Emmanouil A. Panaousis

Orcid: 0000-0001-7306-4062

Affiliations:
  • University of Greenwich, School of Computing and Mathematical Sciences, London, UK
  • University of Brighton (former)


According to our database1, Emmanouil A. Panaousis authored at least 92 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain.
Int. J. Inf. Sec., February, 2024

2023
Game-theoretic APT defense: An experimental study on robotics.
Comput. Secur., September, 2023

Forensics for multi-stage cyber incidents: Survey and future directions.
Forensic Sci. Int. Digit. Investig., March, 2023

Secure genotype imputation using homomorphic encryption.
J. Inf. Secur. Appl., 2023

SoK: The MITRE ATT&CK Framework in Research and Practice.
CoRR, 2023

CROSS: A framework for cyber risk optimisation in smart homes.
Comput. Secur., 2023

Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments.
Comput. Secur., 2023

Cyber Risk Assessment and Optimization: A Small Business Case Study.
IEEE Access, 2023

Principled Data-Driven Decision Support for Cyber-Forensic Investigations.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
On-the-Fly Privacy for Location Histograms.
IEEE Trans. Dependable Secur. Comput., 2022

A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery Tool.
J. Inf. Secur. Appl., 2022

Practical algorithm substitution attack on extractable signatures.
Des. Codes Cryptogr., 2022

MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-IID distribution.
CoRR, 2022

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles.
IEEE Access, 2022

Optimising user security recommendations for AI-powered smart-homes.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

FLVoogd: Robust And Privacy Preserving Federated Learning.
Proceedings of the Asian Conference on Machine Learning, 2022

MITRE ATT&CK-driven Cyber Risk Assessment.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations.
IEEE Trans. Inf. Forensics Secur., 2021

Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021

Game-Theoretic Decision Support for Cyber Forensic Investigations.
Sensors, 2021

Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
Sensors, 2021

Automated Cyber and Privacy Risk Management Toolkit.
Sensors, 2021

TT-SVD: An Efficient Sparse Decision-Making Model With Two-Way Trust Recommendation in the AI-Enabled IoT Systems.
IEEE Internet Things J., 2021

Multi-Stage Threat Modelling and Security Monitoring in 5GCN.
CoRR, 2021

Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT&CK.
CoRR, 2021

A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

MFF-AMD: Multivariate Feature Fusion for Android Malware Detection.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Multiobjective Optimization Algorithms for Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2020

Distributed Key Management in Microgrids.
IEEE Trans. Ind. Informatics, 2020

Dynamic decision support for resource offloading in heterogeneous Internet of Things environments.
Simul. Model. Pract. Theory, 2020

ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid.
Sensors, 2020

Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
Sensors, 2020

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020

An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation.
IEEE Access, 2020

SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

How Secure is Home: Assessing Human Susceptibility to IoT Threats.
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020

Deep Binarized Convolutional Neural Network Inferences over Encrypted Data.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users.
Proceedings of the From Lambda Calculus to Cybersecurity Through Program Analysis, 2020

2019
Using Sparse Representation to Detect Anomalies in Complex WSNs.
ACM Trans. Intell. Syst. Technol., 2019

Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.
Symmetry, 2019

A taxonomy and survey of attacks against machine learning.
Comput. Sci. Rev., 2019

Post-incident audits on cyber insurance discounts.
Comput. Secur., 2019

Apparatus: A framework for security analysis in internet of things systems.
Ad Hoc Networks, 2019

A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles.
Ad Hoc Networks, 2019

DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost.
IEEE Access, 2019

TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.
IEEE Access, 2019

A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019

CUREX: seCUre and pRivate hEalth data eXchange.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019

Attacking IEC-60870-5-104 SCADA Systems.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Cut-The-Rope: A Game of Stealthy Intrusion.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Honeypot Type Selection Games for Smart Grid Networks.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

2018
Risk Assessment Uncertainties in Cybersecurity Investments.
Games, 2018

An Options Approach to Cybersecurity Investment.
IEEE Access, 2018

An Enhanced Cyber Attack Attribution Framework.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Towards the Definition of a Security Incident Response Modelling Language.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Unsupervised Learning for Trustworthy IoT.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

2017
COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks.
Sensors, 2017

Uncertainty in Cyber Security Investments.
CoRR, 2017

A conceptual model to support security analysis in the internet of things.
Comput. Sci. Inf. Syst., 2017

Game theoretic path selection to support security in device-to-device communications.
Ad Hoc Networks, 2017

Selecting Security Mechanisms in Secure Tropos.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

ASTo: A tool for security analysis of IoT systems.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Security requirements modelling for virtualized 5G small cell networks.
Proceedings of the 24th International Conference on Telecommunications, 2017

2016
Decision support approaches for cyber security investment.
Decis. Support Syst., 2016

Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments.
Proceedings of the Information Security Theory and Practice, 2016

Evaluating Case-Based Reasoning Knowledge Discovery in Fraud Detection.
Proceedings of the Workshops Proceedings for the Twenty-fourth International Conference on Case-Based Reasoning (ICCBR 2016), Atlanta, Georgia, USA, October 31, 2016

Apparatus: Reasoning About Security Requirements in the Internet of Things.
Proceedings of the Advanced Information Systems Engineering Workshops, 2016

2015
Comparing Decision Support Approaches for Cyber Security Investment.
CoRR, 2015

Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A game-theoretic approach for minimizing security risks in the Internet-of-Things.
Proceedings of the IEEE International Conference on Communication, 2015

2014
Game Theory Meets Information Security Management.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Cybersecurity Games and Investments: A Decision Support Approach.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Secure Message Delivery Games for Device-to-Device Communications.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2013
Standardisation advancements in the area of routing for mobile ad-hoc networks.
J. Supercomput., 2013

Secure Communications for Mobile Verification Platforms.
Proceedings of the ISWCS 2013, 2013

A Probabilistic Algorithm for Secret Matrix Share Size Reduction.
Proceedings of the European Wireless 2013, 2013

2012
Security for mobile ad-hoc networks.
PhD thesis, 2012

Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions.
J. Networks, 2012

Security model for emergency real-time communications in autonomous networks.
Inf. Syst. Frontiers, 2012

Recipients' Anonymity in Multihop Ad-Hoc Networks.
IEICE Trans. Inf. Syst., 2012

Secure decentralised ubiquitous networking for emergency communications.
Proceedings of the 2012 International Conference on Telecommunications and Multimedia, 2012

2010
End-to-End Security Protection.
IEEE Veh. Technol. Mag., 2010

A Testbed Implementation for Securing OLSR in Mobile Ad hoc Networks
CoRR, 2010

Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks
CoRR, 2010

An Efficient Power Control Algorithm for Supporting Cognitive Communications in Shared Spectrum Areas.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

2009
Maximizing network throughput.
IEEE Veh. Technol. Mag., 2009

Securing AODV against wormhole attacks in emergency MANET multimedia communications.
Proceedings of the 5th International Conference on Mobile Multimedia Communications, 2009

A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

2008
Optimizing the channel load reporting process in IEEE 802.11k-enabled WLANs.
Proceedings of the 16th IEEE Workshop on Local and Metropolitan Area Networks, 2008


  Loading...