Helge Janicke

Orcid: 0000-0002-1345-2829

According to our database1, Helge Janicke authored at least 139 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Malware Detection with Artificial Intelligence: A Systematic Literature Review.
ACM Comput. Surv., June, 2024

Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures.
Internet Things, April, 2024

Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis.
CoRR, 2024

PDF Malware Detection: Toward Machine Learning Modeling With Explainability Analysis.
IEEE Access, 2024

2023
The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports.
IEEE Trans. Intell. Transp. Syst., February, 2023

A Novel Authentication Method That Combines Honeytokens and Google Authenticator.
Inf., 2023

Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives.
IEEE Secur. Priv., 2023

AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity.
CoRR, 2023

Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper.
CoRR, 2023

Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity Operations.
Proceedings of the 5th IEEE International Conference on Trust, 2023

2022
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning.
Dataset, April, 2022

Cybersecurity of Critical Infrastructures: Challenges and Solutions.
Sensors, 2022

SmartValidator: A framework for automatic identification and classification of cyber threat data.
J. Netw. Comput. Appl., 2022

Pedagogic Challenges in Teaching Cyber Security - a UK Perspective.
CoRR, 2022

Reliability, Security, and Privacy in Power Grids.
Computer, 2022

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.
IEEE Access, 2022

Security Revisited: Honeytokens meet Google Authenticator.
Proceedings of the 7th South-East Europe Design Automation, 2022

2021
WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.
Sensors, 2021

Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis.
Enterp. Inf. Syst., 2021

Cybersecurity Revisited: Honeytokens meet Google Authenticator.
CoRR, 2021

Security and Privacy for Artificial Intelligence: Opportunities and Challenges.
CoRR, 2021

The Agile Incident Response for Industrial Control Systems (AIR4ICS) framework.
Comput. Secur., 2021

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.
IEEE Access, 2021

A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Digital Twins and Cyber Security - solution or challenge?
Proceedings of the 6th South-East Europe Design Automation, 2021

A novel Two-Factor HoneyToken Authentication Mechanism.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education.
J. Comput. Virol. Hacking Tech., 2020

Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues.
Telecommun. Syst., 2020

Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation.
EAI Endorsed Trans. Security Safety, 2020

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.
Internet Technol. Lett., 2020

Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems".
J. Inf. Secur. Appl., 2020

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study.
J. Inf. Secur. Appl., 2020

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.
Future Internet, 2020

How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems.
EAI Endorsed Trans. Cloud Syst., 2020

A novel principle to validate digital forensic models.
Digit. Investig., 2020

A novel Two-Factor HoneyToken Authentication Mechanism.
CoRR, 2020

A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles.
Array, 2020

A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports.
IEEE Access, 2020

A Survey of COVID-19 Contact Tracing Apps.
IEEE Access, 2020

Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Towards IoT Security Automation and Orchestration.
Proceedings of the Second IEEE International Conference on Trust, 2020

Security and Privacy for a Sustainable Internet of Things.
Proceedings of the Second IEEE International Conference on Trust, 2020

From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020

A NIS Directive Compliant Cybersecurity Maturity Assessment Framework.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets.
Sci. Program., 2019

Blockchain Technologies for the Internet of Things: Research Issues and Challenges.
IEEE Internet Things J., 2019

Published incidents and their proportions of human error.
Inf. Comput. Secur., 2019

Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector.
Int. J. Medical Informatics, 2019

Developing cyber peacekeeping: Observation, monitoring and reporting.
Gov. Inf. Q., 2019

Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures.
CoRR, 2019

Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership.
Comput. Secur., 2019

AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes.
Comput. Secur., 2019

Exploring the role of work identity and work locus of control in information security awareness.
Comput. Secur., 2019

HEART-IS: A novel technique for evaluating human error-related information security incidents.
Comput. Secur., 2019

Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique.
IEEE Access, 2019

Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form.
IEEE Access, 2019

Intrusion Detection System for Platooning Connected Autonomous Vehicles.
Proceedings of the 4th South-East Europe Design Automation, 2019

Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS).
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

2018
Vulnerability Assessment of Cyber Security for SCADA Systems.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

SEQUIN: a grammar inference framework for analyzing malicious system behavior.
J. Comput. Virol. Hacking Tech., 2018

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures.
EAI Endorsed Trans. Security Safety, 2018

Vulnerability Analysis of Network Scanning on SCADA Systems.
Secur. Commun. Networks, 2018

Editorial: Industrial Internet of Things (I2oT).
Mob. Networks Appl., 2018

An introduction to cyber peacekeeping.
J. Netw. Comput. Appl., 2018

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes.
J. Netw. Comput. Appl., 2018

Cyber security of critical infrastructures.
ICT Express, 2018

Developing Cyber Buffer Zones.
CoRR, 2018

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.
CoRR, 2018

Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging.
IEEE Access, 2018

Analysis of Published Public Sector Information Security Incidents and Breaches to establish the Proportions of Human Error.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Class Balanced Similarity-Based Instance Transfer Learning for Botnet Family Classification.
Proceedings of the Discovery Science - 21st International Conference, 2018

2017
Semantics-aware detection of targeted attacks: a survey.
J. Comput. Virol. Hacking Tech., 2017

Authentication Protocols for Internet of Things: A Comprehensive Survey.
Secur. Commun. Networks, 2017

Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
J. Sens. Actuator Networks, 2017

Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security".
J. Inf. Secur. Appl., 2017

A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017

On data leakage from non-production systems.
Inf. Comput. Secur., 2017

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.
Int. J. Cyber Warf. Terror., 2017

A security architectural pattern for risk management of industry control systems within critical national infrastructure.
Int. J. Crit. Infrastructures, 2017

Internet of Cloud: Security and Privacy issues.
CoRR, 2017

An Introduction to Cyber Peacekeeping.
CoRR, 2017

The industrial control system cyber defence triage process.
Comput. Secur., 2017

Poster: Design of an Anomaly-based Threat Detection & Explication System.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Design of an Anomaly-based Threat Detection & Explication System.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Towards data privacy in heterogeneous cloud environments: An extension to the SANTA policy language.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

Towards location-aware access control and data privacy in inter-cloud communications.
Proceedings of the IEEE EUROCON 2017 -17th International Conference on Smart Technologies, 2017

2016
Security, Privacy and Trust in Cyber Physical Systems.
EAI Endorsed Trans. Security Safety, 2016

Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities.
EAI Endorsed Trans. Security Safety, 2016

Human behaviour as an aspect of cybersecurity assurance.
Secur. Commun. Networks, 2016

MIMO Techniques for Jamming Threat Suppression in Vehicular Networks.
Mob. Inf. Syst., 2016

Social Internet of Vehicles for Smart Cities.
J. Sens. Actuator Networks, 2016

Attribution of Cyber Attacks on Industrial Control Systems.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2016

Personalized Students' Profile Based On Ontology and Rule-based Reasoning.
EAI Endorsed Trans. e Learn., 2016

A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development.
CoRR, 2016

Authentication Protocols for Internet of Things: A Comprehensive Survey.
CoRR, 2016

A Survey on Privacy-preserving Schemes for Smart Grid Communications.
CoRR, 2016

Human Behaviour as an aspect of Cyber Security Assurance.
CoRR, 2016

Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System.
Proceedings of the Industrial Networks and Intelligent Systems, 2016

Security Visualization: Detecting Denial of Service.
Proceedings of the Industrial Networks and Intelligent Systems, 2016

Towards a Distributed Runtime Monitor for ICS/SCADA Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Measuring the Risk of Cyber Attack in Industrial Control Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

User interface design for privacy awareness in eHealth technologies.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Special issue on the Security Track at the ACM Symposium on Applied Computing 2013.
Int. J. Inf. Sec., 2015

Cyber warfare: Issues and challenges.
Comput. Secur., 2015

A Robust Eco-Routing Protocol against Malicious Data in Vehicular Networks.
Proceedings of the 8th IFIP Wireless and Mobile Networking Conference, 2015

Insecure by Design: Using Human Interface Devices to exploit SCADA systems.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Towards Agile Industrial Control Systems Incident Response.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

An Industrial Control Systems incident response decision framework.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Critical Theory as an Approach to the Ethics of Information Security.
Sci. Eng. Ethics, 2014

An Extended Stable Marriage Problem Algorithm for Clone Detection.
CoRR, 2014

Formality, Agility, Security, and Evolution in Software Development.
Computer, 2014

Study of Architectural Impact On Software Sustainability.
Proceedings of the Third International Workshop on Requirements Engineering for Sustainable Systems, 2014

Low-Latency Service Data Aggregation Using Policy Obligations.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Position Paper: Safety and Security Monitoring in ICS/SCADA Systems.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

2013
Verification and enforcement of access control policies.
Formal Methods Syst. Des., 2013

Dynamic Access Control Policies: Specification and Verification.
Comput. J., 2013

RFID systems from a cyber-physical systems perspective.
Proceedings of the 11th Workshop on Intelligent Solutions in Embedded Systems, 2013

A Model-Based Approach for RFID Application Testing.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An Initial Investigation into Attribution in SCADA Systems.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

2012
Data Confidentiality in Mobile Ad hoc Networks
CoRR, 2012

SCADA security in the light of Cyber-Warfare.
Comput. Secur., 2012

Efficient Data Processing for Large-Scale Cloud Services.
Proceedings of the Eighth IEEE World Congress on Services, 2012

Multi-Factor Authentication Using Hardware Information and User Profiling Techniques.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

2011
New Framework for Dynamic Policy Management in Grid Environments.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

Controlling Data Dissemination.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

New Framework for Policy Support for Mobile Grid Services.
Proceedings of the CRiSIS 2011, 2011

2010
Optimizing Software Quality Assurance.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Decentralized XACML Overlay Network.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A Property Based Framework for Trust and Reputation in Mobile Computing.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Concurrent Enforcement of Usage Control Policies.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

2007
The development of secure multi-agent systems.
PhD thesis, 2007

A note on the formalisation of UCON.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Deriving Enforcement Mechanisms from Policies.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

2006
A Compositional Event & Time-Based Policy Model.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

2005
Analysis and Run-Time Verification of Dynamic Security Policies.
Proceedings of the Defence Applications of Multi-Agent Systems, International Workshop, 2005

Autonomous Agents and Multi -agent Systems (AAMAS) for the Military - Issues and Challenges.
Proceedings of the Defence Applications of Multi-Agent Systems, International Workshop, 2005


  Loading...