All Posts By

Anna Marton, Safepay Systems

News

October is European Cybersecurity Month!

The European Cybersecurity Month (ECSM) is the European Union’s annual campaign dedicated to promoting cybersecurity among EU citizens and organisations. The ECSM campaign is coordinated by the European Union Agency for Cybersecurity (ENISA) and the European Commission, and supported by EU Member States and hundreds of partners (governments, universities, think…
Publications

Nakip M, Gelenbe E. 2024. An Associated Random Neural Network Detects Intrusions and Estimates Attack Graphs. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Nakip M, Gelenbe E. Abstract: Cyberattacks, especially Botnet Distributed Denial of Service (DDoS), increasingly target networked systems, compromise interconnected nodes by constantly spreading malware. In order to prevent these attacks in their early stages, which includes stopping the spread of malware,…
Publications

Nasereddin M, Nakip M, Gelenbe E. 2024. A Deep Learning based Intrusion Detection and Prevention System for Mitigating DoS Attacks. EuroCyberSec2024

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Nasereddin M, Nakip M, Gelenbe E. Abstract: Internet of Things (IoT) networks are highly vulnerable to network attacks, the most common examples being DoS and DDoS attacks. Those attacks flood the limited system resources of IoT devices and overwhelm networks with…
News

Final Program of the EuroCyberSec 2024 Workshop

The EuroCyberSec 2024 Workshop will be held on 23 October 2024 at the Radisson Blue Hotel, Krakow, Poland. Co-located with the annual IEEE Computer Society MASCOTS 2024 conference, it is co-sponsored by the Horizon Europe DOSS Project on the DESIGN AND OPERATION OF SECURE IoT SUPPLY CHAIN, and the COST…
Insights

Automatic Vulnerability Categorization: Are Large Language Models (LLMs) the solution?

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) Problem Statement The early identification and mitigation of software vulnerabilities is critical for the development of secure software. To facilitate the vulnerability identification and mitigation process, several tools and techniques have been proposed over the…
Publications

Bergquist J, Gelenbe E, Sigman K. 2024. On an Adaptive-Quasi-Deterministic Transmission Policy Queueing Model. MASCOTS 2024

Conference: MASCOTS 2024 Authors: Bergquist J, Gelenbe E, Sigman K. Abstract: We analyze, further and deeper, a recently proposed technique for addressing the Massive Access Problem (MAP), an issue in telecommunications which arises when too many devices transmit packets to a gateway in quick succession. This technique, the Adaptive-Quasi-Deterministic Transmission…
Publications

Gelenbe E, Nakip M, Siavvas M. 2024. System-Wide Vulnerability and Trust in Multi-Component Communication System Software. IEEE Network. 2024.

Journal: IEEE Network. 2024. Authors: Gelenbe E, Nakip M, Siavvas M. Abstract: In the software rich environment of 6G, systems will be surrounded by edge devices that support distributed software systems which are critical to operations. Such systems may also be subject to frequent updates or uploads of individual software…
News

DOSS Project Newsletter No. 2

This is the 2nd edition of the DOSS Newsletter. This issue covers the project period from month 7 to 12 which marks a very important phase of the project, when the entire concept was refined, validated, and documented and now we have a solid base for all future design and…