Publications

2021

Automated Cyber and Privacy Risk Management Toolkit
Game-Theoretic Decision Support for Cyber Forensic Investigations
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review
Multi-Stage Threat Modelling and Security Monitoring in 5GCN
Cyber-Insurance: Past, Present and Future
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations

2020

Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning
Multiobjective Optimization Algorithms for Wireless Sensor Networks
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid
SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions
Deep Binarized Convolutional Neural Network Inferences over Encrypted Data
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services
TT-SVD: an Efficient Sparse Decision Making Model with Two-way Trust Recommendation in the AI Enabled IoT Systems
An Efficient Attribute-based Multi-Keyword Search Scheme in Encrypted Keyword Generation
Dynamic Decision Support for Resource Offloading in Heterogeneous Internet of Things environments
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
On-the-fly Privacy for Location Histograms
Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users

2019

DT-CP: a Double-TTPs Based Contract-Signing Protocol With Lower Computational Cost
Post-Incident Audits on Cyber Insurance Discounts
A Taxonomy and Survey of Attacks Against Machine Learning
Honeypot Type Selection Games for Smart Grid Networks
Cut-The-Rope: A Game of Stealthy Intrusion
Using Sparse Representation to Detect Anomalies in Complex WSNs
CUREX: seCUre and pRivate hEalth data eXchange
Distributed Key Management in Microgrids
Apparatus: A Framework for Security Analysis in Internet of Things Systems
Attacking IEC-60870-5-104 SCADA Systems
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality
TAW: Cost-Effective Threshold Authentication with Weights for Internet of Things
A Taxonomy and Survey of Cyber-Physical Intrusion Detection Approaches for Vehicles
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation

2018

Towards the Definition of a Security Incident Response Modelling Language
An Enhanced Cyber Attack Attribution Framework
Unsupervised Learning for Trustworthy IoT
Risk Assessment Uncertainties in Cybersecurity Investments

2017

An Options Approach to Cybersecurity Investment
COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks
Selecting Security Mechanisms in Secure Tropos
ASTo: A Tool for Security Analysis of IoT Systems
Apparatus: Reasoning About Security Requirements in the Internet of Things
A Conceptual Model to Support Security Analysis in the Internet of Things
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions
Security Requirements Modelling for Virtualized 5G Small Cell Networks
Game Theoretic Path Selection to Support Security in Device-to-Device Communications

2016

Evaluating Case-based Reasoning Knowledge Discovery in Fraud Detection
Decision Support Approaches for Cyber Security Investment

2015

Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking
A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

2014

Secure Message Delivery Games for Device-to-Device Communications
Cybersecurity Games and Investments: A Decision Support Approach
Game Theory Meets Information Security Management

2013

Standardisation Advancements in the Area of Routing for Mobile Ad-Hoc Networks
A Probabilistic Algorithm for Secret Matrix Share Size Reduction

2012

Secure Decentralised Ubiquitous Networking for Emergency Communications
Security Model for Emergency Real-Time Communications in Autonomous Networks
A Case Study of Internet of Things Based on Wireless Sensor Networks and Smart Phones
Recipients' Anonymity in Multihop Ad-Hoc Networks

2011

Performance evaluation of secure video transmission over WIMAX

2010

A Testbed Implementation for Securing OLSR in Mobile Ad-hoc Networks
ChaMeLeon (CML): A hybrid and adaptive routing protocol for Emergency Situations
Secure Routing for Supporting Ad-hoc Extreme Emergency Infrastructures
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks
End-to-End Security Protection

2009

A Framework Supporting Extreme Emergency Services
Maximizing Network Throughput

2008

Optimizing the Channel Load Reporting Process in IEEE 802.11 k-enabled WLANs