Gregory Epiphaniou

Orcid: 0000-0003-1054-6368

According to our database1, Gregory Epiphaniou authored at least 72 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Quantum Key Distribution for V2I communications with software-defined networking.
IET Quantum Commun., March, 2024

Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment.
Sensors, 2024

A Comprehensive Survey of Threats in Platooning - A Cloud-Assisted Connected and Autonomous Vehicle Application.
Inf., 2024

Detecting Face Synthesis Using a Concealed Fusion Model.
CoRR, 2024

Data-Agnostic Face Image Synthesis Detection Using Bayesian CNNs.
CoRR, 2024

2023
Analysis of outage performance in a 6G-V2X communications system utilising free-space optical quantum key distribution.
IET Quantum Commun., December, 2023

A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites.
Sensors, October, 2023

AI-augmented usability evaluation framework for software requirements specification in cyber physical human systems.
Internet Things, October, 2023

An Efficient Cross-Layer Authentication Scheme for Secure Communication in Vehicular Ad-Hoc Networks.
IEEE Trans. Veh. Technol., July, 2023

Digital twins in cyber effects modelling of IoT/CPS points of low resilience.
Simul. Model. Pract. Theory, May, 2023

Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks.
IEEE Syst. J., March, 2023

Cyber-Physical Systems: Security Threats and Countermeasures.
J. Sens. Actuator Networks, February, 2023

Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey.
IEEE Trans. Engineering Management, 2023

A Deep-Learning-Based Solution for Securing the Power Grid Against Load Altering Threats by IoT-Enabled Devices.
IEEE Internet Things J., 2023

An optimized fuzzy deep learning model for data classification based on NSGA-II.
Neurocomputing, 2023

Trustworthy Cross-Border Interoperable Identity System for Developing Countries.
CoRR, 2023

The AI Revolution: Opportunities and Challenges for the Finance Sector.
CoRR, 2023

Science and Technology Ontology: A Taxonomy of Emerging Topics.
CoRR, 2023

MedSecurance Project: Advanced Security-for-Safety Assurance for Medical Device IoT (IoMT).
Proceedings of the Caring is Sharing - Exploiting the Value in Data for Health and Innovation - Proceedings of MIE 2023, Gothenburg, Sweden, 22, 2023

Unsupervised Face Synthesis Based on Human Traits.
Proceedings of the 11th International Workshop on Biometrics and Forensics, 2023

Science Technology Ontology: A Taxonomy of Emerging Topics.
Proceedings of the Joint Proceedings of the Second International Workshop on Knowledge Graph Generation From Text and the First International BiKE Challenge co-located with 20th Extended Semantic Conference (ESWC 2023), 2023

A BERT-based Empirical Study of Privacy Policies' Compliance with GDPR.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition.
IEEE Trans. Inf. Forensics Secur., 2022

Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store.
Sensors, 2022

Safety, Security and Privacy in Machine Learning Based Internet of Things.
J. Sens. Actuator Networks, 2022

Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks.
IEEE Internet Things J., 2022

Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems.
IEEE Internet Things J., 2022

A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

Barriers and Opportunities In Cyber Risk And Compliance Management For Data-Driven Supply Chains.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications.
IEEE Trans. Veh. Technol., 2021

A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021

Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles.
Phys. Commun., 2021

Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems".
J. Sens. Actuator Networks, 2021

Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study.
J. Sens. Actuator Networks, 2021

Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things.
Comput. Secur., 2021

Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
Comput. Secur., 2021

Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data.
Comput. Electr. Eng., 2021

A privacy-preserving route planning scheme for the Internet of Vehicles.
Ad Hoc Networks, 2021

Prevention of IoT-Enabled Crime Using Home Routers (PITCHR).
Proceedings of the Science and Technologies for Smart Cities, 2021

2020
Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security.
IEEE Trans. Engineering Management, 2020

Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security".
IEEE Trans. Engineering Management, 2020

A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments.
Sensors, 2020

Network Traffic Analysis for Threat Detection in the Internet of Things.
IEEE Internet Things Mag., 2020

Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives.
IEEE Internet Things J., 2020

CyRes - Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract).
CoRR, 2020

2019
Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems.
J. Sens. Actuator Networks, 2019

Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.
Ad Hoc Networks, 2019

AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Private Cloud Storage Forensics: Seafile as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Security in Online Games: Current Implementations and Challenges.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Distributed Filesystem Forensics: Ceph as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Big Data Forensics: Hadoop Distributed File Systems as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet Things J., 2018

Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
CoRR, 2018

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence.
CoRR, 2018

A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies.
CoRR, 2018

Physical characteristics of wireless communication channels for secret key establishment: A survey of the research.
Comput. Secur., 2018

Quantisation feasibility and performance of RSS-based secret key extraction in VANETs.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

2017
Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility.
Telematics Informatics, 2017

Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors.
CoRR, 2017

Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

2016
Anonymity networks and the fragile cyber ecosystem.
Netw. Secur., 2016

2014
Prevention against threats to self co-existence - A novel authentication protocol for cognitive radio networks.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014

2013
Guidelines for Internet of Things Deployment Approaches - The Thing Commandments.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

Internet of Things Forensics: Challenges and approaches.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls.
IET Inf. Secur., 2012

2011
A Theoretical Framework for Addressing Trust in Open Pervasive Networks.
Proceedings of the PECCS 2011, 2011

2010
An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes.
Proceedings of the SIGMAP 2010, 2010

The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss.
Proceedings of the ARES 2010, 2010


  Loading...