Stavros Shiaeles

Orcid: 0000-0003-3866-0672

According to our database1, Stavros Shiaeles authored at least 81 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Study of Ethereum's Transition from Proof-of-Work to Proof-of-Stake in Preventing Smart Contracts Criminal Activities.
Network, January, 2024

2023
Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence.
IEEE Trans. Intell. Transp. Syst., April, 2023

An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions.
Network, 2023

VulDetect: A novel technique for detecting software vulnerabilities using Language Models.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Cost-Efficient Threat Intelligence Platform Powered by Crowdsourced OSINT.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023


2022
Cybersecurity Challenges in the Maritime Sector.
Network, 2022

IDERES: Intrusion detection and response system using machine learning and attack graphs.
J. Syst. Archit., 2022

An Intelligent Platform for Threat Assessment and Cyber-Attack Mitigation in IoMT Ecosystems.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

Phishing Detection Using Machine Learning Algorithm.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

IPASS: A Novel Open-Source Intelligence Password Scoring System.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

CIDS: Collaborative Intrusion Detection System using Blockchain Technology.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
48,240 Malware samples and Binary Visualisation Images for Machine Learning Anomaly Detection.
Dataset, June, 2021

913 Malicious Network Traffic PCAPs and Binary Visualisation Images Dataset.
Dataset, March, 2021

LIMAP: A Lightweight Multilayer Authentication Protocol for WBAN.
Wirel. Pers. Commun., 2021

A Novel Multimodal Biometric Authentication System using Machine Learning and Blockchain.
CoRR, 2021

Tools for Network Traffic Generation - A Quantitative Comparison.
CoRR, 2021

Insider Detection using Deep Autoencoder and Variational Autoencoder Neural Networks.
CoRR, 2021

Thermal Management in Large Data Centers: Security Threats and Mitigation.
CoRR, 2021

Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems.
Comput. Networks, 2021

On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance.
Comput. Networks, 2021

Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Data Exfiltration: Methods and Detection Countermeasures.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Understanding and Mitigating Banking Trojans: From Zeus to Emotet.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021


2020
Digital forensics cloud log unification: Implementing CADF in Apache CloudStack.
J. Inf. Secur. Appl., 2020

Blockchain and Trust for Secure, End-User-Based and Decentralized IoT Service Provision.
IEEE Access, 2020

Thermal Management in Large Data Centres: Security Threats and Mitigation.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues.
Proceedings of the 2020 IEEE World Congress on Services, 2020

A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning.
Proceedings of the 2020 IEEE World Congress on Services, 2020

2nd IEEE Services Workshop on Cyber Security and Resilience in the Internet of Things (CSRIoT 2020).
Proceedings of the 2020 IEEE World Congress on Services, 2020

SoMIAP: Social Media Images Analysis and Prediction Framework.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Audio Interval Retrieval Using Convolutional Neural Networks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Comparative Analysis of Cryptographic Key Management Systems.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

BotSpot: Deep Learning Classification of Bot Accounts Within Twitter.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Detection of Insider Threats using Artificial Intelligence and Visualisation.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

On the Security of Permissioned Blockchain Solutions for IoT Applications.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

IoT Malware Network Traffic Classification using Visual Representation and Deep Learning.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms.
Proceedings of the Advanced Information Networking and Applications, 2020

Advanced metering infrastructures: security risks and mitigation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
A proactive malicious software identification approach for digital forensic examiners.
J. Inf. Secur. Appl., 2019

Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services.
Internet Things, 2019

A machine-learning approach to Detect users' suspicious behaviour through the Facebook wall.
CoRR, 2019

Blockchain Technologies for Enhanced Security and Privacy in the Internet of Things.
CoRR, 2019

Are cracked applications really free? An empirical analysis on Android devices.
CoRR, 2019

A Novel Blockchain-based Trust Model for Cloud Identity Management.
CoRR, 2019

Localising social network users and profiling their movement.
Comput. Secur., 2019

FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management.
Comput. Secur., 2019

Secured by Blockchain: Safeguarding Internet of Things Devices.
IEEE Consumer Electron. Mag., 2019

Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Improving Sentiment Analysis of Arabic Tweets.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

IoT Vulnerability Data Crawling and Analysis.
Proceedings of the 2019 IEEE World Congress on Services, 2019

DDoS Attack Mitigation through Root-DNS Server: A Case Study.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Data Encryption and Fragmentation in Autonomous Vehicles Using Raspberry Pi 3.
Proceedings of the 2019 IEEE World Congress on Services, 2019

On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection.
Proceedings of the 2019 IEEE World Congress on Services, 2019

A Novel Online Incremental Learning Intrusion Prevention System.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

FaceWallGraph: Using Machine Learning for Profiling User Behaviour from Facebook Wall.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

Data Protection by Design for cybersecurity systems in a Smart Home environment.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

Blockchain Solutions for Forensic Evidence Preservation in IoT Environments.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

A novel approach for performance-based clustering and anagement of network traffic flows.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A Novel Malware Detection System Based on Machine Learning and Binary Visualization.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

Trusted, Decentralized and Blockchain-Based M2M Application Service Provision.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
A New Dynamic Trust Model for "On Cloud" Federated Identity Management.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Trust-Based Composition of M2M Application Services.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Detection of LDDoS Attacks Based on TCP Connection Parameters.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Blockchain-Based Trust Communities for Decentralized M2M Application Services.
Proceedings of the Advances on P2P, 2018

2017
Trust Integration for Security Optimisation in P2P-Based M2M Applications.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Framework for automated functional testing of P2P-based M2M applications.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

2015
FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks.
Comput. J., 2015

2013
Real time detection and response of distributed denial of service attacks for web services
PhD thesis, 2013

On-scene triage open source forensic tool chests: Are they effective?
Digit. Investig., 2013

2012
Real time DDoS detection using fuzzy estimators.
Comput. Secur., 2012


  Loading...