Search Results - "Maglaras, A."
-
1
Authentication Protocols for Internet of Things: A Comprehensive Survey
Published in Security and communication networks (01-01-2017)“…In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication…”
Get full text
Journal Article -
2
DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data
Published in IEEE access (2022)“…In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite…”
Get full text
Journal Article -
3
Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging
Published in IEEE access (01-01-2018)“…One of the barriers for the adoption of electric vehicles (EVs) is the anxiety around the limited driving range. Recent proposals have explored charging EVs on…”
Get full text
Journal Article -
4
Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form
Published in IEEE access (2019)“…The objective of the research was to establish data relating to underlying causes of human error which are the most common cause of information security…”
Get full text
Journal Article -
5
Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique
Published in IEEE access (2019)“…Information security recognised the human as the weakest link. Despite numerous international or sector-specific standards and frameworks, the information…”
Get full text
Journal Article -
6
Cyber security of critical infrastructures
Published in ICT express (01-03-2018)“…Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and…”
Get full text
Journal Article -
7
Social Internet of Vehicles for Smart Cities
Published in Journal of sensor and actuator networks (01-03-2016)“…Digital devices are becoming increasingly ubiquitous and interconnected. Their evolution to intelligent parts of a digital ecosystem creates novel applications…”
Get full text
Journal Article -
8
Coupling of the synchronization stations of an Extended Kanban system
Published in EAI endorsed transactions on industrial networks and intelligent systems (01-06-2015)“…In this paper, an approximate method for estimating the performance of the synchronization stations of an Extended Kanban production system is developed. The…”
Get full text
Journal Article -
9
Social Clustering of Vehicles Based on Semi-Markov Processes
Published in IEEE transactions on vehicular technology (01-01-2016)“…Vehicle clustering is a crucial network management task for vehicular networks to address the broadcast storm problem and to cope with the rapidly changing…”
Get full text
Journal Article -
10
Personalized Students’ Profile Based On Ontology and Rule-based Reasoning
Published in EAI Endorsed Transactions on e-Learning (01-12-2016)“…Nowadays, most of the existing e-learning architecture provides the same content to all learners due to ”one size fits for all” concept. E-learning refers to…”
Get full text
Journal Article -
11
Delay Efficient Backpressure Routing in Wireless Ad Hoc Networks
Published in ICST Transactions on Mobile Communications and Applications (01-09-2014)“…Packet scheduling/routing in wireless ad hoc networks is a fundamental problem for ad hoc networking. Backpressure routing is a solid and throughput optimal…”
Get full text
Journal Article -
12
A novel intrusion detection method based on OCSVM and K-means recursive clustering
Published in EAI endorsed transactions on security and safety (01-01-2015)“…In this paper we present an intrusion detection module capable of detecting malicious network traffic in a SCADA (Supervisory Control and Data Acquisition)…”
Get full text
Journal Article -
13
Reliability, Security, and Privacy in Power Grids
Published in Computer (Long Beach, Calif.) (01-09-2022)“…As we move from traditional power grids to smart grids, new threats arise. We focus on cybersecurity in power grids, highlighting the threats to and…”
Get full text
Journal Article -
14
Social Aspect of Vehicular Communications
Published in EAI endorsed transactions on cloud systems (01-02-2015)“…The interconnection of devices is expected to grow and to incorporate systems that used to be isolated. As the vehicle evolves from a simple transport machine…”
Get full text
Journal Article -
15
Human behaviour as an aspect of cybersecurity assurance
Published in Security and communication networks (25-11-2016)“…There continue to be numerous breaches publicised pertaining to cybersecurity despite security practices being applied within industry for many years. This…”
Get full text
Journal Article -
16
Influence of ground and corona currents on dielectric behavior of small air gaps
Published in IEEE transactions on dielectrics and electrical insulation (01-02-2009)“…This paper investigates the influence of grounding on the field distribution and on the dielectric behavior of small rod-plate and rod-rod air gaps. This…”
Get full text
Journal Article -
17
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes
Published in EAI endorsed transactions on industrial networks and intelligent systems (01-02-2017)“…Industrial Control Systems (ICS) are getting more vulnerable as they become increasingly interconnected with other systems. Industrial Internet of Things(IIoT)…”
Get full text
Journal Article -
18
Defence Mechanisms for Public Systems
Published in EAI endorsed transactions on security and safety (01-01-2018)Get full text
Journal Article -
19
AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks
Published in IEEE internet of things journal (15-11-2024)“…Digital twin technology is crucial to the development of the sixth-generation (6G) Internet of Vehicles (IoV) as it allows the monitoring and assessment of the…”
Get full text
Journal Article -
20
Cyberterrorism targeting the general public through social media
Published in Security and communication networks (01-10-2016)“…Current literature suggests that critical national infrastructure is the main focus of attack for cyberterrorism, but this research will address the issue of…”
Get full text
Journal Article