Skip to main content
Category

Publications

Siavvas M, Kalouptsoglou I, Gelenbe E, Kehagias D, Tzovaras D. 2024. Transforming the field of Vulnerability Prediction: Are Large Language Models the key? EuroCyberSec 2024. Publications

Siavvas M, Kalouptsoglou I, Gelenbe E, Kehagias D, Tzovaras D. 2024. Transforming the field of Vulnerability Prediction: Are Large Language Models the key? EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Siavvas M, Kalouptsoglou I, Gelenbe E, Kehagias D, Tzovaras D. Abstract: Vulnerability prediction is an important mechanism for secure software development, as it enables the early identification and mitigation of software vulnerabilities. Vulnerability prediction models (VPMs) are machine learning (ML) models…
Nakip M, Gelenbe E. 2024. An Associated Random Neural Network Detects Intrusions and Estimates Attack Graphs. EuroCyberSec 2024. Publications

Nakip M, Gelenbe E. 2024. An Associated Random Neural Network Detects Intrusions and Estimates Attack Graphs. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Nakip M, Gelenbe E. Abstract: Cyberattacks, especially Botnet Distributed Denial of Service (DDoS), increasingly target networked systems, compromise interconnected nodes by constantly spreading malware. In order to prevent these attacks in their early stages, which includes stopping the spread of malware,…
Nasereddin M, Nakip M, Gelenbe E. 2024. A Deep Learning based Intrusion Detection and Prevention System for Mitigating DoS Attacks. EuroCyberSec2024 Publications

Nasereddin M, Nakip M, Gelenbe E. 2024. A Deep Learning based Intrusion Detection and Prevention System for Mitigating DoS Attacks. EuroCyberSec2024

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Nasereddin M, Nakip M, Gelenbe E. Abstract: Internet of Things (IoT) networks are highly vulnerable to network attacks, the most common examples being DoS and DDoS attacks. Those attacks flood the limited system resources of IoT devices and overwhelm networks with…
Ma Y, Gelenbe E, Liu K. 2024. IoT Performance for Maritime Passenger Evacuation. WF-IoT 2024. Publications

Ma Y, Gelenbe E, Liu K. 2024. IoT Performance for Maritime Passenger Evacuation. WF-IoT 2024.

Conference: WF-IoT 2024, 10-13. November 2024, Ottawa, Canada Authors: Ma Y, Gelenbe E, Liu K. Abstract: The safe and swift evacuation of passengers from Maritime Vessels, requires an effective Internet of Things (IoT) as well as an information and communication technology (ICT) infrastructure. However, during emergencies, delays in IoT and…
Bergquist J, Gelenbe E, Sigman K. 2024. On an Adaptive-Quasi-Deterministic Transmission Policy Queueing Model. MASCOTS 2024 Publications

Bergquist J, Gelenbe E, Sigman K. 2024. On an Adaptive-Quasi-Deterministic Transmission Policy Queueing Model. MASCOTS 2024

Conference: MASCOTS 2024 Authors: Bergquist J, Gelenbe E, Sigman K. Abstract: We analyze, further and deeper, a recently proposed technique for addressing the Massive Access Problem (MAP), an issue in telecommunications which arises when too many devices transmit packets to a gateway in quick succession. This technique, the Adaptive-Quasi-Deterministic Transmission…
Gelenbe E, Nakip M, Siavvas M. 2024. System-Wide Vulnerability and Trust in Multi-Component Communication System Software. IEEE Network. 2024. Publications

Gelenbe E, Nakip M, Siavvas M. 2024. System-Wide Vulnerability and Trust in Multi-Component Communication System Software. IEEE Network. 2024.

Journal: IEEE Network. 2024. Authors: Gelenbe E, Nakip M, Siavvas M. Abstract: In the software rich environment of 6G, systems will be surrounded by edge devices that support distributed software systems which are critical to operations. Such systems may also be subject to frequent updates or uploads of individual software…
Gelenbe E, Gül B, Nakip M. 2024. DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with Online Learning for Health Internet of Things and Internet of Vehicles. Internet of Things Journal . 2024. Publications

Gelenbe E, Gül B, Nakip M. 2024. DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with Online Learning for Health Internet of Things and Internet of Vehicles. Internet of Things Journal . 2024.

Journal: Internet of Things Journal. 2024. Authors: Gelenbe E, Gül B, Nakip M, Abstract: Networked health systems are often the victims of cyberattacks with serious consequences for patients and healthcare costs, with the Internet of Things (IoT) being an additional prime target. In future systems we can imagine that the…
Gelenbe E, Nakip M, Siavvas M. 2024. System-Wide Vulnerability of Multi-Component Software. Computers and Industrial Engineering. 2024. Publications

Gelenbe E, Nakip M, Siavvas M. 2024. System-Wide Vulnerability of Multi-Component Software. Computers and Industrial Engineering. 2024.

Journal: Computers and Industrial Engineering. 2024. Authors: Gelenbe E, Nakip M, Siavvas M. Abstract: In software systems comprised of many interconnected components, the vulnerability of each component will affect the vulnerability of other components and of the system as a whole. Existing techniques allow the quantification of the vulnerability of…
Xanthopoulou G, Siavvas M, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Software Requirements Classification: From Bag-of-Words to Transformer. WISP 2024. Publications

Xanthopoulou G, Siavvas M, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Software Requirements Classification: From Bag-of-Words to Transformer. WISP 2024.

Conference: Special Session on Intelligent Internet of Things Security and Privacy (WISP 2024) at the 21st International Conference on Distributed Computing and Artificial Intelligence (DCAI 2024), 26-28. June 2024, Salamanca, Spain Authors: Xanthopoulou G, Siavvas M, Kalouptsoglou I, Kehagias D, Tzovaras D. Abstract: Automated classification of software requirements is valuable…
Barakat R, Weiss P, Blanckenburg J, Kraus R, Schneider M. 2024. Enhancing Software Security Analysis: Targeted Test Case Generation through Constraint Solving in Interactive Application Security Testing. QRS 2024. Publications

Barakat R, Weiss P, Blanckenburg J, Kraus R, Schneider M. 2024. Enhancing Software Security Analysis: Targeted Test Case Generation through Constraint Solving in Interactive Application Security Testing. QRS 2024.

Conference: The 24th IEEE International Conference on Software Quality, Reliability and Security (QRS 2024), 1-5 July 2024, Cambridge, UK Authors: Barakat R, Weiss P, Blanckenburg J, Kraus R, Schneider M. Abstract: Interactive Application Security Testing (IAST) is an innovative approach to improving software security assessment by combining the strengths of…