Leandros A. Maglaras

Orcid: 0000-0001-5360-9782

Affiliations:
  • De Montfort University, School of Computer Science and Informatics, Leicester, UK


According to our database1, Leandros A. Maglaras authored at least 160 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems.
CoRR, 2024

Review of Generative AI Methods in Cybersecurity.
CoRR, 2024

Cyber-Twin: Digital Twin-boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks.
CoRR, 2024

Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing.
Comput., 2024

2023
Digitization of healthcare sector: A study on privacy and security concerns.
ICT Express, August, 2023

Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications.
J. Sens. Actuator Networks, June, 2023

Internet of drones security: Taxonomies, open issues, and future directions.
Veh. Commun., February, 2023

ESIKE: An Efficient and Secure Internet Key Exchange Protocol.
Wirel. Pers. Commun., 2023

A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing.
Sensors, 2023

A novel autonomous container-based platform for cybersecurity training and research.
PeerJ Comput. Sci., 2023

A Novel Authentication Method That Combines Honeytokens and Google Authenticator.
Inf., 2023

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise.
Inf. Comput. Secur., 2023

Toward a real-time TCP SYN Flood DDoS mitigation using Adaptive Neuro-Fuzzy classifier and SDN Assistance in Fog Computing.
CoRR, 2023

Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing.
CoRR, 2023

Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper.
CoRR, 2023

A Blockchain-based two Factor Honeytoken Authentication System.
CoRR, 2023

Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things.
CoRR, 2023

Review of the NIST Light-weight Cryptography Finalists.
CoRR, 2023

Reliability Analysis of Fault Tolerant Memory Systems.
Proceedings of the 8th South-East Europe Design Automation, 2023

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.
Proceedings of the IEEE Globecom Workshops 2023, 2023

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

Scalable Multi-domain Trust Infrastructures for Segmented Networks.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

2022
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning.
Dataset, April, 2022

Cybersecurity of Critical Infrastructures: Challenges and Solutions.
Sensors, 2022

A multiplayer game model to detect insiders in wireless sensor networks.
PeerJ Comput. Sci., 2022

FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.
J. Parallel Distributed Comput., 2022

Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends.
IEEE Internet Things Mag., 2022

A Health Focused Text Classification Tool (HFTCT).
CoRR, 2022

From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity.
Comput., 2022

Transforming Points of Single Contact Data into Linked Data.
Comput., 2022

Reliability, Security, and Privacy in Power Grids.
Computer, 2022

DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data.
IEEE Access, 2022

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.
IEEE Access, 2022

An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks.
IEEE Access, 2022

Security Revisited: Honeytokens meet Google Authenticator.
Proceedings of the 7th South-East Europe Design Automation, 2022

Enhancing Privacy of Online Chat Apps Utilising Secure Node End-to-End Encryption (SNE2EE).
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms.
Proceedings of the IEEE INFOCOM 2022, 2022

FFDA: A novel Four-Factor Distributed Authentication mechanism.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Inferring Probabilistic Boolean Networks from Steady-State Gene Data Samples.
Proceedings of the Complex Networks and Their Applications XI, 2022

2021
Mapping of the Security Requirements of GDPR and NISD.
EAI Endorsed Trans. Security Safety, 2021

WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.
Sensors, 2021

RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks.
Secur. Commun. Networks, 2021

Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia.
PeerJ Comput. Sci., 2021

EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles.
J. Inf. Secur. Appl., 2021

Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies.
IEEE CAA J. Autom. Sinica, 2021

Cybersecurity Revisited: Honeytokens meet Google Authenticator.
CoRR, 2021

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.
IEEE Access, 2021

Blockchain Technology: A case study in supply chain management.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Digital Twins and Cyber Security - solution or challenge?
Proceedings of the 6th South-East Europe Design Automation, 2021

Uncuffed: A Blockchain-based Secure Messaging System.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

Artificial Intelligence as Enabler for Sustainable Development.
Proceedings of the 2021 IEEE International Conference on Engineering, 2021

Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

A novel Two-Factor HoneyToken Authentication Mechanism.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Quantum Cryptography in Maritime Telecommunications.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles.
Proceedings of the Cognitive Radio Oriented Wireless Networks and Wireless Internet, 2021

2020
DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids.
IEEE Trans. Engineering Management, 2020

Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues.
Telecommun. Syst., 2020

Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems.
Sensors, 2020

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.
Sensors, 2020

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.
Internet Technol. Lett., 2020

On the conference key distribution system with user anonymity.
J. Inf. Secur. Appl., 2020

Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems".
J. Inf. Secur. Appl., 2020

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study.
J. Inf. Secur. Appl., 2020

The Security Aspects of Automotive Over-the-Air Updates.
Int. J. Cyber Warf. Terror., 2020

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.
Future Internet, 2020

A novel Two-Factor HoneyToken Authentication Mechanism.
CoRR, 2020

Smart Homes: Security Challenges and Privacy Concerns.
CoRR, 2020

ZKPs: Does This Make The Cut? Recent Advances and Success of Zero-Knowledge Security Protocols.
CoRR, 2020

A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles.
Array, 2020

Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges.
IEEE Access, 2020

The Impact of the Adversary's Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles.
Proceedings of the 5th South-East Europe Design Automation, 2020

The Insider Threat: Reasons, Effects and Mitigation Techniques.
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020

From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020

Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

A NIS Directive Compliant Cybersecurity Maturity Assessment Framework.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

ZKPs: Does This Make the Cut?
Proceedings of the 6th Collaborative European Research Conference (CERC 2020), 2020

2019
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.
Sensors, 2019

Estimating the Relative Speed of RF Jammers in VANETs.
Secur. Commun. Networks, 2019

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.
Secur. Commun. Networks, 2019

Blockchain Technologies for the Internet of Things: Research Issues and Challenges.
IEEE Internet Things J., 2019

Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector.
Int. J. Medical Informatics, 2019

Developing cyber peacekeeping: Observation, monitoring and reporting.
Gov. Inf. Q., 2019

Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends.
CoRR, 2019

Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures.
CoRR, 2019

DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services.
Comput., 2019

HEART-IS: A novel technique for evaluating human error-related information security incidents.
Comput. Secur., 2019

Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique.
IEEE Access, 2019

Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form.
IEEE Access, 2019

Stochastic Optimization of Electric Vehicle Charging Stations.
Proceedings of the 2019 IEEE SmartWorld, 2019

Intrusion Detection System for Platooning Connected Autonomous Vehicles.
Proceedings of the 4th South-East Europe Design Automation, 2019

A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

2018
Vulnerability Assessment of Cyber Security for SCADA Systems.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Defence Mechanisms for Public Systems.
EAI Endorsed Trans. Security Safety, 2018

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures.
EAI Endorsed Trans. Security Safety, 2018

NIS directive: The case of Greece.
EAI Endorsed Trans. Security Safety, 2018

Vulnerability Analysis of Network Scanning on SCADA Systems.
Secur. Commun. Networks, 2018

Editorial: Industrial Internet of Things (I2oT).
Mob. Networks Appl., 2018

An introduction to cyber peacekeeping.
J. Netw. Comput. Appl., 2018

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes.
J. Netw. Comput. Appl., 2018

Cyber security of critical infrastructures.
ICT Express, 2018

Convergence of detection probability, computational gains, and asymptotic analysis of an algorithm for physical-layer intrusion detection system.
Trans. Emerg. Telecommun. Technol., 2018

Developing Cyber Buffer Zones.
CoRR, 2018

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.
CoRR, 2018

Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging.
IEEE Access, 2018

Trace-Based Verification of Rule-Based Service Choreographies.
Proceedings of the 11th IEEE Conference on Service-Oriented Computing and Applications, 2018

Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices.
Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), 2018

2017
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems.
EAI Endorsed Trans. Security Safety, 2017

Authentication Protocols for Internet of Things: A Comprehensive Survey.
Secur. Commun. Networks, 2017

Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
J. Sens. Actuator Networks, 2017

Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security".
J. Inf. Secur. Appl., 2017

A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017

On data leakage from non-production systems.
Inf. Comput. Secur., 2017

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.
Int. J. Cyber Warf. Terror., 2017

A security architectural pattern for risk management of industry control systems within critical national infrastructure.
Int. J. Crit. Infrastructures, 2017

Internet of Cloud: Security and Privacy issues.
CoRR, 2017

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2017

Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems.
Comput. Secur., 2017

The industrial control system cyber defence triage process.
Comput. Secur., 2017

Security and Privacy in Fog Computing: Challenges.
IEEE Access, 2017

2016
Social Clustering of Vehicles Based on Semi-Markov Processes.
IEEE Trans. Veh. Technol., 2016

A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems.
IEEE Trans. Ind. Informatics, 2016

Security, Privacy and Trust in Cyber Physical Systems.
EAI Endorsed Trans. Security Safety, 2016

Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities.
EAI Endorsed Trans. Security Safety, 2016

Human behaviour as an aspect of cybersecurity assurance.
Secur. Commun. Networks, 2016

Cyberterrorism targeting the general public through social media.
Secur. Commun. Networks, 2016

MIMO Techniques for Jamming Threat Suppression in Vehicular Networks.
Mob. Inf. Syst., 2016

Social Internet of Vehicles for Smart Cities.
J. Sens. Actuator Networks, 2016

Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems.
J. Inf. Secur. Appl., 2016

Attribution of Cyber Attacks on Industrial Control Systems.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2016

Personalized Students' Profile Based On Ontology and Rule-based Reasoning.
EAI Endorsed Trans. e Learn., 2016

A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development.
CoRR, 2016

Authentication Protocols for Internet of Things: A Comprehensive Survey.
CoRR, 2016

A Survey on Privacy-preserving Schemes for Smart Grid Communications.
CoRR, 2016

Human Behaviour as an aspect of Cyber Security Assurance.
CoRR, 2016

Blocking epidemic propagation in vehicular networks.
Proceedings of the 12th Annual Conference on Wireless On-demand Network Systems and Services, 2016

Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System.
Proceedings of the Industrial Networks and Intelligent Systems, 2016

Security Visualization: Detecting Denial of Service.
Proceedings of the Industrial Networks and Intelligent Systems, 2016

Measuring the Risk of Cyber Attack in Industrial Control Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

2015
A novel intrusion detection method based on OCSVM and K-means recursive clustering.
EAI Endorsed Trans. Security Safety, 2015

Coupling of the synchronization stations of an Extended Kanban system.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015

Social Aspect of Vehicular Communications.
EAI Endorsed Trans. Cloud Syst., 2015

A Robust Eco-Routing Protocol against Malicious Data in Vehicular Networks.
Proceedings of the 8th IFIP Wireless and Mobile Networking Conference, 2015

Insecure by Design: Using Human Interface Devices to exploit SCADA systems.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

An Industrial Control Systems incident response decision framework.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Delay Efficient Backpressure Routing in Wireless Ad Hoc Networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2014

A Distributed IDS for Industrial Control Systems.
Int. J. Cyber Warf. Terror., 2014

OCSVM model combined with K-means recursive clustering for intrusion detection in SCADA systems.
Proceedings of the 10th International Conference on Heterogeneous Networking for Quality, 2014

2013
Enhanced Spring Clustering in VANETs with Obstruction Considerations.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Exploiting vehicular communications for reducing CO2 emissions in urban environments.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

Clustering in Urban environments: Virtual forces applied to vehicles.
Proceedings of the IEEE International Conference on Communications, 2013

Optimization of Corona onset and breakdown voltage of small air gaps stressed by DC and impulse voltages.
Proceedings of Eurocon 2013, 2013

2012
New measures for characterizing the significance of nodes in wireless ad hoc networks via localized path-based neighborhood analysis.
Soc. Netw. Anal. Min., 2012

Distributed clustering in vehicular networks.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

Distributed Skip Air Index for smart broadcasting in intelligent transportation systems.
Proceedings of the 2012 IEEE Intelligent Vehicles Symposium, 2012

Optimization of Corona Effects in Small Air Gaps Stressed by DC Voltages.
Proceedings of the Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, 2012

2011
Layered backpressure scheduling for delay reduction in ad hoc networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

2009
New Metrics for Characterizing the Significance of Nodes in Wireless Networks via Path-Based Neighborhood Analysis.
Proceedings of the PCI 2009, 2009


  Loading...