Skip to main content

Publications

Gelenbe E. 2025. Minimizing Delay and Power Consumption at the Edge. Sensors. Publications

Gelenbe E. 2025. Minimizing Delay and Power Consumption at the Edge. Sensors.

Journal: Sensors Authors: Gelenbe E. Abstract: Edge computing systems must offer low latency at low cost and low power consumption for sensors and other applications, including the IoT, smart vehicles, smart homes, and 6G. Thus, substantial research has been conducted to identify optimum task allocation schemes in this context using…
Gelenbe E, Nasereddin M. 2025. Adaptive Attack Mitigation for IoV Flood Attacks. IEEE Internet of Things Journal. Publications

Gelenbe E, Nasereddin M. 2025. Adaptive Attack Mitigation for IoV Flood Attacks. IEEE Internet of Things Journal.

Journal: IEEE Internet of Things Journal Authors: Gelenbe E, Nasereddin M. Abstract: Gateway Servers for the Internet of Vehicles (IoV) must meet stringent Security and Quality of Service (QoS) requirements, including cyberattack protection, low delays and minimal packet loss, to offer secure real-time data exchange for human and vehicle safety…
Zhou G, Liu Y, Yan Z, Gelenbe E. 2024. Is ChatGPT Trustworthy Enough? A Review. IEEE Consumer Electronics Magazine 2024. Publications

Zhou G, Liu Y, Yan Z, Gelenbe E. 2024. Is ChatGPT Trustworthy Enough? A Review. IEEE Consumer Electronics Magazine 2024.

Journal: IEEE Consumer Electronics Magazine, vol. 13, 2024 Authors: Zhou G, Liu Y, Yan Z, Gelenbe E. Abstract: ChatGPT, as an advanced model that seamlessly integrates into diverse digital interactions, shows great potential to enhance the performance of consumer technology and reshape its landscape. The critical question of its trustworthiness…
Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. DSA 2024. Publications

Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. DSA 2024.

Conference: 11th International Conference on Dependable Systems and Their Applications (DSA2024), 2-3. November 2024, Taicang, Suzhou, China Authors: Siavvas M, Xanthopoulou G, Kalouptsoglou I, Kehagias D, Tzovaras D. Abstract: Compliance with international security standards is essential for ensuring the security of information systems, and thereby their dependability and trustworthiness. Compliance…
Barakat R, Josten S, Schneider M. 2024. Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. EuroCyberSec 2024. Publications

Barakat R, Josten S, Schneider M. 2024. Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Barakat R, Josten S, Schneider M. Abstract: Buffer overflows remain one of the most critical and widespread vulnerabilities in software systems. Traditional fuzzing techniques often lack the precision required to reliably detect buffer overflows. This paper presents BUFFERMONITOR, a novel approach…