Skip to main content

Publications

Gelenbe E, Nakip M, Siavvas M. 2024. System-Wide Vulnerability and Trust in Multi-Component Communication System Software. IEEE Network. 2024. Publications

Gelenbe E, Nakip M, Siavvas M. 2024. System-Wide Vulnerability and Trust in Multi-Component Communication System Software. IEEE Network. 2024.

Journal: IEEE Network. 2024. Authors: Gelenbe E, Nakip M, Siavvas M. Abstract: In the software rich environment of 6G, systems will be surrounded by edge devices that support distributed software systems which are critical to operations. Such systems may also be subject to frequent updates or uploads of individual software…
Gelenbe E, Gül B, Nakip M. 2024. DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with Online Learning for Health Internet of Things and Internet of Vehicles. Internet of Things Journal . 2024. Publications

Gelenbe E, Gül B, Nakip M. 2024. DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with Online Learning for Health Internet of Things and Internet of Vehicles. Internet of Things Journal . 2024.

Journal: Internet of Things Journal. 2024. Authors: Gelenbe E, Gül B, Nakip M, Abstract: Networked health systems are often the victims of cyberattacks with serious consequences for patients and healthcare costs, with the Internet of Things (IoT) being an additional prime target. In future systems we can imagine that the…
Gelenbe E, Nakip M, Siavvas M. 2024. System-Wide Vulnerability of Multi-Component Software. Computers and Industrial Engineering. 2024. Publications

Gelenbe E, Nakip M, Siavvas M. 2024. System-Wide Vulnerability of Multi-Component Software. Computers and Industrial Engineering. 2024.

Journal: Computers and Industrial Engineering. 2024. Authors: Gelenbe E, Nakip M, Siavvas M. Abstract: In software systems comprised of many interconnected components, the vulnerability of each component will affect the vulnerability of other components and of the system as a whole. Existing techniques allow the quantification of the vulnerability of…
Xanthopoulou G, Siavvas M, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Software Requirements Classification: From Bag-of-Words to Transformer. WISP 2024. Publications

Xanthopoulou G, Siavvas M, Kalouptsoglou I, Kehagias D, Tzovaras D. 2024. Software Requirements Classification: From Bag-of-Words to Transformer. WISP 2024.

Conference: Special Session on Intelligent Internet of Things Security and Privacy (WISP 2024) at the 21st International Conference on Distributed Computing and Artificial Intelligence (DCAI 2024), 26-28. June 2024, Salamanca, Spain Authors: Xanthopoulou G, Siavvas M, Kalouptsoglou I, Kehagias D, Tzovaras D. Abstract: Automated classification of software requirements is valuable…
Barakat R, Weiss P, Blanckenburg J, Kraus R, Schneider M. 2024. Enhancing Software Security Analysis: Targeted Test Case Generation through Constraint Solving in Interactive Application Security Testing. QRS 2024. Publications

Barakat R, Weiss P, Blanckenburg J, Kraus R, Schneider M. 2024. Enhancing Software Security Analysis: Targeted Test Case Generation through Constraint Solving in Interactive Application Security Testing. QRS 2024.

Conference: The 24th IEEE International Conference on Software Quality, Reliability and Security (QRS 2024), 1-5 July 2024, Cambridge, UK Authors: Barakat R, Weiss P, Blanckenburg J, Kraus R, Schneider M. Abstract: Interactive Application Security Testing (IAST) is an innovative approach to improving software security assessment by combining the strengths of…