Skip to main content
Category

Publications

Gelenbe E, Gül BC, Nakip M. 2026. Federated Intrusion Detection for Smart Vehicles. IEEE ITSC 2026. Publications

Gelenbe E, Gül BC, Nakip M. 2026. Federated Intrusion Detection for Smart Vehicles. IEEE ITSC 2026.

Conference: IEEE International Conference on Intelligent Transportation Systems (ITSC 2026), 15-18. September 2026, Napoli , Italy Authors: Gelenbe E, Gül BC, Nakip M. Abstract: Cybersecurity threats increasingly endanger networked systems consisting of multiple nodes, such as Internet of Things (IoT) systems, Supply Chains and Smart Cars, due to the emergence…
Nasereddin M, Gelenbe E. 2026. Deployment-Aware Parameter Optimization for IoT Attack Detection. LIFESEC 2026. Publications

Nasereddin M, Gelenbe E. 2026. Deployment-Aware Parameter Optimization for IoT Attack Detection. LIFESEC 2026.

Conference: 2nd Workshop on Whole-Lifecycle Security for Smart Systems: Methods and Tools (LIFESEC 2026) co-located with the 12th IEEE International Conference on Smart Computing (SmartComp 2026) 22. June 2026, Messina, Italy Authors: Nasereddin M, Gelenbe E. Abstract: Smart IoT environments require attack detection (AD) mechanisms that operate reliably under real-time…
Gelenbe E, Ma Y. 2026. loT Aided Congestion Avoidance in Emergency Evacuation. IEEE ISCC 2026. Publications

Gelenbe E, Ma Y. 2026. loT Aided Congestion Avoidance in Emergency Evacuation. IEEE ISCC 2026.

Conference: 31st IEEE International Symposium on Computer Communications (ISCC 2026) Authors: Gelenbe E, Ma Y. Abstract: Efficient and reliable evacuation management during emergency situations becomes very challenging, particularly in spatially constrained environments such as passenger ships. Recent advances in the Internet of Things (IoT) provide new opportunities to improve evacuation…
Nasereddin M, Gelenbe E. 2026. Parameter Sensitivity of AADRNN-Based Attack Detection. IEEE ISCC 2026. Publications

Nasereddin M, Gelenbe E. 2026. Parameter Sensitivity of AADRNN-Based Attack Detection. IEEE ISCC 2026.

Conference: 31st IEEE International Symposium on Computer Communications (ISCC 2026) Authors: Nasereddin M, Gelenbe E. Abstract: The growing prevalence of cyberattacks against network-connected systems increases the need for accurate intrusion and attack detection (AD) systems that can react rapidly at the network access ports. Machine learning has often been used…
Gelenbe E, Ren Q, Yan Z. 2026. A trust model for networked systems. npj Wireless Technology 2026. Publications

Gelenbe E, Ren Q, Yan Z. 2026. A trust model for networked systems. npj Wireless Technology 2026.

Journal: npj Wireless Technology Authors: Gelenbe E, Ren Q, Yan Z. Abstract: This paper investigates the manner in which trust develops progressively and changes over time among networked entities through opinions, negative or  positive, that these entities express about each other. The entities receive “voting rights” from an external regulator,…
Gelenbe E, Ma Y. 2026. IoT-Driven Pull Scheduling to Avoid Congestion in Human Emergency Evacuation. Sensors. Publications

Gelenbe E, Ma Y. 2026. IoT-Driven Pull Scheduling to Avoid Congestion in Human Emergency Evacuation. Sensors.

Journal: Sensors Authors: Gelenbe E, Ma Y. Abstract: The efficient and timely management of human evacuation during emergency events is an important area of research where the Internet of Things (IoT) can be of great value. Significant areas of application for optimum evacuation strategies include buildings, sports arenas, cultural venues,…
Nieves Matheu García S, Skarmeta A. 2025. One Passport to Govern Them All: Bringing Order to IoT Security and Compliance. SECON2025 Publications

Nieves Matheu García S, Skarmeta A. 2025. One Passport to Govern Them All: Bringing Order to IoT Security and Compliance. SECON2025

Conference: 2nd MobiSec Special Session on Secure and Cognitive Continuum (SECON 2025) co-located with the 9th International Conference on Mobile Internet Security (MobiSec 2025), 16-18. December 2025, Sapporo, JP Authors: Nieves Matheu García S, Skarmeta A. Abstract: The increasing complexity of the Internet of Things ecosystems has exposed critical gaps…
Gelenbe E, Abdelrahman O. 2025. Signalling Storms and Taylor’s Law. Way to 6G Workshop @ MASCOTS 2025. Publications

Gelenbe E, Abdelrahman O. 2025. Signalling Storms and Taylor’s Law. Way to 6G Workshop @ MASCOTS 2025.

Conference: Way to 6G Workshop co-located with the IEEE Computer Society 33rd International Symposium on the Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2025), 21-23. October 2025, Sorbonne University, Paris, FR Authors: Gelenbe E, Abdelrahman O. Abstract: Signalling storms have occurred in several generations of mobile networks…
Bergquist J, Gelenbe E, Nasereddin M, Sigman K. 2025. Mitigating massive access with Quasi-Deterministic Transmission: Experiments and stationary analysis. Performance Evaluation. Publications

Bergquist J, Gelenbe E, Nasereddin M, Sigman K. 2025. Mitigating massive access with Quasi-Deterministic Transmission: Experiments and stationary analysis. Performance Evaluation.

Journal: Performance Evaluation, Volume 170,  November 2025, 102512 Authors: Bergquist J, Gelenbe E, Nasereddin M, Sigman K. Abstract: The Massive Access Problem arises due to devices that forward packets simultaneously to servers in rapid succession, or by malevolent software in devices that flood network nodes with high-intensity traffic. To protect…
Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. LocVul: Line-Level Vulnerability Localization based on a Sequence-to-Sequence Approach. Information and Software Technology 2025 Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. LocVul: Line-Level Vulnerability Localization based on a Sequence-to-Sequence Approach. Information and Software Technology 2025

Journal: Information and Software Technology, Volume 19, January 2026 Authors: Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. Abstract: Context: The development of secure software systems depends on early and accurate vulnerability identification. Manual inspection is a time-consuming process that requires specialized knowledge. Therefore, as software complexity grows,…