George Loukas

Professor George Loukas Head of IoT and Security (ISEC) Research Centre

Professor of Cyber Security

Professor of Cyber Security with particular interest in applied and data-driven cyber security and Internet of Things applications. He is the Head of the IoT and Security Centre (ISEC), which is comprised of 27 members of staff and PhD students and is currently a partner or coordinator in 8 research projects funded by RCUK and the European Commission.

Professor Loukas is currently project coordinator of the 2.4M GBP EPSRC CHAI project on cyber hygiene for AI systems in domestic life, and of the 2.9M Euro H2020 EUNOMIA project on information trustworthiness in social media. Previously, he was UoG P.I. for the EPSRC CHIST-ERA COCOON project, coordinating work in emotion-aware cyber threat detection in smart homes, P.I. for the EU H2020 TRILLION project on the secure collaboration of citizens and law enforcement agencies via social networks; and project coordinator for the GSIKE Blockchain-enhanced "Secure Hajj and Umrah" project, working on decentralised authentication for IoT services for pilgrims.

Professor Loukas has a PhD in Network Security from Imperial College. He is on the editorial board of IEEE Transactions on Information Forensics and Security as well as Elsevier's Simulation Modelling Practice and Theory. He has previously been on the editorial board of BCS's The Computer Journal and founding member of the IEEE working group on Internet of Things and Cultural Heritage. His 2015 book on cyber-physical attacks has been adopted in the curricula of universities internationally and was included in ACM’s top 10 of computing Milieux books and articles published that year.

For details of Dr. Loukas's research, you can visit here.

Responsibilities within the university

  • Head of Internet of Things and Security Centre"
  • Subject Group Leader for "Networks, Security and Forensics"
  • On the UoG REF2021 panel for UoA11.

Awards

    As coordinator or UoG PI:

    • EPSRC CHAI project (2.4M GBP), 2020-2023, project coordinator (453,000 GBP)
    • EU Horizon 2020 EUNOMIA project (2.5M Euro), 2019-2022, project coordinator and technical manager and UoG P.I. (512,000 Euro)
    • British Council GSIKE blockchain-enhanced "Secure Hajj and Umrah" (42,000 GBP), 2018-2019, overall coordinator and P.I.
    • EPSRC CHIST-ERA Cocoon project (277,000 Euro), 2017-2018, P.I.
    • EU Horizon 2020 TRILLION project (335,000 Euro), 2015-2018, P.I.
    • EU ISEC 2011: ECENTRE - Cybercrime Centre of Excellence Network for Training Research and Education (63,000 Euro), 2013-2014, P.I.

    As co-I:

    • EU Horizon 2020 RESCUER project (7M Euro), 2021-2024, co-I
    • EU Horizon 2020 ENSURESEC project (9M Euro), 2020-2022, co-I
    • EU Horizon 2020 C4IIoT project (6.3M Euro), 2019-2022, co-I
    • EU Horizon 2020 CUREX project (5M Euro), 2019-2022, co-I
    • Dstl 3-year PhD studentship on "Safeguarding Autonomous Vehicles from Cyber Attacks" (117,000 GBP), 2013-2016, co-I

Recognition

  • (since 2021) Editorial Board, IEEE Transactions on Information Forensics and Security
  • (since 2017) Editorial Board, Elsevier Simulation Modelling Practice and Theory
  • (2010-2021) Editorial Board, BCS Computer Journal
  • Founding member, IEEE working group on Internet of Things and Cultural Heritage

Research / Scholarly interests

  • Internet of Things and Cyber-physical system security
  • Machine learning applications in cyber security
  • Information trustworthiness
  • Human-as-a-Security-Sensor
  • Digital forensics​
  • Network security

Recent publications

Article

Budimir, Sanja , Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal , Loukas, George , Roesch, Etienne (2021), Emotional reactions to cybersecurity breach situations: A scenario-based survey study. JMIR Publications. In: , , , . JMIR Publications, Journal of Medical Internet Research, 23: e24879 (5) 1438-8871 (Online) (doi: https://doi.org/10.2196/24879).

Kasnesis, Panagiotis , Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros , Sakellari, Georgia , Patrikakis, Charalampos , Loukas, George (2021), Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Elsevier B.V.. In: , , , . Elsevier B.V., Applied Soft Computing, 108: 107413 ISSN: 1568-4946 (Print), (doi: https://doi.org/10.1016/j.asoc.2021.107413) NB Item availability restricted.

Nisioti, Antonia , Loukas, George, Laszka, Aron, Panaousis, Emmanouil (2021), Data-driven decision support for optimizing cyber forensic investigations. IEEE. In: , , , . IEEE, IEEE Transactions on Information Forensics and Security, 16 . pp. 2397-2412 ISSN: 1556-6013 (Print), 1556-6021 (Online) (doi: https://doi.org/10.1109/TIFS.2021.3054966).

Heartfield, Ryan , Loukas, George, Bezemskij, Anatolij, Panaousis, Emmanouil (2020), Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE. In: , , , . IEEE, IEEE Transactions on Information Forensics & Security ISSN: 1556-6013 (Print), 1556-6021 (Online) (doi: ).

Budimir, S. , Fontaine, J., Huijts, N., Haans, A. , Loukas, G. , Ras, I. , Roesch, E. (2020), Emotions, personality, and psychopathology of cybersecurity breach victims. Elsevier. In: , , , . Elsevier, Journal of Psychosomatic Research, 133: 110059 ISSN: 0022-3999 (Print), 1879-1360 (Online) (doi: https://doi.org/10.1016/j.jpsychores.2020.110059).

Chen, Jiahui , Ling, Jie, Ning, Jianting, Panaousis, Emmanouil , Loukas, George , Liang, Kaitai , Chen, Jiageng (2020), Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. SAGE. In: , , , . SAGE, International Journal of Distributed Sensor Networks, 16 (4) . pp. 1-16 ISSN: 1550-1329 (Print), 1550-1477 (Online) (doi: https://doi.org/10.1177/1550147720914775).

Loukas, George , Patrikakis, Charalampos Z., Wilbanks, Linda R. (2020), Digital deception: Cyber fraud and online misinformation. IEEE. In: , , , . IEEE, IT Professional, 22 (2) . pp. 19-20 ISSN: 1520-9202 (Print), 1941-045X (Online) (doi: https://doi.org/10.1109/MITP.2020.2980090).

Theodorakopoulos, George , Panaousis, Emmanouil, Liang, Kaitai, Loukas, George (2020), On-the-fly privacy for location histograms. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Transactions on Dependable and Secure Computing ISSN: 1545-5971 (Print), 1941-0018 (Online) (doi: https://doi.org/10.1109/TDSC.2020.2980270).

Abdur Rahman, Md , Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno , Barnes, Stuart , Fioranelli, Francesco , Yang, Shufan , Romain, Olivier , Abbasi, Qammer , Loukas, George (2019), A secure occupational therapy framework for monitoring cancer patients’ quality of life. MDPI. In: , , , . MDPI, Sensors, 19: 5258 (23) ISSN: 1424-8220 (Print), (doi: https://doi.org/10.3390/s19235258).

Jaddoa, Ali , Sakellari, Georgia, Panaousis, Emmanouil, Loukas, George , Sarigiannidis, Panagiotis G. (2019), Dynamic decision support for resource offloading in heterogeneous internet of things environments. Elsevier. In: , , , . Elsevier, Simulation Modelling Practice and Theory, 101: 102019 ISSN: 1569-190X (Print), (doi: https://doi.org/10.1016/j.simpat.2019.102019).

Pitropakis, Nikolaos , Panaousis, Emmanouil, Giannetsos, Thanassis, Anastasiadis, Eleftherios , Loukas, George (2019), A taxonomy and survey of attacks against machine learning. Elsevier. In: , , , . Elsevier, Computer Science Review, 34: 100199 ISSN: 1574-0137 (Print), (doi: https://doi.org/10.1016/j.cosrev.2019.100199).

Kogias, Dimitrios , Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria , Katsadouros, Evangelos , Loukas, George , Heartfield, Ryan , Patrikakis, Charalampos Z. (2019), Towards a blockchain-enabled crowdsourcing platform. IEEE. In: , , , . IEEE, IT Professional, 21 (5) . pp. 18-25 ISSN: 1520-9202 (Print), 1941-045X (Online) (doi: https://doi.org/10.1109/MITP.2019.2929503).

Brett, Terry , Loukas, George, Moreno, Yamir, Perra, Nicola (2019), Spreading of computer viruses on time-varying networks. American Physical Society. In: , , , . American Physical Society, Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99: 050303(R) (5) ISSN: 1539-3755 (Print), (doi: https://doi.org/10.1103/PhysRevE.99.050303) NB Item availability restricted.

He, Kai , Mao, Yijun, Ning, Jianting, Liang, Kaitai , Huang, Xinyi , Panaousis, Emmanouil , Loukas, George (2019), A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Access . pp. 1-12 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2019.2906290).

Abdur Rahman, Md. , Shamim Hossain, M., Loukas, George, Hassanain, Elham , Rahman, Syed Sadiqur , Alhamid, Mohammed F. , Guizani, Mohsen (2018), Blockchain-based mobile edge computing framework for secure therapy applications. IEEE. In: , , , . IEEE, IEEE Access, 6 . pp. 72469-72478 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2018.2881246).

Loukas, George , Karapistoli, Eirini, Panaousis, Emmanouil, Sarigiannidis, Panagiotis , Bezemskij, Anatolij , Vuong, Tuan (2018), A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Elsevier B.V.. In: , , , . Elsevier B.V., Ad Hoc Networks, 84 . pp. 124-147 ISSN: 1570-8705 (Print), (doi: https://doi.org/10.1016/j.adhoc.2018.10.002).

Heartfield, Ryan , Loukas, George, Budimir, Sanja, Bezemskij, Anatolij , Fontaine, Johnny R. J. , Filippoupolitis, Avgoustinos , Roesch, Etienne (2018), A taxonomy of cyber-physical threats and impact in the smart home. Elsevier. In: , , , . Elsevier, Computers and Security, 78 . pp. 398-428 ISSN: 0167-4048 (Print), (doi: https://doi.org/10.1016/j.cose.2018.07.011).

Heartfield, Ryan and , Loukas, George (2018), Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Elsevier. In: , , , . Elsevier, Computers & Security, 76 . pp. 101-127 ISSN: 0167-4048 (Print), (doi: http://dx.doi.org/10.1016/j.cose.2018.02.020).

Loukas, George , Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia , Yoon, Yongpil , Gan, Diane (2017), Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Access, 6 . pp. 3491-3508 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2017.2782159).

Filippoupolitis, Avgoustinos , Oliff, William, Takand, Babak, Loukas, George (2017), Location-enhanced activity recognition in indoor environments using off the shelf smart watch technology and BLE beacons. MDPI. In: , , , . MDPI, Sensors, 17: 1230 (6) . pp. 1-25 ISSN: 1424-8220 (Print), 1424-8220 (Online) (doi: https://doi.org/10.3390/s17061230).

Patrikakis, Charalampos Z. and , Loukas, George (2017), Wear it and share it: Wearables and security. Cutter Information Corp. In: , , , . Cutter Information Corp, Cutter Executive Update ISSN: 2381-8816 (Print), (doi: http://www.cutter.com/article/wear-it-and-share-it-wearables-and-security-494466).

Heartfield, Ryan and , Loukas, George (2016), Predicting the performance of users as human sensors of security threats in social media. C-MRiC. In: , , , . C-MRiC, International Journal on Cyber Situational Awareness (IJCSA), 1 (1) ISSN: 2057-2182 (Print), 2057-2182 (Online) (doi: https://doi.org/10.22619/IJCSA.2016.100106).

Heartfield, Ryan , Loukas, George, Gan, Diane (2016), You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Access, 4 . pp. 6910-6928 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2016.2616285).

Loukas, George , Yoon, Yongpil, Sakellari, Georgia, Vuong, Tuan , Heartfield, Ryan (2016), Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Elsevier B.V.. In: , , , . Elsevier B.V., Simulation Modelling Practice and Theory, 73 . pp. 83-94 ISSN: 1569-190X (Print), 1878-1462 (Online) (doi: https://doi.org/10.1016/j.simpat.2016.08.005).

Loukas, George and , Patrikakis, Charalampos (2016), Cyber and physical threats to the internet of everything. Cutter Information Corp. In: , , , . Cutter Information Corp, Cutter IT Journal, 29 (7) . pp. 5-11 ISSN: 1522-7383 (Print), (doi: https://www.cutter.com/article/cyber-and-physical-threats-internet-everything-492241).

Loukas, George and , Patrikakis, Charalampos (2016), Security in the internet of everything era - opening statement. Cutter Information Corp. In: , , , . Cutter Information Corp, Cutter IT Journal, 29 (7) . pp. 3-4 ISSN: 1522-7383 (Print), (doi: https://www.cutter.com/article/security-internet-everything-opening-statemen-492231).

Gresty, David , Gan, Diane, Loukas, George, Ierotheou, Constantinos (2016), Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Elsevier. In: , , , . Elsevier, Digital Investigation, 16 (Suppl.) . pp. S124-S133 ISSN: 1742-2876 (Print), (doi: https://doi.org/10.1016/j.diin.2016.01.015) NB Item availability restricted.

Heartfield, Ryan and , Loukas, George (2016), A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM. In: , , , . ACM, ACM Computing Surveys (CSUR), 48: 37 (3) ISSN: 0360-0300 (Print), 1557-7341 (Online) (doi: http://dx.doi.org/10.1145/2835375).

Lent, Ricardo , Sakellari, Georgia, Loukas, George (2014), Strengthening the security of cognitive packet networks. Inderscience Publishers. In: , , , . Inderscience Publishers, International Journal of Advanced Intelligence Paradigms, 6 (1) . pp. 14-27 ISSN: 1755-0386 (Print), 1755-0394 (Online) (doi: http://dx.doi.org/10.1504/IJAIP.2014.059584).

Sakellari, Georgia and , Loukas, George (2013), A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing. Elsevier B.V.. In: , , , . Elsevier B.V., Simulation Modelling Practice and Theory, 39 . pp. 92-103 ISSN: 1569-190X (Print), (doi: http://dx.doi.org/10.1016/j.simpat.2013.04.002).

Loukas, George , Gan, Diane, Vuong, Tuan (2013), A review of cyber threats and defence approaches in emergency management. MDPI AG. In: , , , . MDPI AG, Future Internet, 5 (2) . pp. 205-236 ISSN: 1999-5903 (Print), (doi: http://dx.doi.org/10.3390/fi5020205).

Book

Loukas, George and , (2015), Cyber-physical attacks: A growing invisible threat. Elsevier Inc.. In: , , , . Elsevier Inc., Waltham, MA, USA (1st) . ISBN: 9780128012901 (doi: http://store.elsevier.com/product.jsp?isbn=9780128012901) NB Item availability restricted.

Book section

Panda, Sakshyam , Panaousis, Emmanouil, Loukas, George, Laoudias, Christos (2020), Optimizing investments in cyber hygiene for protecting healthcare users. Springer. In: From Lambda Calculus to Cybersecurity Through Program Analysis, , In: Alessandra Di Pierro, Pasquale Malacaria, Rajagopal Nagarajan (eds.), From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retiremen. Springer, , 12065 . pp. 268-291 . ISBN: 9783030411022 (doi: https://doi.org/10.1007/978-3-030-41103-9_11) NB Item availability restricted.

Sorace, Silvio , Quercia, Elisabeth, La Mattina, Ernesto, Patrikakis, Charalampos Z. , Bacon, Liz , Loukas, George , MacKinnon, Lachlan (2018), Serious games: an attractive approach to improve awareness of community policing technologies. Springer, Cham. In: Next Generation Community Policing Conference, 25 October 2017, Crete, Greece In: Georgios Leventakis, M. R. Haberfeld (eds.), Community-Oriented Policing and Technological Innovation. Springer, Cham, . pp. 1-9 . ISBN: 9783319892931 (doi: https://doi.org/10.1007/978-3-319-89294-8_1).

MacKinnon, Lachlan , Bacon, Liz, Gan, Diane, Loukas, George , Chadwick, David , Frangiskatos, Dimitrios (2013), Cyber security countermeasures to combat cyber terrorism. Butterworth-Heinemann. In: , , In: Babak Akhgar, Simeon Yates (eds.), Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologie. Butterworth-Heinemann, Oxford, UK . pp. 234-256 . ISBN: 9780124071919 (doi: ).

Conference item

Kapetanakis, Stelios , Filippoupolitis, Avgoustinos, Loukas, George, Al Murayziq, Tariq Saad (2014), Profiling cyber attackers using case-based reasoning. CEUR. In: 19th UK Workshop on Case-Based Reasoning (UKCBR 2014), 9 December 2014, Peterhouse College, Cambridge, UK , Nineteenth UK Workshop on Case-Based Reasoning (UK-CBR 2014. CEUR, (doi: ).

Conference proceedings

Odeleye, Blessing , Loukas, George, Heartfield, Ryan, Spyridonis, Fotios (2021), Detecting framerate-oriented cyber attacks on user experience in virtual reality. VR4Sec. In: , , In: Stefan Schneegass, Mohamed Khamis, Florian Alt, Uwe Gruenefeld, Karola Marky, Alia Saad, Jonathan Liebers, Jonas Auda (eds.), VR4Sec: 1st International Workshop on Security for XR and XR for Securit. VR4Sec, (1st) (doi: https://vr4sec.hcigroup.de/).

Parsons, Emily Kate , Panaousis, Emmanouil, Loukas, George (2020), How secure is home: assessing human susceptibility to IoT threats. ACM. In: , , , PCI 2020: 24th Pan-Hellenic Conference on Informatic. ACM, . pp. 64-71 . ISBN: 9781450388979 (doi: https://doi.org/10.1145/3437120.3437277).

Siniosoglou, Ilias , Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis , Sarigiannidis, Antonios , Sakellari, Georgia , Loukas, George , Sarigiannidis, Panagiotis (2020), NeuralPot: an industrial honeypot implementation based on convolutional neural networks. IEEE. In: , , , 2020 IEEE Symposium on Computers and Communications (ISCC. IEEE, . ISBN: 9781728180878ISSN: 1530-1346 (Print), 2642-7389 (Online) (doi: https://doi.org/10.1109/ISCC50000.2020.9219712).

Kasnesis, Panagiotis , Heartfield, Ryan, Toumanidis, Lazaros, Liang, Xing , Loukas, George , Patrikakis, Charalampos Z. (2020), A prototype deep learning paraphrase identification service for discovering information cascades in social networks. IEEE. In: , , , IEEE International Conference on Multimedia and Exp. IEEE, . pp. 1-4 . ISBN: 9781728114859 (doi: https://doi.org/10.1109/ICMEW46912.2020.9106044).

Hossain, A. K. M. Mahtab and , Loukas, George (2019), Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. ACM. In: , , , MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Service. ACM, . pp. 424-433 . ISBN: 9781450372831 (doi: https://doi.org/10.1145/3360774.3360791).

Rahman, Md. Abdur , Loukas, George, Abdullah, Syed Maruf, Abdu, Areej , Rahman, Syed Sadiqur , Hassanain, Elham , Arafa, Yasmine (2019), Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. ACM. In: , , , Proceedings of the 2019 on International Conference on Multimedia Retrieva. ACM, New York, USA . pp. 404-407 . ISBN: 9781450367653 (doi: https://doi.org/10.1145/3323873.3326924).

Patrikakis, Charalampos Z. , Kogias, Dimitrios G., Loukas, George, Filippoupolitis, Avgoustinos , Oliff, William , Rahman, Syed Sadiqur , Sorace, Silvio , La Mattina, Ernesto , Quercia, Elisabeth (2018), On the successful deployment of community policing services: the TRILLION project case. IEEE. In: , , , Proceedings of 2018 IEEE International Conference on Consumer Electronics (ICCE. IEEE, . ISBN: 9781538630266 2158-4001 (Online) (doi: https://doi.org/10.1109/ICCE.2018.8326149).

Bezemskij, Anatolij , Loukas, George, Gan, Diane, Anthony, Richard (2018), Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. IEEE. In: , , , 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData. IEEE, . pp. 1-6 . ISBN: 9781538630679 (doi: https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20).

Oliff, William , Filippoupolitis, Avgoustinos, Loukas, George (2017), Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. ACM. In: , , , Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017. ACM, . ISBN: 9781450352437 (doi: ) NB Item availability restricted.

Heartfield, Ryan , Loukas, George, Gan, Diane (2017), An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. IEEE. In: Software Engineering Research, Management and Applications, 7-9 June 2017, University of Greenwich , 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA. IEEE, . ISBN: 9781509057573 (doi: https://doi.org/10.1109/SERA.2017.7965754).

Oliff, William , Filippoupolitis, Avgoustinos, Loukas, George (2017), Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems. IEEE. In: , , , 2017 IEEE 15th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2017. IEEE, (SS2-3) . ISBN: 9781509057573 978-1-5090-5756-6 (Online) (doi: https://doi.org/10.1109/SERA.2017.7965755).

Rahman, Syed Sadiqur , Heartfield, Ryan, Oliff, William, Loukas, George , Filippoupolitis, Avgoustinos (2017), Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices. IEEE. In: , , , 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA 2017. IEEE, . pp. 387-394 . ISBN: 9781509057573 978-1-5090-5756-6 (Online) (doi: https://doi.org/10.1109/SERA.2017.7965756).

Gresty, David W. , Loukas, George, Gan, Diane, Ierotheou, Constantinos (2017), Towards web usage attribution via graph community detection in grouped internet connection records. IEEE. In: , , , 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData. IEEE, Exeter, UK , 16 . pp. 365 -372 . ISBN: 9781538630662 (doi: https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61).

Bezemskij, Anatolij , Loukas, George, Anthony, Richard J., Gan, Diane (2017), Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. IEEE. In: , , , 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS. IEEE, . pp. 61-68 . ISBN: 9781509055678 (doi: https://doi.org/10.1109/IUCC-CSS.2016.017).