Internet of Things and Security Research Centre

Internet of Things and Security Research Centre

We equip the Internet of Things with the ability to adapt to the needs of human beings and self-protect against cyber-physical security and privacy threats.

Research Projects ISEC


Our current areas of research include Communications and Self-aware systems, IoT Security, Online Harms, Cyber-Physical Security, AI for Security, Threat Modelling, Formal Methods of Security, Cyber Risk Management, Cyber Forensics, Security Economics, Emergency Management, and Privacy.

Research activity

We have strong links with a number of companies within the security industry, with current technical collaborations on R&D, forensic investigations, IT security audits and penetration testing.

About us

ISEC's members have participated in a number of research projects in several areas of cyber security, communications and self-aware systems. These projects have been funded by the UK Research Councils, EU FP7 and the industry. Our latest research projects include CHIST-ERA/EPSRC Cocoon, which bridges research in emotion psychology with IoT security in a smart home, and H2020 TRILLION, which strengthens community policing with trusted and secure communications between communities and law enforcement agencies.

Related research

Explore the university's other research in this discipline.

Computer science and informatics


Computer science research at the University is contributing strongly to current developments, in particular around cybersecurity, artificial intelligence and data science.

Recent publications

Article

Zhao, Yi , Liang, Kaitai, Zhao, Yanqi, Yang, Bo , Ming, Yang , Panaousis, Emmanouil (2022), Practical algorithm substitution attack on extractable signatures. Springer. In: , , , Designs, Codes and Cryptography volum. Springer, Designs, Codes and Cryptography, 90 . pp. 921-937 ISSN: 0925-1022 (Print), 1573-7586 (Online) (doi: https://doi.org/10.1007/s10623-022-01019-1) NB Item availability restricted.

Sani, Abubakar Sadiq , Bertino, Elisa, Yuan, Dong, Meng, Ke , Dong, Zhao Yang (2022), SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Elsevier. In: , , , . Elsevier, Computers & Security, 115: 102610 ISSN: 0167-4048 (Print), (doi: https://doi.org/10.1016/j.cose.2022.102610) NB Item availability restricted.

Gourisetti, Sri Nikhil Gupta , Cali, Umit, Choo, Kim-Kwang Raymond, Escobar, Elizabeth , Gorog, Christopher , Lee, Annabelle , Mylrea, Michael , Pasetti, Marco , Rahimi, Farrokh , Reddi, Ramesh (2021), Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Elsevier. In: , , , . Elsevier, Sustainable Energy, Grids and Networks, 28: 100553 ISSN: 2352-4677 (Print), 2352-4677 (Online) (doi: https://doi.org/10.1016/j.segan.2021.100553) NB Item availability restricted.

González-Granadillo, Gustavo , Menesidou, Sofia Anna, Papamartzivanos, Dimitrios, Romeu, Ramon , Navarro-Llobet, Diana , Okoh, Caxton , Nifakos, Sokratis , Xenakis, Christos , Panaousis, Emmanouil (2021), Automated cyber and privacy risk management toolkit. MDPI. In: , , , . MDPI, Sensors, 21: 5493 (16) ISSN: 1424-8220 (Print), (doi: https://doi.org/10.3390/s21165493).

Nisioti, Antonia , Loukas, George, Rass, Stefan, Panaousis, Emmanouil (2021), Game-theoretic decision support for cyber forensic investigations. MDPI. In: , , , . MDPI, Sensors, 21: 5300 (16) ISSN: 1424-8220 (Print), (doi: https://doi.org/10.3390/s21165300).

Budimir, Sanja , Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal , Loukas, George , Roesch, Etienne (2021), Emotional reactions to cybersecurity breach situations: A scenario-based survey study. JMIR Publications. In: , , , . JMIR Publications, Journal of Medical Internet Research, 23: e24879 (5) 1438-8871 (Online) (doi: https://doi.org/10.2196/24879).

Kasnesis, Panagiotis , Heartfield, Ryan, Liang, Xing, Toumanidis, Lazaros , Sakellari, Georgia , Patrikakis, Charalampos , Loukas, George (2021), Transformer-based identification of stochastic information cascades in social networks using text and image similarity. Elsevier B.V.. In: , , , . Elsevier B.V., Applied Soft Computing, 108: 107413 ISSN: 1568-4946 (Print), (doi: https://doi.org/10.1016/j.asoc.2021.107413).

Nisioti, Antonia , Loukas, George, Laszka, Aron, Panaousis, Emmanouil (2021), Data-driven decision support for optimizing cyber forensic investigations. IEEE. In: , , , . IEEE, IEEE Transactions on Information Forensics and Security, 16 . pp. 2397-2412 ISSN: 1556-6013 (Print), 1556-6021 (Online) (doi: https://doi.org/10.1109/TIFS.2021.3054966).

Bhatia, Laksh , Tomic, Ivana, Fu, Anqi, Breza, Michael , McCann, Julie A. (2021), Control communication co-design for wide area cyber-physical systems. ACM. In: , , , . ACM, ACM Transactions on Cyber-Physical Systems, 5 (2) . pp. 1-27 ISSN: 2378-962X (Print), 2378-9638 (Online) (doi: https://doi.org/10.1145/3418528).

Heartfield, Ryan , Loukas, George, Bezemskij, Anatolij, Panaousis, Emmanouil (2020), Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE. In: , , , . IEEE, IEEE Transactions on Information Forensics & Security ISSN: 1556-6013 (Print), 1556-6021 (Online) (doi: ).

Khan, Taimoor and , Tomic, Ivana (2020), Securing industrial cyber-physical systems: A run-time multi-layer monitoring. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Transactions on Industrial Informatics, 17 (9) . pp. 6251-6259 ISSN: 1551-3203 (Print), 1941-0050 (Online) (doi: https://doi.org/10.1109/TII.2020.3032968).

Radoglou Grammatikis, Panagiotis , Sarigiannidis, Panagiotis, Efstathopoulos, Georgios, Panaousis, Emmanouil (2020), ARIES: a novel multivariate intrusion detection system for smart grid. MDPI. In: , , , . MDPI, Sensors, 20: 5305 (18) 1424-8220 (Online) (doi: https://doi.org/10.3390/s20185305).

Xu, Guangquan , Zhao, Yuyang, Litao, Jiao, Feng, Meiqi , Ji, Zhong , Panaousis, Emmanouil , Chen, Si , Zheng, Xi (2020), TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE. In: , , , . IEEE, IEEE Internet of Things, 8 (12) . pp. 9559-9567 2327-4662 (Online) (doi: https://doi.org/10.1109/JIOT.2020.3006066).

Budimir, S. , Fontaine, J., Huijts, N., Haans, A. , Loukas, G. , Ras, I. , Roesch, E. (2020), Emotions, personality, and psychopathology of cybersecurity breach victims. Elsevier. In: , , , . Elsevier, Journal of Psychosomatic Research, 133: 110059 ISSN: 0022-3999 (Print), 1879-1360 (Online) (doi: https://doi.org/10.1016/j.jpsychores.2020.110059).

Cui, Yuanbo , Gao, Fei, Shi, Yijie, Yin, Wei , Panaousis, Emmanouil , Liang, Kaitai (2020), An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE. In: , , , . IEEE, IEEE Access, 8 . pp. 99024-99036 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2020.2996940).

Loukas, George , Patrikakis, Charalampos Z., Wilbanks, Linda R. (2020), Digital deception: Cyber fraud and online misinformation. IEEE. In: , , , . IEEE, IT Professional, 22 (2) . pp. 19-20 ISSN: 1520-9202 (Print), 1941-045X (Online) (doi: https://doi.org/10.1109/MITP.2020.2980090).

Theodorakopoulos, George , Panaousis, Emmanouil, Liang, Kaitai, Loukas, George (2020), On-the-fly privacy for location histograms. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Transactions on Dependable and Secure Computing, 19 (1) . pp. 566-578 ISSN: 1545-5971 (Print), 1941-0018 (Online) (doi: https://doi.org/10.1109/TDSC.2020.2980270).

Sani, Abubakar Sadiq , Yuan, Dong, Bao, Wei, Dong, Zhao Yang (2020), A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet. IEEE. In: , , , . IEEE, IEEE Transactions on Industrial Informatics, 17 (1) . pp. 534-546 ISSN: 1551-3203 (Print), 1941-0050 (Online) (doi: https://doi.org/10.1109/TII.2020.2971707).

Abdur Rahman, Md , Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno , Barnes, Stuart , Fioranelli, Francesco , Yang, Shufan , Romain, Olivier , Abbasi, Qammer , Loukas, George (2019), A secure occupational therapy framework for monitoring cancer patients’ quality of life. MDPI. In: , , , . MDPI, Sensors, 19: 5258 (23) ISSN: 1424-8220 (Print), (doi: https://doi.org/10.3390/s19235258).

Jaddoa, Ali , Sakellari, Georgia, Panaousis, Emmanouil, Loukas, George , Sarigiannidis, Panagiotis G. (2019), Dynamic decision support for resource offloading in heterogeneous internet of things environments. Elsevier. In: , , , . Elsevier, Simulation Modelling Practice and Theory, 101: 102019 ISSN: 1569-190X (Print), (doi: https://doi.org/10.1016/j.simpat.2019.102019).

Xu, Guangquan , Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil , Liang, Kaitai , Wang, Hao , Li, Xiaotong (2019), DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE. In: , , , . IEEE, IEEE Access, 7 . pp. 174740-174749 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2019.2952213).

Li, Xiaoming , Xu, Guangquan, Zheng, Xi, Liang, Kaitai , Panaousis, Emmanouil , Li, Tao , Wang, Wei , Shen, Chao (2019), Using sparse representation to detect anomalies in complex WSNs. ACM. In: , , , . ACM, ACM Transactions on Intelligent Systems and Technology, 10: 64 (6) ISSN: 2157-6904 (Print), 2157-6912 (Online) (doi: https://doi.org/10.1145/3331147) NB Item availability restricted.

Pitropakis, Nikolaos , Panaousis, Emmanouil, Giannetsos, Thanassis, Anastasiadis, Eleftherios , Loukas, George (2019), A taxonomy and survey of attacks against machine learning. Elsevier. In: , , , . Elsevier, Computer Science Review, 34: 100199 ISSN: 1574-0137 (Print), (doi: https://doi.org/10.1016/j.cosrev.2019.100199).

Giovanni, Liva , Khan, Muhammad Taimoor, Pinzger, Martin, Spegni, Francesco , Spalazzi, Luca (2019), Automatic repair of timestamp comparisons. IEEE. In: , , , . IEEE, IEEE Transactions on Software Engineering, 47 (11) . pp. 2369-2381 ISSN: 0098-5589 (Print), (doi: https://doi.org/10.1109/TSE.2019.2948351).

Bolgouras, Vaios , Ntantogian, Christoforos, Panaousis, Emmanouil, Xenakis, Christos (2019), Distributed key management in microgrids. IEEE. In: , , , . IEEE, IEEE Transactions on Industrial Informatics, 16 (3) . pp. 2125-2133 ISSN: 1551-3203 (Print), 1941-0050 (Online) (doi: https://doi.org/10.1109/TII.2019.2941586).

Kogias, Dimitrios , Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria , Katsadouros, Evangelos , Loukas, George , Heartfield, Ryan , Patrikakis, Charalampos Z. (2019), Towards a blockchain-enabled crowdsourcing platform. IEEE. In: , , , . IEEE, IT Professional, 21 (5) . pp. 18-25 ISSN: 1520-9202 (Print), 1941-045X (Online) (doi: https://doi.org/10.1109/MITP.2019.2929503).

Panda, Sakshyam , Woods, Daniel W, Laszka, Aron, Fielder, Andrew , Panaousis, Emmanouil (2019), Post-incident audits on cyber insurance discounts. Elsevier. In: , , , . Elsevier, Computers and Security, 87: 101593 ISSN: 0167-4048 (Print), (doi: https://doi.org/10.1016/j.cose.2019.101593).

Brett, Terry , Loukas, George, Moreno, Yamir, Perra, Nicola (2019), Spreading of computer viruses on time-varying networks. American Physical Society. In: , , , . American Physical Society, Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99: 050303(R) (5) ISSN: 1539-3755 (Print), (doi: https://doi.org/10.1103/PhysRevE.99.050303) NB Item availability restricted.

He, Kai , Mao, Yijun, Ning, Jianting, Liang, Kaitai , Huang, Xinyi , Panaousis, Emmanouil , Loukas, George (2019), A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Access . pp. 1-12 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2019.2906290).

Liva, Giovanni , Khan, Muhammad Taimoor, Pinzger, Martin (2019), Semantics-driven extraction of timed automata from Java programs. Springer. In: , , , . Springer, Empirical Software Engineering, 24 (5) . pp. 3114-3150 ISSN: 1382-3256 (Print), 1573-7616 (Online) (doi: https://dx.doi.org/10.1007/s10664-019-09699-5).

Ning, Zhenhu , Xu, Guangquan, Yang, Yongli, Shen, Changxiang , Panaousis, Emmanouil , Wang, Hao , Liang, Kaitai (2019), TAW: cost-effective threshold authentication with weights for internet of things. IEEE. In: , , , . IEEE, IEEE Access, 7 . pp. 30112-30125 ISSN: 2169-3536 (Print), 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2019.2902226).

Sani, Abubakar Sadiq , Yuan, Dong, Bao, Wei, Dong, Zhao Yang , Vucetic, Branka , Bertino, Elisa (2019), Universally composable key bootstrapping and secure communication protocols for the energy Internet. IEEE. In: , , , . IEEE, IEEE Transactions on Information Forensics and Security, 14 (8) . pp. 2113-2127 ISSN: 1556-6013 (Print), (doi: https://doi.org/10.1109/TIFS.2019.2892005).

Abdur Rahman, Md. , Shamim Hossain, M., Loukas, George, Hassanain, Elham , Rahman, Syed Sadiqur , Alhamid, Mohammed F. , Guizani, Mohsen (2018), Blockchain-based mobile edge computing framework for secure therapy applications. IEEE. In: , , , . IEEE, IEEE Access, 6 . pp. 72469-72478 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2018.2881246).

Loukas, George , Karapistoli, Eirini, Panaousis, Emmanouil, Sarigiannidis, Panagiotis , Bezemskij, Anatolij , Vuong, Tuan (2018), A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Elsevier B.V.. In: , , , . Elsevier B.V., Ad Hoc Networks, 84 . pp. 124-147 ISSN: 1570-8705 (Print), (doi: https://doi.org/10.1016/j.adhoc.2018.10.002).

Mavropoulos, Orestis , Mouratidis, Haralambos, Fish, Andrew, Panaousis, Emmanouil (2018), Apparatus: A framework for security analysis in internet of things systems. Elsevier. In: , , , . Elsevier, Ad Hoc Networks, 92: 101743 ISSN: 1570-8705 (Print), (doi: https://doi.org/10.1016/j.adhoc.2018.08.013).

Heartfield, Ryan , Loukas, George, Budimir, Sanja, Bezemskij, Anatolij , Fontaine, Johnny R. J. , Filippoupolitis, Avgoustinos , Roesch, Etienne (2018), A taxonomy of cyber-physical threats and impact in the smart home. Elsevier. In: , , , . Elsevier, Computers and Security, 78 . pp. 398-428 ISSN: 0167-4048 (Print), (doi: https://doi.org/10.1016/j.cose.2018.07.011).

Breza, Michael , Tomic, Ivana, McCann, Julie (2018), Failures from the Environment, a Report on the First FAILSAFE workshop. ACM. In: , , , . ACM, ACM SIGCOMM Computer Communication Review, 48 (2) . pp. 40-45 ISSN: 0146-4833 (Print), (doi: https://dx.doi.org/10.1145/3213232.3213238).

Serpanos, Dimitrios , Khan, Muhammad Taimoor, Shrobe, Howard (2018), Designing safe and secure industrial control systems: A tutorial review. IEEE. In: , , , . IEEE, IEEE Design & Test, 35 (3) . pp. 73-88 ISSN: 2168-2356 (Print), 2168-2364 (Online) (doi: https://dx.doi.org/10.1109/MDAT.2018.2816943).

Heartfield, Ryan and , Loukas, George (2018), Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Elsevier. In: , , , . Elsevier, Computers & Security, 76 . pp. 101-127 ISSN: 0167-4048 (Print), (doi: http://dx.doi.org/10.1016/j.cose.2018.02.020).

Sani, Abubakar Sadiq , Yuan, Dong, Jin, Jiong, Gao, Longxiang , Yu, Shui , Dong, Zhao Yang (2018), Cyber security framework for Internet of Things-based Energy Internet. North-Holland. In: , , , . North-Holland, Future Generation Computer Systems, 93 . pp. 849-859 ISSN: 0167-739X (Print), (doi: https://doi.org/10.1016/j.future.2018.01.029).

Loukas, George , Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia , Yoon, Yongpil , Gan, Diane (2017), Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Access, 6 . pp. 3491-3508 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2017.2782159).

Chronopoulos, Michail , Panaousis, Emmanouil, Grossklags, Jens (2017), An options approach to cybersecurity investment. IEEE. In: , , , . IEEE, IEEE Access, 6 . pp. 12175-12186 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2017.2773366).

Tomic, Ivana and , McCann, Julie A. (2017), A survey of potential security issues in existing wireless sensor network protocols. IEEE. In: , , , . IEEE, IEEE Internet of Things Journal, 4 (6) . pp. 1910-1923 ISSN: 2327-4662 (Print), 2327-4662 (Online) (doi: https://doi.org/10.1109/JIOT.2017.2749883).

Khan, Muhammad Taimoor , Serpanos, Dimitrios, Shrobe, Howard (2017), ARMET: behavior-based secure and resilient industrial control systems. IEEE. In: , , , . IEEE, Proceedings of the IEEE, 106 (1) . pp. 129-143 ISSN: 0018-9219 (Print), 1558-2256 (Online) (doi: https://dx.doi.org/10.1109/JPROC.2017.2725642).

Book section

Farao, Aristeidis , Panda, Sakshyam, Menesidou, Sofia Anna, Veliou, Entso , Episkopos, Nikolaos , Kalatzantonakis, George , Mohammadi, Farnaz , Georgopoulos, Nikolaos , Sirivianos, Michael , Salamanos, Nikos (2020), SECONDO: A platform for cybersecurity investments and cyber insurance decisions. Springer Nature. In: , , In: Stefanos Gritzalis, Edgar R. Weippl, Gabriele Kotsis, A. Min Tjoa, Ismail Khalil (eds.), Trust, Privacy and Security in Digital Business: Proceedings of the 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 202. Springer Nature, Cham, Switzerland (12395) . pp. 65-74 . ISBN: 9783030589851 (doi: https://doi.org/10.1007/978-3-030-58986-8_5) NB Item availability restricted.

Sani, Abubakar Sadiq , Yuan, Dong, Ogaji, S., Dong, Zhao Yang (2020), CyreumE: A real-time situational awareness and decision making blockchain-based architecture for the energy Internet. Springer. In: , , In: Yuchu Tian, David Charles Levy (eds.), Handbook of Real-Time Computin. Springer, Singapore (1st) . pp. 1-49 . ISBN: 9789814585873 (doi: https://doi.org/10.1007/978-981-4585-87-3_48-1) NB Item availability restricted.

Panda, Sakshyam , Panaousis, Emmanouil, Loukas, George, Laoudias, Christos (2020), Optimizing investments in cyber hygiene for protecting healthcare users. Springer. In: From Lambda Calculus to Cybersecurity Through Program Analysis, , In: Alessandra Di Pierro, Pasquale Malacaria, Rajagopal Nagarajan (eds.), From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retiremen. Springer, , 12065 . pp. 268-291 . ISBN: 9783030411022 (doi: https://doi.org/10.1007/978-3-030-41103-9_11).

Conference item

Chadwick, David , Gan, Diane, Vuong, Tuan, Phillips, Edward (2017), Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore , . , (doi: ).

Conference proceedings

Scott, Emma , Panda, Sakshyam, Loukas, George, Panaousis, Emmanouil (2022), Optimising user security recommendations for AI-powered smart-homes. IEEE. In: , , , 2022 IEEE Conference on Dependable and Secure Computing (DSC. IEEE, . ISBN: 9781665421416 (doi: https://doi.org/10.1109/DSC54232.2022.9888829).

Xu, Guangquan , Feng, Meiqi, Jiao, Litao, Liu, Jian , Dai, Hong-Ning , Wang, Ding , Panaousis, Emmanouil , Zheng, Xi (2022), MFF-AMD: multivariate feature fusion for Android malware detection. Springer Link. In: , , In: Honghao Gao, Xinheng Wang (eds.), CollaborateCom 2021: Networking, Applications and Worksharing 17th EAI. Virtual Event, October 16-18, 2021, Proceedings, Part I. Springer Link, Cham , 406 (ch. 10) (1st) . pp. 368-385 . ISBN: 9783030926342 ; 9783030926359 (doi: http://link.springer.com/chapter/10.1007/978-3-030-92635-9_22) NB Item availability restricted.

Sani, Abubakar Sadiq , Yuan, Dong, Meng, Ke, Dong, Zhao Yang (2021), R-Chain: a universally composable relay resilience framework for smart grids. IEEE. In: , , In: Barbara Tynan, Delia Patterson, Lawrence Jones, Tom Weirich (eds.), 2021 IEEE Power & Energy Society General Meeting (PESGM. IEEE, Piscataway, USA . ISBN: 9781665446303ISSN: 1944-9925 (Print), 1944-9933 (Online) (doi: https://doi.org/10.1109/PESGM46819.2021.9638015).

Sani, Abubakar Sadiq , Yuan, Dong, Bertino, Elisa, Dong, Zhao Yang (2021), Crypto-Chain: a relay resilience framework for smart vehicles. ACM. In: , , In: Daniel Faigin (ed.), ACSAC: Annual Computer Security Applications Conferenc. ACM, New York, USA . pp. 439-454 . ISBN: 9781450385794 (doi: https://doi.org/10.1145/3485832.3485920).

Sani, Abubakar Sadiq , Yuan, Dong, Meng, Ke, Dong, Zhao Yang (2021), KEF: a Key Exchange Framework for operational technology security standards and guidelines. Institute of Electrical and Electronics Engineers (IEEE). In: , , In: Kathy Heilman, Yihan Hou, Marjan Popov, Ron Melton (eds.), Thirteenth Conference on Innovative Smart Grid Technologies (ISGT 2022) is “Moving to a 3-D Energy Landscape: Decarbonized, Democratized, Decentralized”, sponsored by the IEEE Power & Energy Society (PES). February 21 – 24, 202. Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ (1st) (doi: ) NB Item availability restricted.

Odeleye, Blessing , Loukas, George, Heartfield, Ryan, Spyridonis, Fotios (2021), Detecting framerate-oriented cyber attacks on user experience in virtual reality. VR4Sec. In: , , In: Stefan Schneegass, Mohamed Khamis, Florian Alt, Uwe Gruenefeld, Karola Marky, Alia Saad, Jonathan Liebers, Jonas Auda (eds.), VR4Sec: 1st International Workshop on Security for XR and XR for Securit. VR4Sec, (doi: https://vr4sec.hcigroup.de/proceedings/VR4Sec_paper_3.pdf).

Sani, Abubakar Sadiq , Meng, Ke, Dong, Zhao Yang (2021), SComm: a real-time mutually authenticated secure communication framework for smart grids. Institute of Electrical and Electronics Engineers (IEEE). In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), , In: IEEE Institute of Electrical and Electronics Engineers (ed.), 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Washington, 16-18 Feb. 2021. Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ (1st) . pp. 1-5 . ISBN: 9781728188973 ; 9781728188980ISSN: 2167-9665 (Print), 2472-8152 (Online) (doi: https://doi.org/10.1109/ISGT49243.2021.9372211) NB Item availability restricted.

Sani, Abubakar Sadiq , Yuan, Dong, Mens, Ke, Dong, Zhao Yang (2021), DIACS: A blockchain-based model for systematic data integrity assessment and control. Institute of Electrical and Electronics Engineers (IEEE). In: 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), , In: IEEE Institute of Electrical and Electronics Engineers (ed.), 2021 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT. Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ (1st) . pp. 1-5 . ISBN: 9781728188973 ; 9781728188980ISSN: 2167-9665 (Print), 2472-8152 (Online) (doi: https://doi.org/10.1109/ISGT49243.2021.9372235) NB Item availability restricted.

Sani, Abubakar Sadiq , Yuan, Dong, Meng, Ke, Dong, Zhao Yang (2020), Idenx: A Blockchain-based Identity Management System for Supply Chain Attacks Mitigation in Smart Grids. Institute of Electrical and Electronics Engineers (IEEE). In: 2020 IEEE Power & Energy Society General Meeting (PESGM), , , 2020 IEEE Power & Energy Society General Meeting (PESGM. Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ (1st) . pp. 1-5 . ISBN: 9781728155081 ; 9781728155098ISSN: 1944-9925 (Print), 1944-9933 (Online) (doi: https://doi.org/10.1109/PESGM**************1929).

Parsons, Emily Kate , Panaousis, Emmanouil, Loukas, George (2020), How secure is home: assessing human susceptibility to IoT threats. ACM. In: , , , PCI 2020: 24th Pan-Hellenic Conference on Informatic. ACM, . pp. 64-71 . ISBN: 9781450388979 (doi: https://doi.org/10.1145/3437120.3437277).

Siniosoglou, Ilias , Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis , Sarigiannidis, Antonios , Sakellari, Georgia , Loukas, George , Sarigiannidis, Panagiotis (2020), NeuralPot: an industrial honeypot implementation based on convolutional neural networks. IEEE. In: , , , 2020 IEEE Symposium on Computers and Communications (ISCC. IEEE, . ISBN: 9781728180878ISSN: 1530-1346 (Print), 2642-7389 (Online) (doi: https://doi.org/10.1109/ISCC50000.2020.9219712).

Kasnesis, Panagiotis , Heartfield, Ryan, Toumanidis, Lazaros, Liang, Xing , Loukas, George , Patrikakis, Charalampos Z. (2020), A prototype deep learning paraphrase identification service for discovering information cascades in social networks. IEEE. In: , , , IEEE International Conference on Multimedia and Exp. IEEE, . pp. 1-4 . ISBN: 9781728114859 (doi: https://doi.org/10.1109/ICMEW46912.2020.9106044).

Sani, Abubakar Sadiq , Yuan, Dong, Yeoh, Phee Lep, Qiu, Jing , Bao, Wei , Vucetic, Branka , Dong, Zhao Yang (2020), Cyra: A real-time risk-based security assessment framework for cyber attacks prevention in industrial control systems. Institute of Electrical and Electronics Engineers (IEEE). In: 2019 IEEE Power & Energy Society General Meeting (PESGM), , In: IEEE Institute of Electrical and Electronics Engineers (ed.), 2019 IEEE Power & Energy Society General Meeting (PESGM. Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ (1st) . pp. 1-5 . ISBN: 9781728119816 ; 9781728119823ISSN: 1944-9925 (Print), 1944-9933 (Online) (doi: https://doi.org/10.1109/PESGM40551.2019.8973948) NB Item availability restricted.

Hossain, A. K. M. Mahtab and , Loukas, George (2019), Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. ACM. In: , , , MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Service. ACM, . pp. 424-433 . ISBN: 9781450372831 (doi: https://doi.org/10.1145/3360774.3360791).

Sani, Abubakar Sadiq , Yuan, Dong, Bao, Wei, Yeoh, Phee Lep , Dong, Zhao Yang , Vucetic, Branka , Bertino, Elisa (2019), Xyreum: A high-performance and scalable blockchain for iiot security and privacy. Institute of Electrical and Electronics Engineers (IEEE). In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), , In: ICDCS 2019 Program Committee, Dingzhu Du, Taieb Znati, Weili Wu, Xiaodong Zhang (eds.), Published in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, 7-10 July 2019. Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ . pp. 1920-1930 . ISBN: 9781728125190 ; 9781728125206ISSN: 1063-6927 (Print), 2575-8411 (Online) (doi: https://doi.org/10.1109/ICDCS.2019.00190) NB Item availability restricted.

Tomic, Ivana , Breza, Michael, McCann, Julie A. (2019), Jamming-resilient control and communication framework for cyber physical systems. IET. In: , , , Living in the Internet of Things (IoT 2019. IET, London, UK . ISBN: 9781839530890 (doi: https://doi.org/10.1049/cp.2019.0132) NB Item availability restricted.

Rahman, Md. Abdur , Loukas, George, Abdullah, Syed Maruf, Abdu, Areej , Rahman, Syed Sadiqur , Hassanain, Elham , Arafa, Yasmine (2019), Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. ACM. In: , , , Proceedings of the 2019 on International Conference on Multimedia Retrieva. ACM, New York, USA . pp. 404-407 . ISBN: 9781450367653 (doi: https://doi.org/10.1145/3323873.3326924).

Tomic, Ivana , Breza, Michael, Jackson, Greg, Bhatia, Laksh , McCann, Julie A. (2019), Design and evaluation of jamming resilient cyber-physical systems. IEEE. In: , , , 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData. IEEE, . ISBN: 9781538679753 (doi: https://doi.org/10.1109/Cybermatics_2018.2018.00138).

Khan, Muhammad Taimoor , Serpanos, Dimitrios, Shrobe, Howard (2018), Highly assured safety and security of e-health applications. IEEE. In: 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), , , 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob. IEEE, . pp. 137-144 . ISBN: 9781538668764ISSN: 2160-4886 (Print), (doi: https://dx.doi.org/10.1109/WiMOB.2018.8589095).

Tomic, Ivana , Chen, Po-Yu, Breza, Michael J., McCann, Julie A. (2018), Antilizer: run time self-healing security for wireless sensor networks. ACM. In: , , , Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '1. ACM, New York, USA . pp. 107-116 . ISBN: 9781450360937 (doi: https://dx.doi.org/10.1145/3286978.3287029).

Bhatia, Laksh , Tomić, Ivana, McCann, Julie A. (2018), LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. ACM. In: , , , Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '1. ACM, New York, NY, USA . pp. 361-362 . ISBN: 9781450359528 (doi: https://doi.org/10.1145/3274783.3275183).

Tomic, Ivana , Bhatia, Laksh, Breza, Michael J., McCann, Julie A. (2018), The limits of LoRaWAN in event-triggered wireless networked control systems. IEEE. In: , , , 2018 UKACC 12th International Conference on Control (CONTROL. IEEE, . pp. 101-106 . ISBN: 9781538628645 (doi: https://doi.org/10.1109/CONTROL.2018.8516774).

Liva, Giovanni , Khan, Muhammad Taimoor, Spegni, Francesco, Spalazzi, Luca , Bollin, Andreas , Pinzger, Martin (2018), Modeling time in Java programs for automatic error detection. ACM. In: 40th International Conference on Software Engineering (ICSE) collocated FormlalSE, , , Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '1. ACM, New York, USA . pp. 50-59 . ISBN: 9781450357180 (doi: http://dx.doi.org/10.1145/3193992.3193997).

Bezemskij, Anatolij , Loukas, George, Gan, Diane, Anthony, Richard (2018), Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. IEEE. In: , , , 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData. IEEE, . pp. 1-6 . ISBN: 9781538630679 (doi: https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20).

Gan, D. , Chadwick, D., Gresty, D., Vuong, T. , Phillips, E. (2017), Experiential and Simulated Learning: An Interdisciplinary Approach. IEEE. In: , , , Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17. IEEE, Las Vegas, Nevada, USA (Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17: 14-16 December 2017, Las Vegas, Nevada, USA);) . ISBN: 9781538626528 (doi: https://americancse.org/events/csci2017) NB Item availability restricted.

Oliff, William , Filippoupolitis, Avgoustinos, Loukas, George (2017), Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. ACM. In: , , , Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017. ACM, . ISBN: 9781450352437 (doi: ) NB Item availability restricted.

Heartfield, Ryan , Loukas, George, Gan, Diane (2017), An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. IEEE. In: Software Engineering Research, Management and Applications, 7-9 June 2017, University of Greenwich , 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA. IEEE, . ISBN: 9781509057573 (doi: https://doi.org/10.1109/SERA.2017.7965754).