Skip to main content
Category

Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. Transfer Learning for Software Vulnerability Prediction using Transformer Models. Journal of Systems and Software 2025. Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. Transfer Learning for Software Vulnerability Prediction using Transformer Models. Journal of Systems and Software 2025.

Journal: Journal of Systems and Software, Volume 227, September 2025, 112448 Authors: Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. Abstract: Recently software security community has exploited text mining and deep learning methods to identify vulnerabilities. To this end, the progress in the field of Natural Language Processing (NLP)…
Luo T, Wang J, Yan Z, Gelenbe E. 2025. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions. IEEE Network Magazine 2025. Publications

Luo T, Wang J, Yan Z, Gelenbe E. 2025. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions. IEEE Network Magazine 2025.

Journal: IEEE Network Magazine Authors: Luo T, Wang J, Yan Z, Gelenbe E. Abstract: The process of quantifying trust considers the factors that affect it, which can be applied to identify malicious behavior, reduce uncertainty, and facilitate decision-making. Traditional trust evaluation methods based on statistics and reasoning, rely heavily on domain…
Matheu S, Martinez-Gil J, Bicchierai I, Marchel J, Piliszek R, Skarmeta A. 2025. A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification. Applied Sciences 2025. Publications

Matheu S, Martinez-Gil J, Bicchierai I, Marchel J, Piliszek R, Skarmeta A. 2025. A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification. Applied Sciences 2025.

Journal: Applied Sciences Authors: Matheu S, Martinez-Gil J, Bicchierai I, Marchel J, Piliszek R, Skarmeta A. Abstract: As Information and Communication Technology (ICT) systems become increasingly complex, the need for adaptable and efficient security certification frameworks grows. This paper introduces a flexible security evaluation methodology designed to serve as the…
Deé-Lukács A, Földvári A, Pataricza A. 2025. Evaluation of Embedded AI Through Model Difference Analysis. 32nd Minisymposium Publications

Deé-Lukács A, Földvári A, Pataricza A. 2025. Evaluation of Embedded AI Through Model Difference Analysis. 32nd Minisymposium

Conference: 32th Minisymposium of the Department of Artificial Intelligence and Systems Engineering of the Budapest University of Technology and Economics, 3-4. February 2025, Budapest, Hungary Authors: Deé-Lukács A, Földvári A, Pataricza A. Abstract: The growing reliance on embedded AI components in critical systems demands robust mechanisms for explainability and reliability.…
Gelenbe E. 2025. Minimizing Delay and Power Consumption at the Edge. Sensors. Publications

Gelenbe E. 2025. Minimizing Delay and Power Consumption at the Edge. Sensors.

Journal: Sensors Authors: Gelenbe E. Abstract: Edge computing systems must offer low latency at low cost and low power consumption for sensors and other applications, including the IoT, smart vehicles, smart homes, and 6G. Thus, substantial research has been conducted to identify optimum task allocation schemes in this context using…
Gelenbe E, Nasereddin M. 2025. Adaptive Attack Mitigation for IoV Flood Attacks. IEEE Internet of Things Journal. Publications

Gelenbe E, Nasereddin M. 2025. Adaptive Attack Mitigation for IoV Flood Attacks. IEEE Internet of Things Journal.

Journal: IEEE Internet of Things Journal Authors: Gelenbe E, Nasereddin M. Abstract: Gateway Servers for the Internet of Vehicles (IoV) must meet stringent Security and Quality of Service (QoS) requirements, including cyberattack protection, low delays and minimal packet loss, to offer secure real-time data exchange for human and vehicle safety…
Zhou G, Liu Y, Yan Z, Gelenbe E. 2024. Is ChatGPT Trustworthy Enough? A Review. IEEE Consumer Electronics Magazine 2024. Publications

Zhou G, Liu Y, Yan Z, Gelenbe E. 2024. Is ChatGPT Trustworthy Enough? A Review. IEEE Consumer Electronics Magazine 2024.

Journal: IEEE Consumer Electronics Magazine, vol. 13, 2024 Authors: Zhou G, Liu Y, Yan Z, Gelenbe E. Abstract: ChatGPT, as an advanced model that seamlessly integrates into diverse digital interactions, shows great potential to enhance the performance of consumer technology and reshape its landscape. The critical question of its trustworthiness…
Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. DSA 2024. Publications

Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. DSA 2024.

Conference: 11th International Conference on Dependable Systems and Their Applications (DSA2024), 2-3. November 2024, Taicang, Suzhou, China Authors: Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. Abstract: Compliance with international security standards is essential for ensuring the security of information systems, and thereby their dependability and trustworthiness. Compliance…
Barakat R, Josten S, Schneider M. 2024. Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. EuroCyberSec 2024. Publications

Barakat R, Josten S, Schneider M. 2024. Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Barakat R, Josten S, Schneider M. Abstract: Buffer overflows remain one of the most critical and widespread vulnerabilities in software systems. Traditional fuzzing techniques often lack the precision required to reliably detect buffer overflows. This paper presents BUFFERMONITOR, a novel approach…
Maliga D, Nagy R, Buttyán L. 2024. A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform. EuroCyberSec 2024. Publications

Maliga D, Nagy R, Buttyán L. 2024. A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Maliga D, Nagy R, Buttyán L. Abstract: In this paper, we present a pipeline that we designed for cleaning and processing large datasets of potentially malicious binaries using access to a rate-limited cloud-based malware analysis platform. Our goal is to efficiently…