Internet of Things and Security Research Centre

Internet of Things and Security Research Centre

We equip the Internet of Things with the ability to adapt to the needs of human beings and self-protect against cyber-physical security and privacy threats.

Research Projects ISEC


Our current areas of research include communications and self-aware systems, such as Cyber Physical Security, Forensic Timeline Profiling, Malware, Semantic Attacks within the Cloud, Cloud Security and Cyber Threats in Emergency Management.

Research activity

We have strong links with a number of companies within the security industry, with current technical collaborations on R&D, forensic investigations, IT security audits and penetration testing.

About us

ISEC's members have participated in a number of research projects in several areas of cyber security, communications and self-aware systems. These projects have been funded by the UK Research Councils, EU FP7 and the industry. Our latest research projects include CHIST-ERA/EPSRC Cocoon, which bridges research in emotion psychology with IoT security in a smart home, and H2020 TRILLION, which strengthens community policing with trusted and secure communications between communities and law enforcement agencies.

Related research

Explore the university's other research in this discipline.

Computer science and informatics


Computer science research at the University is contributing strongly to current developments, in particular around cybersecurity, artificial intelligence and data science.

Article

Budimir, Sanja , Fontaine, Johnny, Huijts, Nicole MA, Haans, Antal , Loukas, George , Roesch, Etienne (2021), Emotional reactions to cybersecurity breach situations: A scenario-based survey study. JMIR Publications. In: , , , . JMIR Publications, Journal of Medical Internet Research 1438-8871 (Online) (doi: ) NB Item availability restricted.

Nisioti, Antonia , Loukas, George, Laszka, Aron, Panaousis, Emmanouil (2021), Data-driven decision support for optimizing cyber forensic investigations. IEEE. In: , , , . IEEE, IEEE Transactions on Information Forensics and Security, 16 . pp. 2397-2412 ISSN: 1556-6013 (Print), 1556-6021 (Online) (doi: https://doi.org/10.1109/TIFS.2021.3054966).

Heartfield, Ryan , Loukas, George, Bezemskij, Anatolij, Panaousis, Emmanouil (2020), Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning. IEEE. In: , , , . IEEE, IEEE Transactions on Information Forensics & Security ISSN: 1556-6013 (Print), 1556-6021 (Online) (doi: ).

Khan, Taimoor and , Tomic, Ivana (2020), Securing industrial cyber-physical systems: A run-time multi-layer monitoring. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Transactions on Industrial Informatics . pp. 1-1 ISSN: 1551-3203 (Print), 1941-0050 (Online) (doi: https://doi.org/10.1109/TII.2020.3032968).

Radoglou Grammatikis, Panagiotis , Sarigiannidis, Panagiotis, Efstathopoulos, Georgios, Panaousis, Emmanouil (2020), ARIES: a novel multivariate intrusion detection system for smart grid. MDPI. In: , , , . MDPI, Sensors, 20: 5305 (18) 1424-8220 (Online) (doi: https://doi.org/10.3390/s20185305).

Bhatia, Laksh , Tomic, Ivana, Fu, Anqi, Breza, Michael , McCann, Julie A. (2020), Control communication co-design for wide area cyber-physical systems. ACM. In: , , , . ACM, ACM Transactions on Cyber-Physical Systems ISSN: 2378-962X (Print), 2378-9638 (Online) (doi: https://doi.org/10.1145/3418528) NB Item availability restricted.

Xu, Guangquan , Zhao, Yuyang, Litao, Jiao, Feng, Meiqi , Ji, Zhong , Panaousis, Emmanouil , Chen, Si , Zheng, Xi (2020), TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE. In: , , , . IEEE, IEEE Internet of Things 2327-4662 (Online) (doi: https://doi.org/10.1109/JIOT.2020.3006066).

Budimir, S. , Fontaine, J., Huijts, N., Haans, A. , Loukas, G. , Ras, I. , Roesch, E. (2020), Emotions, personality, and psychopathology of cybersecurity breach victims. Elsevier. In: , , , . Elsevier, Journal of Psychosomatic Research, 133: 110059 ISSN: 0022-3999 (Print), 1879-1360 (Online) (doi: https://doi.org/10.1016/j.jpsychores.2020.110059) NB Item availability restricted.

Cui, Yuanbo , Gao, Fei, Shi, Yijie, Yin, Wei , Panaousis, Emmanouil , Liang, Kaitai (2020), An efficient attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE. In: , , , . IEEE, IEEE Access, 8 . pp. 99024-99036 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2020.2996940).

Loukas, George , Patrikakis, Charalampos Z., Wilbanks, Linda R. (2020), Digital deception: Cyber fraud and online misinformation. IEEE. In: , , , . IEEE, IT Professional, 22 (2) . pp. 19-20 ISSN: 1520-9202 (Print), 1941-045X (Online) (doi: https://doi.org/10.1109/MITP.2020.2980090).

Theodorakopoulos, George , Panaousis, Emmanouil, Liang, Kaitai, Loukas, George (2020), On-the-fly privacy for location histograms. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Transactions on Dependable and Secure Computing ISSN: 1545-5971 (Print), 1941-0018 (Online) (doi: https://doi.org/10.1109/TDSC.2020.2980270).

Abdur Rahman, Md , Rashid, Mamun, Le Kernec, Julien, Philippe, Bruno , Barnes, Stuart , Fioranelli, Francesco , Yang, Shufan , Romain, Olivier , Abbasi, Qammer , Loukas, George (2019), A secure occupational therapy framework for monitoring cancer patients’ quality of life. MDPI. In: , , , . MDPI, Sensors, 19: 5258 (23) ISSN: 1424-8220 (Print), (doi: https://doi.org/10.3390/s19235258).

Jaddoa, Ali , Sakellari, Georgia, Panaousis, Emmanouil, Loukas, George , Sarigiannidis, Panagiotis G. (2019), Dynamic decision support for resource offloading in heterogeneous internet of things environments. Elsevier. In: , , , . Elsevier, Simulation Modelling Practice and Theory, 101: 102019 ISSN: 1569-190X (Print), (doi: https://doi.org/10.1016/j.simpat.2019.102019).

Xu, Guangquan , Zhang, Yao, Jiao, Litao, Panaousis, Emmanouil , Liang, Kaitai , Wang, Hao , Li, Xiaotong (2019), DT-CP: a double-TTPs based contract-signing protocol with lower computational cost. IEEE. In: , , , . IEEE, IEEE Access, 7 . pp. 174740-174749 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2019.2952213).

Li, Xiaoming , Xu, Guangquan, Zheng, Xi, Liang, Kaitai , Panaousis, Emmanouil , Li, Tao , Wang, Wei , Shen, Chao (2019), Using sparse representation to detect anomalies in complex WSNs. ACM. In: , , , . ACM, ACM Transactions on Intelligent Systems and Technology, 10: 64 (6) ISSN: 2157-6904 (Print), 2157-6912 (Online) (doi: https://doi.org/10.1145/3331147) NB Item availability restricted.

Pitropakis, Nikolaos , Panaousis, Emmanouil, Giannetsos, Thanassis, Anastasiadis, Eleftherios , Loukas, George (2019), A taxonomy and survey of attacks against machine learning. Elsevier. In: , , , . Elsevier, Computer Science Review, 34: 100199 ISSN: 1574-0137 (Print), (doi: https://doi.org/10.1016/j.cosrev.2019.100199).

Giovanni, Liva , Khan, Muhammad Taimoor, Pinzger, Martin, Spegni, Francesco , Spalazzi, Luca (2019), Automatic repair of timestamp comparisons. IEEE. In: , , , . IEEE, IEEE Transactions on Software Engineering ISSN: 0098-5589 (Print), (doi: https://doi.org/10.1109/TSE.2019.2948351).

Bolgouras, Vaios , Ntantogian, Christoforos, Panaousis, Emmanouil, Xenakis, Christos (2019), Distributed key management in microgrids. IEEE. In: , , , . IEEE, IEEE Transactions on Industrial Informatics, 16 (3) . pp. 2125-2133 ISSN: 1551-3203 (Print), 1941-0050 (Online) (doi: https://doi.org/10.1109/TII.2019.2941586).

Kogias, Dimitrios , Leligou, Helen-Catherine, Xevgenis, Michael, Polychronaki, Maria , Katsadouros, Evangelos , Loukas, George , Heartfield, Ryan , Patrikakis, Charalampos Z. (2019), Towards a blockchain-enabled crowdsourcing platform. IEEE. In: , , , . IEEE, IT Professional, 21 (5) . pp. 18-25 ISSN: 1520-9202 (Print), 1941-045X (Online) (doi: https://doi.org/10.1109/MITP.2019.2929503).

Panda, Sakshyam , Woods, Daniel W, Laszka, Aron, Fielder, Andrew , Panaousis, Emmanouil (2019), Post-incident audits on cyber insurance discounts. Elsevier. In: , , , . Elsevier, Computers and Security, 87: 101593 ISSN: 0167-4048 (Print), (doi: https://doi.org/10.1016/j.cose.2019.101593).

Brett, Terry , Loukas, George, Moreno, Yamir, Perra, Nicola (2019), Spreading of computer viruses on time-varying networks. American Physical Society. In: , , , . American Physical Society, Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 99: 050303(R) (5) ISSN: 1539-3755 (Print), (doi: https://doi.org/10.1103/PhysRevE.99.050303) NB Item availability restricted.

He, Kai , Mao, Yijun, Ning, Jianting, Liang, Kaitai , Huang, Xinyi , Panaousis, Emmanouil , Loukas, George (2019), A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Access . pp. 1-12 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2019.2906290).

Liva, Giovanni , Khan, Muhammad Taimoor, Pinzger, Martin (2019), Semantics-driven extraction of timed automata from Java programs. Springer. In: , , , . Springer, Empirical Software Engineering, 24 (5) . pp. 3114-3150 ISSN: 1382-3256 (Print), 1573-7616 (Online) (doi: https://dx.doi.org/10.1007/s10664-019-09699-5).

Ning, Zhenhu , Xu, Guangquan, Yang, Yongli, Shen, Changxiang , Panaousis, Emmanouil , Wang, Hao , Liang, Kaitai (2019), TAW: cost-effective threshold authentication with weights for internet of things. IEEE. In: , , , . IEEE, IEEE Access, 7 . pp. 30112-30125 ISSN: 2169-3536 (Print), 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2019.2902226).

Abdur Rahman, Md. , Shamim Hossain, M., Loukas, George, Hassanain, Elham , Rahman, Syed Sadiqur , Alhamid, Mohammed F. , Guizani, Mohsen (2018), Blockchain-based mobile edge computing framework for secure therapy applications. IEEE. In: , , , . IEEE, IEEE Access, 6 . pp. 72469-72478 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2018.2881246).

Loukas, George , Karapistoli, Eirini, Panaousis, Emmanouil, Sarigiannidis, Panagiotis , Bezemskij, Anatolij , Vuong, Tuan (2018), A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Elsevier B.V.. In: , , , . Elsevier B.V., Ad Hoc Networks, 84 . pp. 124-147 ISSN: 1570-8705 (Print), (doi: https://doi.org/10.1016/j.adhoc.2018.10.002).

Mavropoulos, Orestis , Mouratidis, Haralambos, Fish, Andrew, Panaousis, Emmanouil (2018), Apparatus: A framework for security analysis in internet of things systems. Elsevier. In: , , , . Elsevier, Ad Hoc Networks, 92: 101743 ISSN: 1570-8705 (Print), (doi: https://doi.org/10.1016/j.adhoc.2018.08.013).

Heartfield, Ryan , Loukas, George, Budimir, Sanja, Bezemskij, Anatolij , Fontaine, Johnny R. J. , Filippoupolitis, Avgoustinos , Roesch, Etienne (2018), A taxonomy of cyber-physical threats and impact in the smart home. Elsevier. In: , , , . Elsevier, Computers and Security, 78 . pp. 398-428 ISSN: 0167-4048 (Print), (doi: https://doi.org/10.1016/j.cose.2018.07.011).

Breza, Michael , Tomic, Ivana, McCann, Julie (2018), Failures from the Environment, a Report on the First FAILSAFE workshop. ACM. In: , , , . ACM, ACM SIGCOMM Computer Communication Review, 48 (2) . pp. 40-45 ISSN: 0146-4833 (Print), (doi: https://dx.doi.org/10.1145/3213232.3213238).

Serpanos, Dimitrios , Khan, Muhammad Taimoor, Shrobe, Howard (2018), Designing safe and secure industrial control systems: A tutorial review. IEEE. In: , , , . IEEE, IEEE Design & Test, 35 (3) . pp. 73-88 ISSN: 2168-2356 (Print), 2168-2364 (Online) (doi: https://dx.doi.org/10.1109/MDAT.2018.2816943).

Heartfield, Ryan and , Loukas, George (2018), Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Elsevier. In: , , , . Elsevier, Computers & Security, 76 . pp. 101-127 ISSN: 0167-4048 (Print), (doi: http://dx.doi.org/10.1016/j.cose.2018.02.020).

Loukas, George , Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia , Yoon, Yongpil , Gan, Diane (2017), Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Access, 6 . pp. 3491-3508 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2017.2782159).

Chronopoulos, Michail , Panaousis, Emmanouil, Grossklags, Jens (2017), An options approach to cybersecurity investment. IEEE. In: , , , . IEEE, IEEE Access, 6 . pp. 12175-12186 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2017.2773366).

Tomic, Ivana and , McCann, Julie A. (2017), A survey of potential security issues in existing wireless sensor network protocols. IEEE. In: , , , . IEEE, IEEE Internet of Things Journal, 4 (6) . pp. 1910-1923 ISSN: 2327-4662 (Print), 2327-4662 (Online) (doi: https://doi.org/10.1109/JIOT.2017.2749883).

Khan, Muhammad Taimoor , Serpanos, Dimitrios, Shrobe, Howard (2017), ARMET: behavior-based secure and resilient industrial control systems. IEEE. In: , , , . IEEE, Proceedings of the IEEE, 106 (1) . pp. 129-143 ISSN: 0018-9219 (Print), 1558-2256 (Online) (doi: https://dx.doi.org/10.1109/JPROC.2017.2725642).

Panaousis, Emmanouil , Karapistoli, Eirini, Elsemary, Hadeep, Alpcan, Tansu , Khuzani, MHR , Economides, Anastasios A. (2016), Game theoretic path selection to support security in device-to-device communications. Elsevier. In: , , , . Elsevier, Ad Hoc Networks, 56 . pp. 28-42 ISSN: 1570-8705 (Print), (doi: https://doi.org/10.1016/j.adhoc.2016.11.008).

Heartfield, Ryan and , Loukas, George (2016), Predicting the performance of users as human sensors of security threats in social media. C-MRiC. In: , , , . C-MRiC, International Journal on Cyber Situational Awareness (IJCSA), 1 (1) ISSN: 2057-2182 (Print), 2057-2182 (Online) (doi: https://doi.org/10.22619/IJCSA.2016.100106).

Heartfield, Ryan , Loukas, George, Gan, Diane (2016), You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. Institute of Electrical and Electronics Engineers (IEEE). In: , , , . Institute of Electrical and Electronics Engineers (IEEE), IEEE Access, 4 . pp. 6910-6928 2169-3536 (Online) (doi: https://doi.org/10.1109/ACCESS.2016.2616285).

Loukas, George , Yoon, Yongpil, Sakellari, Georgia, Vuong, Tuan , Heartfield, Ryan (2016), Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance. Elsevier B.V.. In: , , , . Elsevier B.V., Simulation Modelling Practice and Theory, 73 . pp. 83-94 ISSN: 1569-190X (Print), 1878-1462 (Online) (doi: https://doi.org/10.1016/j.simpat.2016.08.005).

Hossain, A. K. M. Mahtab , Sreenan, Cormac J., Alberola, Rodolfo De Paz (2016), Neighbour-disjoint multipath for low-power and lossy networks. Association for Computing Machinery (ACM). In: , , , . Association for Computing Machinery (ACM), ACM Transactions on Sensor Networks, 12: 23 (3) . pp. 1-25 ISSN: 1550-4859 (Print), 1550-4867 (Online) (doi: https://doi.org/10.1145/2914792).

Gan, Diane and , Heartfield, Ryan (2016), Social engineering in the internet of everything. Cutter Information Corp. In: , , , . Cutter Information Corp, Cutter IT Journal, 29 (7) . pp. 20-29 ISSN: 1522-7383 (Print), (doi: https://www.cutter.com/article/social-engineering-internet-everything-492251).

Gresty, David , Gan, Diane, Loukas, George, Ierotheou, Constantinos (2016), Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Elsevier. In: , , , . Elsevier, Digital Investigation, 16 (Suppl.) . pp. S124-S133 ISSN: 1742-2876 (Print), (doi: https://doi.org/10.1016/j.diin.2016.01.015) NB Item availability restricted.

Fielder, Andrew , Panaousis, Emmanouil, Malacaria, Pasquale, Hankin, Chris , Smeraldi, Fabrizio (2016), Decision support approaches for cyber security investment. Elsevier. In: , , , . Elsevier, Decision Support Systems, 86 . pp. 13-23 ISSN: 0167-9236 (Print), (doi: https://doi.org/10.1016/j.dss.2016.02.012).

Heartfield, Ryan and , Loukas, George (2016), A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM. In: , , , . ACM, ACM Computing Surveys (CSUR), 48: 37 (3) ISSN: 0360-0300 (Print), 1557-7341 (Online) (doi: http://dx.doi.org/10.1145/2835375).

Book section

Farao, Aristeidis , Panda, Sakshyam, Menesidou, Sofia Anna, Veliou, Entso , Episkopos, Nikolaos , Kalatzantonakis, George , Mohammadi, Farnaz , Georgopoulos, Nikolaos , Sirivianos, Michael , Salamanos, Nikos (2020), SECONDO: A platform for cybersecurity investments and cyber insurance decisions. Springer Nature. In: , , In: Stefanos Gritzalis, Edgar R. Weippl, Gabriele Kotsis, A. Min Tjoa, Ismail Khalil (eds.), Trust, Privacy and Security in Digital Business: Proceedings of the 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 202. Springer Nature, Cham, Switzerland (12395) . pp. 65-74 . ISBN: 9783030589851 (doi: https://doi.org/10.1007/978-3-030-58986-8_5) NB Item availability restricted.

Panda, Sakshyam , Panaousis, Emmanouil, Loukas, George, Laoudias, Christos (2020), Optimizing investments in cyber hygiene for protecting healthcare users. Springer. In: From Lambda Calculus to Cybersecurity Through Program Analysis, , In: Alessandra Di Pierro, Pasquale Malacaria, Rajagopal Nagarajan (eds.), From Lambda Calculus to Cybersecurity Through Program Analysis: Essays Dedicated to Chris Hankin on the Occasion of His Retiremen. Springer, , 12065 . pp. 268-291 . ISBN: 9783030411022 (doi: https://doi.org/10.1007/978-3-030-41103-9_11) NB Item availability restricted.

Conference item

Chadwick, David , Gan, Diane, Vuong, Tuan, Phillips, Edward (2017), Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore , . , (doi: ).

Conference proceedings

Parsons, Emily Kate , Panaousis, Emmanouil, Loukas, George (2020), How secure is home: assessing human susceptibility to IoT threats. ACM. In: , , , 24th Pan-Hellenic Conference on Informatic. ACM, (doi: ) NB Item availability restricted.

Siniosoglou, Ilias , Efstathopoulos, Georgios, Pliatsios, Dimitrios, Moscholios, Ioannis , Sarigiannidis, Antonios , Sakellari, Georgia , Loukas, George , Sarigiannidis, Panagiotis (2020), NeuralPot: an industrial honeypot implementation based on convolutional neural networks. IEEE. In: , , , 2020 IEEE Symposium on Computers and Communications (ISCC. IEEE, . ISBN: 9781728180878ISSN: 1530-1346 (Print), 2642-7389 (Online) (doi: https://doi.org/10.1109/ISCC50000.2020.9219712).

Kasnesis, Panagiotis , Heartfield, Ryan, Toumanidis, Lazaros, Liang, Xing , Loukas, George , Patrikakis, Charalampos Z. (2020), A prototype deep learning paraphrase identification service for discovering information cascades in social networks. IEEE. In: , , , IEEE International Conference on Multimedia and Exp. IEEE, . pp. 1-4 . ISBN: 9781728114859 (doi: https://doi.org/10.1109/ICMEW46912.2020.9106044).

Hossain, A. K. M. Mahtab and , Loukas, George (2019), Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. ACM. In: , , , MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Service. ACM, . pp. 424-433 . ISBN: 9781450372831 (doi: https://doi.org/10.1145/3360774.3360791).

Tomic, Ivana , Breza, Michael, McCann, Julie A. (2019), Jamming-resilient control and communication framework for cyber physical systems. IET. In: , , , Living in the Internet of Things (IoT 2019. IET, London, UK . ISBN: 9781839530890 (doi: https://doi.org/10.1049/cp.2019.0132) NB Item availability restricted.

Rahman, Md. Abdur , Loukas, George, Abdullah, Syed Maruf, Abdu, Areej , Rahman, Syed Sadiqur , Hassanain, Elham , Arafa, Yasmine (2019), Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective. ACM. In: , , , Proceedings of the 2019 on International Conference on Multimedia Retrieva. ACM, New York, USA . pp. 404-407 . ISBN: 9781450367653 (doi: https://doi.org/10.1145/3323873.3326924).

Tomic, Ivana , Breza, Michael, Jackson, Greg, Bhatia, Laksh , McCann, Julie A. (2019), Design and evaluation of jamming resilient cyber-physical systems. IEEE. In: , , , 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData. IEEE, . ISBN: 9781538679753 (doi: https://doi.org/10.1109/Cybermatics_2018.2018.00138).

Khan, Muhammad Taimoor , Serpanos, Dimitrios, Shrobe, Howard (2018), Highly assured safety and security of e-health applications. IEEE. In: 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), , , 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob. IEEE, . pp. 137-144 . ISBN: 9781538668764ISSN: 2160-4886 (Print), (doi: https://dx.doi.org/10.1109/WiMOB.2018.8589095).

Tomic, Ivana , Chen, Po-Yu, Breza, Michael J., McCann, Julie A. (2018), Antilizer: run time self-healing security for wireless sensor networks. ACM. In: , , , Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '1. ACM, New York, USA . pp. 107-116 . ISBN: 9781450360937 (doi: https://dx.doi.org/10.1145/3286978.3287029).

Bhatia, Laksh , Tomić, Ivana, McCann, Julie A. (2018), LPWA-MAC: a low power ride area network MAC protocol for cyber-physical systems. ACM. In: , , , Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '1. ACM, New York, NY, USA . pp. 361-362 . ISBN: 9781450359528 (doi: https://doi.org/10.1145/3274783.3275183).

Tomic, Ivana , Bhatia, Laksh, Breza, Michael J., McCann, Julie A. (2018), The limits of LoRaWAN in event-triggered wireless networked control systems. IEEE. In: , , , 2018 UKACC 12th International Conference on Control (CONTROL. IEEE, . pp. 101-106 . ISBN: 9781538628645 (doi: https://doi.org/10.1109/CONTROL.2018.8516774).

Liva, Giovanni , Khan, Muhammad Taimoor, Spegni, Francesco, Spalazzi, Luca , Bollin, Andreas , Pinzger, Martin (2018), Modeling time in Java programs for automatic error detection. ACM. In: 40th International Conference on Software Engineering (ICSE) collocated FormlalSE, , , Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '1. ACM, New York, USA . pp. 50-59 . ISBN: 9781450357180 (doi: http://dx.doi.org/10.1145/3193992.3193997).

Bezemskij, Anatolij , Loukas, George, Gan, Diane, Anthony, Richard (2018), Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. IEEE. In: , , , 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData. IEEE, . pp. 1-6 . ISBN: 9781538630679 (doi: https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20).

Gan, D. , Chadwick, D., Gresty, D., Vuong, T. , Phillips, E. (2017), Experiential and Simulated Learning: An Interdisciplinary Approach. IEEE. In: , , , Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17. IEEE, Las Vegas, Nevada, USA (Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17: 14-16 December 2017, Las Vegas, Nevada, USA);) . ISBN: 9781538626528 (doi: https://americancse.org/events/csci2017) NB Item availability restricted.

Oliff, William , Filippoupolitis, Avgoustinos, Loukas, George (2017), Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. ACM. In: , , , Proceedings of the International Conference on Internet of Things and Machine Learning (IML 2017. ACM, . ISBN: 9781450352437 (doi: ) NB Item availability restricted.

Heartfield, Ryan , Loukas, George, Gan, Diane (2017), An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. IEEE. In: Software Engineering Research, Management and Applications, 7-9 June 2017, University of Greenwich , 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA. IEEE, . ISBN: 9781509057573 (doi: https://doi.org/10.1109/SERA.2017.7965754).

Gresty, David W. , Loukas, George, Gan, Diane, Ierotheou, Constantinos (2017), Towards web usage attribution via graph community detection in grouped internet connection records. IEEE. In: , , , 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData. IEEE, Exeter, UK , 16 . pp. 365 -372 . ISBN: 9781538630662 (doi: https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61).

Khan, Muhammad Taimoor , Serpanos, Dimitrios, Shrobe, Howard (2017), A rigorous and efficient run-time security monitor for real-time critical embedded system applications. IEEE. In: IEEE 3rd World Forum on Internet of Things (WF-IoT), , , 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT. IEEE, . pp. 100-105 . ISBN: 9781509041305 (doi: http://dx.doi.org/10.1109/WF-IoT.2016.7845510).

Bezemskij, Anatolij , Loukas, George, Anthony, Richard J., Gan, Diane (2017), Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. IEEE. In: , , , 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS. IEEE, . pp. 61-68 . ISBN: 9781509055678 (doi: https://doi.org/10.1109/IUCC-CSS.2016.017).

Tomic, Ivana and , Halikias, George D. (2016), Performance analysis of distributed control configurations in LQR multi-agent system design. IEEE. In: , , , 2016 UKACC 11th International Conference on Control (CONTROL. IEEE, . ISBN: 9781467398923 (doi: https://doi.org/10.1109/CONTROL.2016.7737530).

Tomic, Ivana , Milonidis, Efstathios, Halikias, George D. (2016), LQR distributed cooperative control of a formation of low-speed experimental UAVs. IEEE. In: , , , 2016 UKACC 11th International Conference on Control (CONTROL. IEEE, . pp. 1-6 . ISBN: 9781467398916 (doi: https://doi.org/10.1109/CONTROL.2016.7737541).

Tomic, Ivana and , Halikias, George D. (2016), Robustness properties of distributed configurations in multi-agent systems. Elsevier. In: , , , 6th IFAC Symposium on System Structure and Control SSSC 201. Elsevier, IFAC-PapersOnLine, 49 (9) . pp. 86-91 ISSN: 2405-8963 (Print), (doi: https://doi.org/10.1016/j.ifacol.2016.07.500).

Bezemskij, Anatolij , Anthony, Richard John, Loukas, George, Gan, Diane (2016), Threat evaluation based on automatic sensor signal characterisation and anomaly detection. IARIA. In: , , , The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016. IARIA, . ISBN: 9781612084831ISSN: 2308-3913 (Print), (doi: http://www.iaria.org/conferences2016/ICAS16.html).

View all publications