Publications

2023

(2023). Cyber hygiene methodology for raising cybersecurity and data privacy awareness in healthcare organisations. Journal of Medical Internet Research. (JCR 2022: 7.08, CiteScore 2021: 8.2)

PDF Project DOI

2022

(2022). Secure genotype imputation using homomorphic encryption. Journal of Information Security and Applications. (JCR 2021: 4.96, CiteScore 2021: 7.6)

PDF DOI

(2022). Principled data-driven decision support for cyber-forensic investigations. 37th AAAI Conference on Artificial Intelligence. (CORE2021 Ranking: A*)

PDF Slides

(2022). Forensics for multi-stage cyber incidents: Survey and future directions. Forensic Science International: Digital Investigation. (JCR 2021: 1.805, CiteScore 2021: 5.0)

PDF

(2022). A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications. (JCR 2021: 4.96, CiteScore 2021: 7.6)

PDF Project DOI

(2022). Virtually Secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers & Security. (JCR 2021: 5.105, CiteScore: 10.1)

PDF DOI

(2022). HoneyCar: A framework to configure honeypot vulnerabilities on the internet of vehicles. IEEE Access. (JCR 2021: 3.476, CiteScore 2021: 6.7)

DOI

(2022). MITRE ATT&CK-driven cyber risk assessment. Proceedings of the 16th International Conference on Availability, Reliability and Security. (CORE2021 Ranking: B)

PDF Project DOI

(2022). Optimising user security recommendations for AI-powered smart-homes. Proceedings of the 5th IEEE Conference on Dependable and Secure Computing.

PDF Project DOI

(2022). Practical algorithm substitution attack on extractable signatures. Designs, Codes and Cryptography.

PDF DOI

(2022). On-the-fly privacy for location histograms. IEEE Transactions on Dependable and Secure Computing. (JCR 2021: 6.791, CiteScore 2021: 13.5)

PDF Code DOI

2021

(2021). Towards dynamic threat modelling in 5G core networks based on MITRE ATT&CK. arXiv preprint arXiv:2108.11206.

PDF Project

(2021). Multi-stage threat modelling and security monitoring in 5GCN. Cyber Security Issues for Emerging Technologies (CRC Press, Taylor and Francis Group).

PDF Project

(2021). A lightweight certificateless non-interactive authentication and key exchange protocol for IoT Environments. Proceedings of the 2021 IEEE Symposium on Computers and Communications. (CORE2021 Ranking: B)

PDF DOI

(2021). Game-theoretic decision support for cyber forensic investigations. Sensors. (JCR 2021: 3.847, CiteScore 2021: 6.4)

PDF DOI

(2021). Automated cyber and privacy risk management toolkit. Sensors. (JCR 2021: 3.847, CiteScore 2021: 6.4)

PDF Project DOI

(2021). Influence of human factors on cyber security within healthcare organisations: A systematic review. Sensors. (JCR 2021: 3.847, CiteScore 2021: 6.4)

PDF Project DOI

(2021). Cyber-insurance: Past, present and future. 2020 Encyclopedia of Cryptography, Security and Privacy.

PDF Project DOI

(2021). Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security. (JCR 2021: 7.231, CiteScore 2021: 14.9)

PDF Code DOI

2020

(2020). Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE Transactions on Information Forensics and Security. (JCR 2021: 7.231, CiteScore 2020: 15.1)

PDF Code DOI

(2020). How secure is home: Assessing human susceptibility to IoT threats. 24th Pan-Hellenic Conference on Informatics.

PDF Slides DOI

(2020). Multiobjective optimization algorithms for wireless sensor networks. Wireless Communications and Mobile Computing.

PDF DOI

(2020). ARIES: A novel multivariate intrusion detection system for smart grid. Sensors. (JCR 2019: 3.275, CiteScore 2019: 5.0)

PDF Project DOI

(2020). SECONDO: A platform for cybersecurity investments and cyber insurance decisions. International Conference on Trust and Privacy in Digital Business.

PDF Project Slides DOI

(2020). Deep binarized convolutional neural network inferences over encrypted data. 2020 6th IEEE International Conference on Edge Computing and Scalable Cloud.

PDF DOI

(2020). Cache-based privacy preserving solution for location and content protection in location-based services. Sensors. (JCR 2019: 3.275, CiteScore 2019: 5.8)

PDF DOI

(2020). TT-SVD: An efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet of Things. (JCR 2019: 9.515, CiteScore 2020: 13.9)

PDF DOI

(2020). An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access. (JCR 2020: 4.1, CiteScore 2020: 4.8)

PDF DOI

(2020). Dynamic decision support for resource offloading in heterogeneous internet of things environments. Simulation Modelling Practice and Theory. (JCR 2019: 2.219, CiteScore 2019 : 5.3)

PDF DOI

(2020). Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. International Journal of Distributed Sensor Networks.

PDF DOI

(2020). Optimizing investments in cyber hygiene for protecting healthcare users. From Lambda Calculus to Cybersecurity Through Program Analysis.

PDF Project DOI

2019

(2019). DT-CP: A double-TTPs based contract-signing protocol with lower computational cost. IEEE Access. (JCR 2019: 3.745, CiteScore 2019: 3.9)

PDF DOI

(2019). Post-incident audits on cyber insurance discounts. Computers & Security, Vol. 87, pp. 101593 (November 2019). (JCR 2019: 3.579, CiteScore 2019: 7.5)

PDF Project DOI

(2019). A taxonomy and survey of attacks against machine learning. Computer Science Review. (JCR 2019: 7.707, SJR 2019: 14.7)

PDF DOI

(2019). Honeypot type selection games for smart grid networks. 10th Conference on Decision and Game Theory for Security.

PDF Project Poster Slides DOI

(2019). Cut-The-Rope: A Game of stealthy intrusion. 10th Conference on Decision and Game Theory for Security.

PDF Code Slides DOI

(2019). Using sparse representation to detect anomalies in complex WSNs. ACM Transactions on Intelligent Systems and Technology. (JCR 2019: 3.82, CiteScore 2019: 7.5)

PDF DOI

(2019). CUREX: seCUre and pRivate hEalth data eXchange. IEEE/WIC/ACM International Conference on Web Intelligence.

PDF Project DOI

(2019). Distributed key management in microgrids. IEEE Transactions on Industrial Informatics. (JCR IF 2019: 10.854, SJR 2019: Q1)

PDF Code DOI

(2019). Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks. (JCR 2019: 3.643, CiteScore 2019: 7.8)

PDF Code DOI

(2019). Attacking IEC-60870-5-104 SCADA systems. 2019 1st IEEE Services Workshop On Cyber Security and Resilience in the Internet of Things.

PDF Project DOI

(2019). A new encrypted data switching protocol: bridging IBE and ABE without loss of data confidentiality. IEEE Access. (JCR 2019: 3.745, CiteScore 2019: 3.9)

PDF DOI

(2019). TAW: Cost-effective threshold authentication with weights for internet of things. IEEE Access. (JCR 2019: 3.745, CiteScore 2019: 3.9)

PDF DOI

(2019). A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Networks. (JCR 2019: 3.643, CiteScore 2019: 7.8)

PDF DOI

(2019). Quantum-resistant identity-based signature with message recovery and proxy delegation. Symmetry. (JCR 2019: 2.645)

PDF DOI

2018

(2018). Cyber-insurance as a signaling game: self-reporting and external security audits. 9th Conference on Decision and Game Theory for Security.

PDF Project Poster DOI

(2018). Towards the definition of a security incident response modelling language. 2018 International Conference on Trust and Privacy in Digital Business.

PDF DOI

(2018). An enhanced cyber attack attribution framework. 2018 International Conference on Trust, Privacy & Security in Digital Business. (CORE2018 Ranking: B)

PDF Slides DOI

(2018). Unsupervised learning for trustworthy IoT. 2018 IEEE International Conference on Fuzzy Systems. (CORE2017 Ranking: A)

PDF Code Slides DOI

(2018). Risk assessment uncertainties in cybersecurity investments. Games.

PDF DOI

2017

(2017). An options approach to cybersecurity investment. IEEE Access. (JCR 2017: 3.557, CiteScore: 2.4)

PDF DOI

(2017). COALA: A protocol for the avoidance and alleviation of congestion in wireless sensor networks. Sensors. (JCR 2018: 2.677, CiteScore 2018: 4.3)

PDF DOI

(2017). Selecting security mechanisms in secure tropos. 2017 International Conference on Trust, Privacy & Security in Digital Business. (CORE2017 Ranking: B)

PDF DOI

(2017). ASTo: A tool for security analysis of IoT systems. 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications.

PDF Code Slides DOI

(2017). Apparatus: Reasoning about security requirements in the internet of things. 2016 International Conference on Advanced Information Systems Engineering.

PDF Code DOI

(2017). A conceptual model to support security analysis in the internet of things. Computer Science and Information Systems.

PDF DOI

(2017). The applicability of ambient sensors as proximity evidence for NFC transactions. 2017 IEEE Security and Privacy Workshops.

PDF Code DOI

(2017). Security requirements modelling for virtualized 5G small cell networks. 24th International Conference on Telecommunications (ICT).

PDF Project DOI

(2017). Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks. (JCR 2017: 3.151, CiteScore 2017: 6.8)

PDF Code DOI

2016

(2016). Evaluating case-based reasoning knowledge discovery in fraud detection. International Conference on Case-Based Reasoning (ICCBR) Workshops. (CORE2017 Ranking: B)

PDF

(2016). Security challenges of small cell as a service in virtualized mobile edge computing environments. 2016 Information Security Theory and Practice.

PDF Project Slides DOI

(2016). Decision support approaches for cyber security investment. Decision Support Systems. (JCR 2016: 3.222, CiteScore 2016: 8.8)

PDF Slides DOI

2015

(2015). Game-theoretic model of incentivizing privacy-aware users to consent to location tracking. 2015 IEEE Trustcom/BigDataSE/ISPA.

PDF Slides DOI

(2015). A Game-theoretic approach for minimizing security risks in the internet-of-things. 1st IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems.

PDF Code Slides DOI

2014

(2014). Secure message delivery games for device-to-device communications. 5th International Conference on Decision and Game Theory for Security.

PDF Slides DOI

(2014). Cybersecurity games and investments: A decision support approach. 2014 Conference on Decision and Game Theory for Security.

PDF Slides DOI

(2014). Game theory meets information security management. 2014 IFIP International Conference on ICT Systems Security and Privacy Protection.

PDF Slides DOI

2013

(2013). Standardisation advancements in the area of routing for mobile ad-hoc networks. The Journal of Supercomputing.

PDF Project DOI

(2013). A probabilistic algorithm for secret matrix share size reduction. 2013 European Wireless Conference.

PDF DOI

2012

(2012). Secure decentralised ubiquitous networking for emergency communications. 2012 International Conference on Telecommunications and Multimedia.

PDF Project DOI

(2012). Security model for emergency real-time communications in autonomous networks. The Journal of Supercomputing.

PDF Project DOI

(2012). A case study of internet of things based on wireless sensor networks and smart phones. 28th Wireless World Research Forum Meeting.

PDF

(2012). Distributed hash tables for peer-to-peer mobile ad-hoc networks with security extensions. Journal of Networks.

PDF Project

(2012). Recipients' anonymity in multihop ad-hoc networks. Transactions on Information Systems.

PDF DOI

2011

(2011). Performance evaluation of secure video transmission over WIMAX. International Journal of Computer Networks & Communications.

PDF DOI

2010

(2010). A testbed implementation for securing olsr in mobile ad hoc networks. International Journal of Network Security & Its Applications.

PDF Project

(2010). ChaMeLeon (CML): A hybrid and adaptive routing protocol for emergency situations. IETF MANET Working Group.

Project

(2010). Secure routing for supporting ad-hoc extreme emergency infrastructures. 2010 Future Network & Mobile Summit.

PDF Project

(2010). ROBUST: Reliable overlay based utilisation of services and topology for emergency MANETs. 2010 Future Network & Mobile Summit.

PDF Project

(2010). Adaptive and secure routing protocol for emergency mobile ad hoc networks. International Journal of Wireless and Mobile Computing.

PDF Project

(2010). End-to-end security protection. IEEE Vehicular Technology Magazine.

PDF DOI

2009

(2009). A game theoretic approach for securing AODV in emergency mobile ad hoc networks. 34th IEEE Conference on Local Computer Networks.

PDF Project Slides DOI

(2009). A framework supporting extreme emergency services. ICT Mobile and Wireless Communications Summit.

Project

(2009). Securing AODV against wormhole attacks in emergency MANET multimedia communications. 5th International Mobile Multimedia Communications Conference (Mobimedia 2009).

PDF Project DOI

(2009). Maximizing network throughput. IEEE Vehicular Technology Magazine.

PDF DOI

(2009). An efficient power control algorithm for supporting cognitive communications in shared spectrum areas. 2010 International Conference on Mobile Lightweight Wireless Systems.

DOI

2008

(2008). Optimizing the channel load reporting process in IEEE 802.11 k-enabled WLANs. 16th IEEE Workshop on Local and Metropolitan Area Networks.

PDF DOI