Search Results - "Maglaras, A."

Refine Results
  1. 1

    Authentication Protocols for Internet of Things: A Comprehensive Survey by Jiang, Jianmin, Janicke, Helge, Maglaras, Leandros A., Ferrag, Mohamed Amine, Shu, Lei

    Published in Security and communication networks (01-01-2017)
    “…In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication…”
    Get full text
    Journal Article
  2. 2

    DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data by Saidi, Hafida, Labraoui, Nabila, Ari, Ado Adamou Abba, Maglaras, Leandros A., Emati, Joel Herve Mboussam

    Published in IEEE access (2022)
    “…In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite…”
    Get full text
    Journal Article
  3. 3

    Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging by Kosmanos, Dimitrios, Maglaras, Leandros A., Mavrovouniotis, Michalis, Moschoyiannis, Sotiris, Argyriou, Antonios, Maglaras, Athanasios, Janicke, Helge

    Published in IEEE access (01-01-2018)
    “…One of the barriers for the adoption of electric vehicles (EVs) is the anxiety around the limited driving range. Recent proposals have explored charging EVs on…”
    Get full text
    Journal Article
  4. 4

    Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form by Evans, Mark, He, Ying, Luo, Cunjin, Yevseyeva, Iryna, Janicke, Helge, Maglaras, Leandros A.

    Published in IEEE access (2019)
    “…The objective of the research was to establish data relating to underlying causes of human error which are the most common cause of information security…”
    Get full text
    Journal Article
  5. 5

    Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique by Evans, Mark, He, Ying, Luo, Cunjin, Yevseyeva, Iryna, Janicke, Helge, Zamani, Efpraxia, Maglaras, Leandros A.

    Published in IEEE access (2019)
    “…Information security recognised the human as the weakest link. Despite numerous international or sector-specific standards and frameworks, the information…”
    Get full text
    Journal Article
  6. 6

    Cyber security of critical infrastructures by Maglaras, Leandros A., Kim, Ki-Hyung, Janicke, Helge, Ferrag, Mohamed Amine, Rallis, Stylianos, Fragkou, Pavlina, Maglaras, Athanasios, Cruz, Tiago J.

    Published in ICT express (01-03-2018)
    “…Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and…”
    Get full text
    Journal Article
  7. 7

    Social Internet of Vehicles for Smart Cities by Maglaras, Leandros, Al-Bayatti, Ali, He, Ying, Wagner, Isabel, Janicke, Helge

    Published in Journal of sensor and actuator networks (01-03-2016)
    “…Digital devices are becoming increasingly ubiquitous and interconnected. Their evolution to intelligent parts of a digital ecosystem creates novel applications…”
    Get full text
    Journal Article
  8. 8

    Coupling of the synchronization stations of an Extended Kanban system by Maglaras, Leandros A.

    “…In this paper, an approximate method for estimating the performance of the synchronization stations of an Extended Kanban production system is developed. The…”
    Get full text
    Journal Article
  9. 9

    Social Clustering of Vehicles Based on Semi-Markov Processes by Maglaras, Leandros A., Katsaros, Dimitrios

    Published in IEEE transactions on vehicular technology (01-01-2016)
    “…Vehicle clustering is a crucial network management task for vehicular networks to address the broadcast storm problem and to cope with the rapidly changing…”
    Get full text
    Journal Article
  10. 10

    Personalized Students’ Profile Based On Ontology and Rule-based Reasoning by Shaimaa Nafea, Leandros A. Maglaras, Francois iewe, Richard Smith, Helge Janicke

    Published in EAI Endorsed Transactions on e-Learning (01-12-2016)
    “…Nowadays, most of the existing e-learning architecture provides the same content to all learners due to ”one size fits for all” concept. E-learning refers to…”
    Get full text
    Journal Article
  11. 11

    Delay Efficient Backpressure Routing in Wireless Ad Hoc Networks by A. Maglaras, Leandros, Katsaros, Dimitrios

    “…Packet scheduling/routing in wireless ad hoc networks is a fundamental problem for ad hoc networking. Backpressure routing is a solid and throughput optimal…”
    Get full text
    Journal Article
  12. 12

    A novel intrusion detection method based on OCSVM and K-means recursive clustering by Maglaras, Leandros A., Jiang, Jianmin

    “…In this paper we present an intrusion detection module capable of detecting malicious network traffic in a SCADA (Supervisory Control and Data Acquisition)…”
    Get full text
    Journal Article
  13. 13

    Reliability, Security, and Privacy in Power Grids by Maglaras, Leandros A., Ferrag, Mohamed Amine, Janicke, Helge, Ayres, Nick, Tassiulas, Leandros, Serpanos, Dimitrios

    Published in Computer (Long Beach, Calif.) (01-09-2022)
    “…As we move from traditional power grids to smart grids, new threats arise. We focus on cybersecurity in power grids, highlighting the threats to and…”
    Get full text
    Journal Article
  14. 14

    Social Aspect of Vehicular Communications by A. Maglaras, Leandros, Stathakidis, Efstathios, Jiang, Jianmin

    Published in EAI endorsed transactions on cloud systems (01-02-2015)
    “…The interconnection of devices is expected to grow and to incorporate systems that used to be isolated. As the vehicle evolves from a simple transport machine…”
    Get full text
    Journal Article
  15. 15

    Human behaviour as an aspect of cybersecurity assurance by Evans, Mark, Maglaras, Leandros A., He, Ying, Janicke, Helge

    Published in Security and communication networks (25-11-2016)
    “…There continue to be numerous breaches publicised pertaining to cybersecurity despite security practices being applied within industry for many years. This…”
    Get full text
    Journal Article
  16. 16

    Influence of ground and corona currents on dielectric behavior of small air gaps by Maglaras, A., Topalis, F.V.

    “…This paper investigates the influence of grounding on the field distribution and on the dielectric behavior of small rod-plate and rod-rod air gaps. This…”
    Get full text
    Journal Article
  17. 17

    A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes by Stewart, Barnaby, Rosa, Luis, Maglaras, Leandros A., Cruz, Tiago J., Ferrag, Mohamed Amine, Simoes, Paulo, Janicke, Helge

    “…Industrial Control Systems (ICS) are getting more vulnerable as they become increasingly interconnected with other systems. Industrial Internet of Things(IIoT)…”
    Get full text
    Journal Article
  18. 18
  19. 19

    AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks by Yigit, Yagmur, Maglaras, Leandros A., Buchanan, William J., Canberk, Berk, Shin, Hyundong, Duong, Trung Q.

    Published in IEEE internet of things journal (15-11-2024)
    “…Digital twin technology is crucial to the development of the sixth-generation (6G) Internet of Vehicles (IoV) as it allows the monitoring and assessment of the…”
    Get full text
    Journal Article
  20. 20

    Cyberterrorism targeting the general public through social media by Ayres, Nicholas, Maglaras, Leandros A.

    Published in Security and communication networks (01-10-2016)
    “…Current literature suggests that critical national infrastructure is the main focus of attack for cyberterrorism, but this research will address the issue of…”
    Get full text
    Journal Article