaras, Abderrahmane Lakas:
Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things. CoRR abs/2304.05644 (2023) - [i35]Vassilis Papaspirou, Leandros Maglaras, Ioanna Kantzavelou, Naghmeh Moradpoor, Sokratis K. Katsikas:
A Blockchain-based two Factor Honeytoken Authentication System. CoRR abs/2307.05047 (2023) - [i34]Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe:
Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper. CoRR abs/2308.05126 (2023) - [i33]Yagmur Yigit, Christos Chrysoulas, Gökhan Yurdakul, Leandros Maglaras, Berk Canberk:
Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. CoRR abs/2310.03554 (2023) - [i32]Sam Grierson, William J. Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras, Chris Eckl:
Scalable Multi-domain Trust Infrastructures for Segmented Networks. CoRR abs/2310.04898 (2023) - [i31]Yagmur Yigit, Leandros Maglaras, Mohamed Amine Ferrag, Naghmeh Moradpoor, Georgios Lambropoulos:
Reliability Analysis of Fault Tolerant Memory Systems. CoRR abs/2311.12849 (2023) - [i30]Messaoud Babaghayou, Noureddine Chaib, Leandros Maglaras, Yagmur Yigit, Mohamed Amine Ferrag:
Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing. CoRR abs/2311.14308 (2023) - [i29]Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Leandros Maglaras, Hafida Saidi, Ahmed Mahmoud Abdu Lwahhab, Sihem Benfriha:
Toward a real-time TCP SYN Flood DDoS mitigation using Adaptive Neuro-Fuzzy classifier and SDN Assistance in Fog Computing. CoRR abs/2311.15633 (2023) - 2022
- [j78]Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke:
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access 10: 40281-40306 (2022) - [j77]Hafida Saidi, Nabila Labraoui, Ado Adamou Abba Ari, Leandros A. Maglaras, Joel Herve Mboussam Emati:
DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data. IEEE Access 10: 101011-101028 (2022) - [j76]Iman M. Almomani, Mohanned Ahmed, Dimitrios Kosmanos, Aala Alkhayer, Leandros Maglaras:
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks. IEEE Access 10: 131640-131655 (2022) - [j75]Leandros A. Maglaras, Mohamed Amine Ferrag, Helge Janicke, Nick Ayres, Leandros Tassiulas:
Reliability, Security, and Privacy in Power Grids. Computer 55(9): 85-88 (2022) - [j74]Pavlina Fragkou, Leandros Maglaras:
Transforming Points of Single Contact Data into Linked Data. Comput. 11(8): 122 (2022) - [j73]Leandros Maglaras:
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity. Comput. 11(11): 159 (2022) - [j72]Othmane Friha, Mohamed Amine Ferrag, Leandros Maglaras, Lei Shu:
Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends. IEEE Internet Things Mag. 5(3): 82-90 (2022) - [j71]Othmane Friha, Mohamed Amine Ferrag, Lei Shu, Leandros Maglaras, Kim-Kwang Raymond Choo, Mehdi Nafaa:
FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. J. Parallel Distributed Comput. 165: 17-31 (2022) - [j70]Ioanna Kantzavelou, Leandros Maglaras, Panagiotis F. Tzikopoulos, Sokratis K. Katsikas:
A multiplayer game model to detect insiders in wireless sensor networks. PeerJ Comput. Sci. 8: e791 (2022) - [j69]Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag:
Cybersecurity of Critical Infrastructures: Challenges and Solutions. Sensors 22(14): 5105 (2022) - [c43]Vytenis Sliogeris, Leandros Maglaras, Sotiris Moschoyiannis:
Inferring Probabilistic Boolean Networks from Steady-State Gene Data Samples. COMPLEX NETWORKS (1) 2022: 289-300 - [c42]Jack Edwards, Francisco J. Aparicio-Navarro, Leandros Maglaras, Christos Douligeris:
FFDA: A novel Four-Factor Distributed Authentication mechanism. CSR 2022: 376-381 - [c41]Leandros Maglaras, Nick Ayres, Sotiris Moschoyiannis, Leandros Tassiulas:
The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms. INFOCOM Workshops 2022: 1-2 - [c40]Christos Tselikis, Christos Douligeris, Sarandis Mitropoulos, Leandros Maglaras:
Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications. ISCC 2022: 1-3 - [c39]Nithish Velagala, Leandros Maglaras, Nick Ayres, Sotiris Moschoyiannis, Leandros Tassiulas:
Enhancing Privacy of Online Chat Apps Utilising Secure Node End-to-End Encryption (SNE2EE). ISCC 2022: 1-3 - [c38]Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke:
Security Revisited: Honeytokens meet Google Authenticator. SEEDA-CECNSM 2022: 1-8 - [d1]Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke:
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning. IEEE DataPort, 2022 - [i28]Baadr Suleman M. Alwheepy, Leandros Maglaras, Nick Ayres:
A Health Focused Text Classification Tool (HFTCT). CoRR abs/2211.01332 (2022) - [i27]Vytenis Sliogeris, Leandros Maglaras, Sotiris Moschoyiannis:
Inferring probabilistic Boolean networks from steady-state gene data samples. CoRR abs/2211.05935 (2022) - 2021
- [j68]Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu:
Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access 9: 138509-138542 (2021) - [j67]Othmane Friha, Mohamed Amine Ferrag, Lei Shu, Leandros Maglaras, Xiaochan Wang:
Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies. IEEE CAA J. Autom. Sinica 8(4): 718-752 (2021) - [j66]Merzougui Salah Eddine, Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras:
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles. J. Inf. Secur. Appl. 59: 102802 (2021) - [j65]Iman M. Almomani, Mohanned Ahmed, Leandros Maglaras:
Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Comput. Sci. 7: e703 (2021) - [j64]Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras:
RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks. Secur. Commun. Networks 2021: 9959310:1-9959310:16 (2021) - [j63]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke:
WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors 21(7): 2443 (2021) - [j62]Najmudin Saqib, Vasileios Germanos, Wen Zeng, Leandros Maglaras:
Mapping of the Security Requirements of GDPR and NISD. EAI Endorsed Trans. Security Safety 7(24): e2 (2021) - [c37]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Nasreddine Lagraa, Mohamed Amine Ferrag, Leandros Maglaras:
SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles. CrownCom/WiCON 2021: 343-360 - [c36]Maria Papathanasaki, Panagiotis Fountas, Leandros Maglaras, Christos Douligeris, Mohamed Amine Ferrag:
Quantum Cryptography in Maritime Telecommunications. CSR 2021: 530-535 - [c35]Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris:
A novel Two-Factor HoneyToken Authentication Mechanism. ICCCN 2021: 1-7 - [c34]Messaoud Babaghayou, Nabila Labraoui, Mohamed Amine Ferrag, Leandros Maglaras:
Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles. ICCE 2021: 1-5 - [c33]Ray Walshe, Ansgar Koene, Sabine Baumann, Massimo Panella, Leandros Maglaras, Francisco Petrônio Alencar de Medeiros:
Artificial Intelligence as Enabler for Sustainable Development. ICE/ITMC 2021: 1-7 - [c32]Vasileios Dimitriadis, Leandros Maglaras, Nineta Polemi, Ioanna Kantzavelou, Nick Ayres:
Uncuffed: A Blockchain-based Secure Messaging System. PCI 2021: 340-345 - [c31]David Holmes, Maria Papathanasaki, Leandros Maglaras, Mohamed Amine Ferrag, Surya Nepal, Helge Janicke:
Digital Twins and Cyber Security - solution or challenge? SEEDA-CECNSM 2021: 1-8 - [c30]Taha Abdelgalil, Vasileios Manolas, Leandros Maglaras, Ioanna Kantzavelou, Mohamed Amine Ferrag:
Blockchain Technology: A case study in supply chain management. TPS-ISA 2021: 331-339 - [i26]Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke:
Cybersecurity Revisited: Honeytokens meet Google Authenticator. CoRR abs/2112.08431 (2021) - 2020
- [j61]Mohamed Amine Ferrag, Lei Shu, Xing Yang, Abdelouahid Derhab, Leandros Maglaras:
Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges. IEEE Access 8: 32031-32053 (2020) - [j60]Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Aparicio-Navarro, Antonios Argyriou, Helge Janicke:
A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles. Array 5: 100013 (2020) - [j59]Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim, Makhlouf Derdour, Helge Janicke:
RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet 12(3): 44 (2020) - [j58]James Howden, Leandros Maglaras, Mohamed Amine Ferrag:
The Security Aspects of Automotive Over-the-Air Updates. Int. J. Cyber Warf. Terror. 10(2): 64-81 (2020) - [j57]Mohamed Amine Ferrag, Leandros Maglaras, Sotiris Moschoyiannis, Helge Janicke:
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50 (2020) - [j56]Kevin I. Jones, Helge Janicke, Leandros Maglaras, Christos Xenakis:
Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems". J. Inf. Secur. Appl. 54: 102542 (2020) - [j55]Christos Tselikis, Christos Douligeris, Leandros Maglaras, Sarandis Mitropoulos:
On the conference key distribution system with user anonymity. J. Inf. Secur. Appl. 54: 102556 (2020) - [j54]Leandros Maglaras, Tiago Cruz, Mohamed Amine Ferrag, Helge Janicke:
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technol. Lett. 3(1) (2020) - [j53]Ioannis Vourgidis, Leandros Maglaras, Ahmed S. Alfakeeh, Ali H. Al-Bayatti, Mohamed Amine Ferrag:
Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems. Sensors 20(4): 997 (2020) - [j52]Abdelouahid Derhab, Abdelghani Bouras, Mohamed Belaoued, Leandros Maglaras, Farrukh Aslam Khan:
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors 20(21): 6106 (2020) - [j51]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke:
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues. Telecommun. Syst. 73(2): 317-348 (2020) - [j50]Mohamed Amine Ferrag, Leandros Maglaras:
DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids. IEEE Trans. Engineering Management 67(4): 1285-1297 (2020) - [c29]Stavros Kassaras, Leandros Maglaras:
ZKPs: Does This Make the Cut? CERC 2020: 152-163 - [c28]George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook, Helge Janicke:
A NIS Directive Compliant Cybersecurity Maturity Assessment Framework. COMPSAC 2020: 1641-1646 - [c27]Dimitrios Kosmanos, Savvas Chatzisavvas, Antonios Argyriou, Leandros Maglaras:
Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks. CyberICPS/SECPRE/ADIoT@ESORICS 2020: 205-223 - [c26]Maria Papathanasaki, Georgios Dimitriou, Leandros Maglaras, Ismini Vasileiou, Helge Janicke:
From Cyber Terrorism to Cyber Peacekeeping: Are we there yet? PCI 2020: 334-339 - [c25]Dimitrios Tsiostas, George Kittes, Nestoras Chouliaras, Ioanna Kantzavelou, Leandros Maglaras, Christos Douligeris, Vasileios Vlachos:
The Insider Threat: Reasons, Effects and Mitigation Techniques. PCI 2020: 340-345 - [c24]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Mohamed Amine Ferrag, Leandros Maglaras:
The Impact of the Adversary's Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles. SEEDA-CECNSM 2020: 1-6 - [i25]Dimitrios Kosmanos, Savvas Chatzisavvas, Antonios Argyriou, Leandros Maglaras:
Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks. CoRR abs/2004.09909 (2020) - [i24]George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook, Helge Janicke:
A NIS Directive compliant Cybersecurity Maturity Assessment Framework. CoRR abs/2004.10411 (2020) - [i23]Stavros Kassaras, Leandros Maglaras:
ZKPs: Does This Make The Cut? Recent Advances and Success of Zero-Knowledge Security Protocols. CoRR abs/2006.09990 (2020) - [i22]Maria Papathanasaki, Georgios Dimitriou, Leandros Maglaras, Ismini Vasileiou, Helge Janicke:
From Cyber Terrorism to Cyber Peacekeeping: Are we there yet? CoRR abs/2010.07041 (2020) - [i21]Fraser Hall, Leandros Maglaras, Theodoros Aivaliotis, Loukas Xagoraris, Ioanna Kantzavelou:
Smart Homes: Security Challenges and Privacy Concerns. CoRR abs/2010.15394 (2020) - [i20]Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke:
A novel Two-Factor HoneyToken Authentication Mechanism. CoRR abs/2012.08782 (2020)
2010 – 2019
- 2019
- [j49]Mark Glenn Evans, Ying He, Cunjin Luo, Iryna Yevseyeva, Helge Janicke, Leandros A. Maglaras:
Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form. IEEE Access 7: 102087-102101 (2019) - [j48]Mark Glenn Evans, Ying He, Cunjin Luo, Iryna Yevseyeva, Helge Janicke, Efpraxia D. Zamani, Leandros A. Maglaras:
Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique. IEEE Access 7: 142147-142175 (2019) - [j47]Mark Glenn Evans, Ying He, Leandros A. Maglaras, Helge Janicke:
HEART-IS: A novel technique for evaluating human error-related information security incidents. Comput. Secur. 80: 74-89 (2019) - [j46]Mohamed Amine Ferrag, Leandros A. Maglaras:
DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services. Comput. 8(3): 58 (2019) - [j45]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros A. Maglaras:
Developing cyber peacekeeping: Observation, monitoring and reporting. Gov. Inf. Q. 36(2): 276-293 (2019) - [j44]Mark Glenn Evans, Ying He, Leandros A. Maglaras, Iryna Yevseyeva, Helge Janicke:
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. Int. J. Medical Informatics 127: 109-119 (2019) - [j43]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros A. Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet Things J. 6(2): 2188-2204 (2019) - [j42]Dimitrios Kosmanos, Antonios Argyriou, Leandros A. Maglaras:
Estimating the Relative Speed of RF Jammers in VANETs. Secur. Commun. Networks 2019: 2064348:1-2064348:18 (2019) - [j41]Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab:
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. Secur. Commun. Networks 2019: 5452870:1-5452870:20 (2019) - [j40]Abdelouahid Derhab, Mohamed Guerroumi, Abdu Gumaei, Leandros A. Maglaras, Mohamed Amine Ferrag, Mithun Mukherjee, Farrukh Aslam Khan:
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors 19(14): 3119 (2019) - [c23]Ahmed Ahmim, Leandros A. Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke:
A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models. DCOSS 2019: 228-233 - [c22]Dimitrios Kosmanos, Apostolos Pappas, Francisco J. Aparicio-Navarro, Leandros A. Maglaras, Helge Janicke, Eerke A. Boiten, Antonios Argyriou:
Intrusion Detection System for Platooning Connected Autonomous Vehicles. SEEDA-CECNSM 2019: 1-9 - [c21]Georgios Chrysanidis, Dimitrios Kosmanos, Antonios Argyriou, Leandros A. Maglaras:
Stochastic Optimization of Electric Vehicle Charging Stations. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1-7 - [i19]Leandros A. Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures. CoRR abs/1901.03899 (2019) - [i18]Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab:
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends. CoRR abs/1901.09374 (2019) - 2018
- [j39]Dimitrios Kosmanos, Leandros A. Maglaras, Michalis Mavrovouniotis, Sotiris Moschoyiannis, Antonios Argyriou, Athanasios Maglaras, Helge Janicke:
Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging. IEEE Access 6: 42551-42565 (2018) - [j38]Awais Yousaf, Asim Loan, Radu F. Babiceanu, Leandros Maglaras, Onaiza Yousaf:
Convergence of detection probability, computational gains, and asymptotic analysis of an algorithm for physical-layer intrusion detection system. Trans. Emerg. Telecommun. Technol. 29(8) (2018) - [j37]Leandros A. Maglaras, Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, Tiago J. Cruz:
Cyber security of critical infrastructures. ICT Express 4(1): 42-45 (2018) - [j36]Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke:
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 101: 55-82 (2018) - [j35]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros Maglaras:
An introduction to cyber peacekeeping. J. Netw. Comput. Appl. 114: 70-87 (2018) - [j34]Leandros Maglaras, Lei Shu, Athanasios Maglaras, Jianmin Jiang, Helge Janicke, Dimitrios Katsaros, Tiago J. Cruz:
Editorial: Industrial Internet of Things (I2oT). Mob. Networks Appl. 23(4): 806-808 (2018) - [j33]Kyle Coffey, Richard Smith, Leandros Maglaras, Helge Janicke:
Vulnerability Analysis of Network Scanning on SCADA Systems. Secur. Commun. Networks 2018: 3794603:1-3794603:21 (2018) - [j32]Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Defence Mechanisms for Public Systems. EAI Endorsed Trans. Security Safety 4(13): e1 (2018) - [j31]Leandros Maglaras, George Drivas, Kleanthis Noou, Stylianos Rallis:
NIS directive: The case of Greece. EAI Endorsed Trans. Security Safety 4(14): e1 (2018) - [j30]Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. EAI Endorsed Trans. Security Safety 5(16): e1 (2018) - [c20]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Abdelaziz Amara Korba:
Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices. PAIS 2018: 1-8 - [c19]Sotiris Moschoyiannis, Leandros Maglaras, Nurulhuda A. Manaf:
Trace-Based Verification of Rule-Based Service Choreographies. SOCA 2018: 185-193 - [p1]Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, Awais Yousaf:
Vulnerability Assessment of Cyber Security for SCADA Systems. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 59-80 - [i17]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Athanasios V. Vasilakos, Stylianos Rallis, Helge Janicke:
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues. CoRR abs/1803.10281 (2018) - [i16]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros Maglaras:
Developing Cyber Peacekeeping: Observation, Monitoring and Reporting. CoRR abs/1806.02608 (2018) - [i15]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. CoRR abs/1806.09099 (2018) - [i14]Ahmed Ahmim, Leandros Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke:
A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models. CoRR abs/1812.09059 (2018) - [i13]Dimitrios Kosmanos, Antonios Argyriou, Leandros Maglaras:
Estimating the Relative Speed of RF Jammers in VANETs. CoRR abs/1812.11811 (2018) - [i12]Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras:
RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks. CoRR abs/1812.11886 (2018) - [i11]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros Maglaras:
Developing Cyber Buffer Zones. CoRR abs/1812.11900 (2018) - 2017
- [j29]Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros A. Maglaras, Mohamed Amine Ferrag, Nikumani Choudhury, Vikas Kumar:
Security and Privacy in Fog Computing: Challenges. IEEE Access 5: 19293-19304 (2017) - [j28]Awais Yousaf, Asim Loan, Radu F. Babiceanu, Leandros A. Maglaras, Onaiza Yousaf:
Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. Comput. Secur. 70: 124-143 (2017) - [j27]Allan Cook, Helge Janicke, Richard Smith, Leandros A. Maglaras:
The industrial control system cyber defence triage process. Comput. Secur. 70: 467-481 (2017) - [j26]Mohamed Amine Ferrag, Leandros A. Maglaras, Ahmed Ahmim:
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey. IEEE Commun. Surv. Tutorials 19(4): 3015-3045 (2017) - [j25]Andy Wood, Ying He, Leandros A. Maglaras, Helge Janicke:
A security architectural pattern for risk management of industry control systems within critical national infrastructure. Int. J. Crit. Infrastructures 13(2/3): 113-132 (2017) - [j24]Allan Cook, Richard Smith, Leandros A. Maglaras, Helge Janicke:
SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. Int. J. Cyber Warf. Terror. 7(2): 1-15 (2017) - [j23]Jacqueline Cope, François Siewe, Feng Chen, Leandros A. Maglaras, Helge Janicke:
On data leakage from non-production systems. Inf. Comput. Secur. 25(4): 454-474 (2017) - [j22]Barnaby Stewart, Luís Rosa, Leandros A. Maglaras, Tiago J. Cruz, Mohamed Amine Ferrag, Paulo Simões, Helge Janicke:
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes. EAI Endorsed Trans. Ind. Networks Intell. Syst. 4(10): e4 (2017) - [j21]Kevin I. Jones, Helge Janicke, Christian Facchi, Leandros A. Maglaras:
Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security". J. Inf. Secur. Appl. 34: 152 (2017) - [j20]Samuel Chapman, Richard Smith, Leandros A. Maglaras, Helge Janicke:
Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? J. Sens. Actuator Networks 6(3): 16 (2017) - [j19]Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, Lei Shu:
Authentication Protocols for Internet of Things: A Comprehensive Survey. Secur. Commun. Networks 2017: 6562953:1-6562953:41 (2017) - [j18]Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems. EAI Endorsed Trans. Security Safety 4(12): e1 (2017) - [e1]Leandros A. Maglaras, Helge Janicke, Kevin I. Jones:
Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 - November 1, 2016, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 188, 2017, ISBN 978-3-319-52568-6 [contents] - [i10]Mohamed Amine Ferrag, Leandros A. Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke:
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes. CoRR abs/1708.04027 (2017) - [i9]Dimitrios Kosmanos, Leandros A. Maglaras, Michalis Mavrovouniotis, Sotiris Moschoyiannis, Antonios Argyriou, Athanasios Maglaras, Helge Janicke:
Route Optimization of Electric Vehicles based on Dynamic Wireless Charging. CoRR abs/1710.03726 (2017) - [i8]Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin I. Jones, Helge Janicke:
Internet of Cloud: Security and Privacy issues. CoRR abs/1711.00525 (2017) - 2016
- [j17]Shaimaa M. Nafea, Leandros A. Maglaras, François Siewe, Richard Smith, Helge Janicke:
Personalized Students' Profile Based On Ontology and Rule-based Reasoning. EAI Endorsed Trans. e Learn. 3(12): e6 (2016) - [j16]Allan Cook, Andrew Nicholson, Helge Janicke, Leandros A. Maglaras, Richard Smith:
Attribution of Cyber Attacks on Industrial Control Systems. EAI Endorsed Trans. Ind. Networks Intell. Syst. 3(7): e3 (2016) - [j15]Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz:
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. J. Inf. Secur. Appl. 30: 15-26 (2016) - [j14]Leandros A. Maglaras, Ali H. Al-Bayatti, Ying He, Isabel Wagner, Helge Janicke:
Social Internet of Vehicles for Smart Cities. J. Sens. Actuator Networks 5(1): 3 (2016) - [j13]Dimitrios Kosmanos, Nikolas Prodromou, Antonios Argyriou, Leandros A. Maglaras, Helge Janicke:
MIMO Techniques for Jamming Threat Suppression in Vehicular Networks. Mob. Inf. Syst. 2016: 8141204:1-8141204:9 (2016) - [j12]Nicholas Ayres, Leandros A. Maglaras:
Cyberterrorism targeting the general public through social media. Secur. Commun. Networks 9(15): 2864-2875 (2016) - [j11]Mark Glenn Evans, Leandros A. Maglaras, Ying He, Helge Janicke:
Human behaviour as an aspect of cybersecurity assurance. Secur. Commun. Networks 9(17): 4667-4679 (2016) - [j10]Helge Janicke, Kevin I. Jones, Leandros A. Maglaras:
Security, Privacy and Trust in Cyber Physical Systems. EAI Endorsed Trans. Security Safety 3(7): e1 (2016) - [j9]Najlaa Almajed, Leandros A. Maglaras, François Siewe, Helge Janicke, Pooneh Bagheri Zadeh:
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities. EAI Endorsed Trans. Security Safety 3(7): e4 (2016) - [j8]Tiago Cruz, Luís Rosa, Jorge Proença, Leandros A. Maglaras, Matthieu Aubigny, Leonid Lev, Jianmin Jiang, Paulo Simões:
A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems. IEEE Trans. Ind. Informatics 12(6): 2236-2246 (2016) - [j7]Leandros A. Maglaras, Dimitrios Katsaros:
Social Clustering of Vehicles Based on Semi-Markov Processes. IEEE Trans. Veh. Technol. 65(1): 318-332 (2016) - [c18]Allan Cook, Richard Smith, Leandros A. Maglaras, Helge Janicke:
Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure. ICS-CSR 2016 - [c17]Allan Cook, Richard Smith, Leandros A. Maglaras, Helge Janicke:
Measuring the Risk of Cyber Attack in Industrial Control Systems. ICS-CSR 2016 - [c16]Glen Hawthorne, Ying He, Leandros A. Maglaras, Helge Janicke:
Security Visualization: Detecting Denial of Service. INISCOM 2016: 39-49 - [c15]Barnaby Stewart, Luís Rosa, Leandros A. Maglaras, Tiago J. Cruz, Paulo Simões, Helge Janicke:
Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System. INISCOM 2016: 90-100 - [c14]Pavlos Basaras, Ioannis-Prodromos Belikaidis, Leandros A. Maglaras, Dimitrios Katsaros:
Blocking epidemic propagation in vehicular networks. WONS 2016: 65-72 - [i7]Mark Glenn Evans, Leandros A. Maglaras, Ying He, Helge Janicke:
Human Behaviour as an aspect of Cyber Security Assurance. CoRR abs/1601.03921 (2016) - [i6]Steve Harrison, Antonis Tzounis, Leandros A. Maglaras, François Siewe, Richard Smith, Helge Janicke:
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development. CoRR abs/1604.02368 (2016) - [i5]Mohamed Amine Ferrag, Leandros A. Maglaras, Ahmed Ahmim:
Privacy-preserving schemes for Ad Hoc Social Networks: A survey. CoRR abs/1610.06095 (2016) - [i4]Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang:
A Survey on Privacy-preserving Schemes for Smart Grid Communications. CoRR abs/1611.07722 (2016) - [i3]Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang:
Authentication Protocols for Internet of Things: A Comprehensive Survey. CoRR abs/1612.07206 (2016) - 2015
- [j6]Leandros A. Maglaras, Efstathios Stathakidis, Jianmin Jiang:
Social Aspect of Vehicular Communications. EAI Endorsed Trans. Cloud Syst. 1(1): e6 (2015) - [j5]Leandros A. Maglaras:
Coupling of the synchronization stations of an Extended Kanban system. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(4): e5 (2015) - [j4]Leandros A. Maglaras, Jianmin Jiang:
A novel intrusion detection method based on OCSVM and K-means recursive clustering. EAI Endorsed Trans. Security Safety 2(3): e5 (2015) - [c13]Ying He, Leandros A. Maglaras, Helge Janicke, Kevin I. Jones:
An Industrial Control Systems incident response decision framework. CNS 2015: 761-762 - [c12]Grigoris Tzokatziou, Leandros A. Maglaras, Helge Janicke:
Insecure by Design: Using Human Interface Devices to exploit SCADA systems. ICS-CSR 2015 - [c11]Pavlos Basaras, Leandros A. Maglaras, Dimitrios Katsaros, Helge Janicke:
A Robust Eco-Routing Protocol against Malicious Data in Vehicular Networks. WMNC 2015: 184-191 - [i2]Pavlos Basaras, Leandros A. Maglaras, Dimitrios Katsaros, Helge Janicke:
A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks. CoRR abs/1506.05017 (2015) - [i1]Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz:
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. CoRR abs/1507.02825 (2015) - 2014
- [j3]Tiago Cruz, Jorge Proença, Paulo Simões, Matthieu Aubigny, Moussa Ouedraogo, Antonio Graziano, Leandros A. Maglaras:
A Distributed IDS for Industrial Control Systems. Int. J. Cyber Warf. Terror. 4(2): 1-22 (2014) - [j2]Leandros A. Maglaras, Dimitrios Katsaros:
Delay Efficient Backpressure Routing in Wireless Ad Hoc Networks. EAI Endorsed Trans. Mob. Commun. Appl. 1(4): e5 (2014) - [c10]Leandros A. Maglaras, Jianmin Jiang:
OCSVM model combined with K-means recursive clustering for intrusion detection in SCADA systems. QSHINE 2014: 133-134 - 2013
- [c9]Athanasios Maglaras, Trifon Kousiouris, Frangiskos Topalis, Leandros A. Maglaras, Konstantina Giannakopoulou:
Optimization of Corona onset and breakdown voltage of small air gaps stressed by DC and impulse voltages. EUROCON 2013: 1207-1214 - [c8]Leandros A. Maglaras, Dimitrios Katsaros:
Clustering in Urban environments: Virtual forces applied to vehicles. ICC Workshops 2013: 484-488 - [c7]Leandros A. Maglaras, Pavlos Basaras, Dimitrios Katsaros:
Exploiting vehicular communications for reducing CO2 emissions in urban environments. ICCVE 2013: 32-37 - [c6]Leandros A. Maglaras, Dimitrios Katsaros:
Enhanced Spring Clustering in VANETs with Obstruction Considerations. VTC Spring 2013: 1-6 - 2012
- [j1]Leandros A. Maglaras, Dimitrios Katsaros:
New measures for characterizing the significance of nodes in wireless ad hoc networks via localized path-based neighborhood analysis. Soc. Netw. Anal. Min. 2(2): 97-106 (2012) - [c5]Athanasios Maglaras, Trifon Kousiouris, Frangiskos Topalis, Leandros A. Maglaras:
Optimization of Corona Effects in Small Air Gaps Stressed by DC Voltages. EMS 2012: 502-507 - [c4]Leandros A. Maglaras, Dimitrios Katsaros:
Distributed Skip Air Index for smart broadcasting in intelligent transportation systems. Intelligent Vehicles Symposium 2012: 624-629 - [c3]Leandros A. Maglaras, Dimitrios Katsaros:
Distributed clustering in vehicular networks. WiMob 2012: 593-599 - 2011
- [c2]Leandros A. Maglaras, Dimitrios Katsaros:
Layered backpressure scheduling for delay reduction in ad hoc networks. WOWMOM 2011: 1-9
2000 – 2009
- 2009
- [c1]Leandros A. Maglaras, Dimitrios Katsaros:
New Metrics for Characterizing the Significance of Nodes in Wireless Networks via Path-Based Neighborhood Analysis. Panhellenic Conference on Informatics 2009: 143-147
Coauthor Index
aka: Naghmeh Moradpoor
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint