Skip to main content
Category

Publications

Luo T, Wang J, Yan Z, Gelenbe E. 2025. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions. IEEE Network Magazine 2025. Publications

Luo T, Wang J, Yan Z, Gelenbe E. 2025. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions. IEEE Network Magazine 2025.

Journal: IEEE Network Magazine Authors: Luo T, Wang J, Yan Z, Gelenbe E. Abstract: The process of quantifying trust considers the factors that affect it, which can be applied to identify malicious behavior, reduce uncertainty, and facilitate decision-making. Traditional trust evaluation methods based on statistics and reasoning, rely heavily on domain…
Deé-Lukács A, Földvári A, Pataricza A. 2025. Evaluation of Embedded AI Through Model Difference Analysis. 32nd Minisymposium Publications

Deé-Lukács A, Földvári A, Pataricza A. 2025. Evaluation of Embedded AI Through Model Difference Analysis. 32nd Minisymposium

Conference: 32th Minisymposium of the Department of Artificial Intelligence and Systems Engineering of the Budapest University of Technology and Economics, 3-4. February 2025, Budapest, Hungary Authors: Deé-Lukács A, Földvári A, Pataricza A. Abstract: The growing reliance on embedded AI components in critical systems demands robust mechanisms for explainability and reliability.…
Gelenbe E. 2025. Minimizing Delay and Power Consumption at the Edge. Sensors. Publications

Gelenbe E. 2025. Minimizing Delay and Power Consumption at the Edge. Sensors.

Journal: Sensors Authors: Gelenbe E. Abstract: Edge computing systems must offer low latency at low cost and low power consumption for sensors and other applications, including the IoT, smart vehicles, smart homes, and 6G. Thus, substantial research has been conducted to identify optimum task allocation schemes in this context using…
Gelenbe E, Nasereddin M. 2025. Adaptive Attack Mitigation for IoV Flood Attacks. IEEE Internet of Things Journal. Publications

Gelenbe E, Nasereddin M. 2025. Adaptive Attack Mitigation for IoV Flood Attacks. IEEE Internet of Things Journal.

Journal: IEEE Internet of Things Journal Authors: Gelenbe E, Nasereddin M. Abstract: Gateway Servers for the Internet of Vehicles (IoV) must meet stringent Security and Quality of Service (QoS) requirements, including cyberattack protection, low delays and minimal packet loss, to offer secure real-time data exchange for human and vehicle safety…
Zhou G, Liu Y, Yan Z, Gelenbe E. 2024. Is ChatGPT Trustworthy Enough? A Review. IEEE Consumer Electronics Magazine 2024. Publications

Zhou G, Liu Y, Yan Z, Gelenbe E. 2024. Is ChatGPT Trustworthy Enough? A Review. IEEE Consumer Electronics Magazine 2024.

Journal: IEEE Consumer Electronics Magazine, vol. 13, 2024 Authors: Zhou G, Liu Y, Yan Z, Gelenbe E. Abstract: ChatGPT, as an advanced model that seamlessly integrates into diverse digital interactions, shows great potential to enhance the performance of consumer technology and reshape its landscape. The critical question of its trustworthiness…
Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. DSA 2024. Publications

Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. DSA 2024.

Conference: 11th International Conference on Dependable Systems and Their Applications (DSA2024), 2-3. November 2024, Taicang, Suzhou, China Authors: Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. Abstract: Compliance with international security standards is essential for ensuring the security of information systems, and thereby their dependability and trustworthiness. Compliance…
Barakat R, Josten S, Schneider M. 2024. Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. EuroCyberSec 2024. Publications

Barakat R, Josten S, Schneider M. 2024. Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Barakat R, Josten S, Schneider M. Abstract: Buffer overflows remain one of the most critical and widespread vulnerabilities in software systems. Traditional fuzzing techniques often lack the precision required to reliably detect buffer overflows. This paper presents BUFFERMONITOR, a novel approach…
Maliga D, Nagy R, Buttyán L. 2024. A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform. EuroCyberSec 2024. Publications

Maliga D, Nagy R, Buttyán L. 2024. A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Maliga D, Nagy R, Buttyán L. Abstract: In this paper, we present a pipeline that we designed for cleaning and processing large datasets of potentially malicious binaries using access to a rate-limited cloud-based malware analysis platform. Our goal is to efficiently…
Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2024. Vulnerability prediction using pre-trained models: An empirical evaluation. EuroCyberSec 2024. Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2024. Vulnerability prediction using pre-trained models: An empirical evaluation. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. Abstract: The rise of Large Language Models (LLMs) has provided new directions for addressing downstream text classification tasks, such as vulnerability prediction, where segments of the source code are classified as…
Siavvas M, Kalouptsoglou I, Gelenbe E, Kehagias D, Tzovaras D. 2024. Transforming the field of Vulnerability Prediction: Are Large Language Models the key? EuroCyberSec 2024. Publications

Siavvas M, Kalouptsoglou I, Gelenbe E, Kehagias D, Tzovaras D. 2024. Transforming the field of Vulnerability Prediction: Are Large Language Models the key? EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Siavvas M, Kalouptsoglou I, Gelenbe E, Kehagias D, Tzovaras D. Abstract: Vulnerability prediction is an important mechanism for secure software development, as it enables the early identification and mitigation of software vulnerabilities. Vulnerability prediction models (VPMs) are machine learning (ML) models…