Zobrazeno 1 - 10
of 158
pro vyhledávání: '"Loukas, George"'
Autor:
McAreavey, Kevin, Liu, Weiru, Bauters, Kim, Ivory, Dennis, Loukas, George, Panaousis, Manos, Chen, Hsueh-Ju, Gill, Rea, Payler, Rachael, Vasalou, Asimina
In this paper we present results from a qualitative field study on explainable AI (XAI) for lay users (n = 18) who were subjected to AI cyberattacks. The study was based on a custom-built smart heating application called Squid and was conducted over
Externí odkaz:
http://arxiv.org/abs/2406.07369
Autor:
Budimir, Sanja, Fontaine, Johnny R J, Huijts, Nicole M A, Haans, Antal, Loukas, George, Roesch, Etienne B
Publikováno v:
Journal of Medical Internet Research, Vol 23, Iss 5, p e24879 (2021)
BackgroundWith the ever-expanding interconnectedness of the internet and especially with the recent development of the Internet of Things, people are increasingly at risk for cybersecurity breaches that can have far-reaching consequences for their pe
Externí odkaz:
https://doaj.org/article/050854c175a54eeebce4c347cd14b106
Autor:
Roy, Shanto, Panaousis, Emmanouil, Noakes, Cameron, Laszka, Aron, Panda, Sakshyam, Loukas, George
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and techniques, has been widely adopted by the cybersecurity industry as well as by academic researchers. Its broad range of industry applications include threat intellig
Externí odkaz:
http://arxiv.org/abs/2304.07411
Autor:
Panda, Sakshyam, Rass, Stefan, Moschoyiannis, Sotiris, Liang, Kaitai, Loukas, George, Panaousis, Emmanouil
The Internet of Vehicles (IoV), whereby interconnected vehicles communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. Data on vehicular attackers
Externí odkaz:
http://arxiv.org/abs/2111.02364
Autor:
Vasalou, Asimina, Gauthier, Andrea, Serta, Ana Luisa, Beşevli, Ceylan, Turner, Sarah, Payler, Rachael, Gill, Rea, McAreavey, Kevin, Loukas, George, Liu, Weiru, Beneito-Montagut, Roser
Publikováno v:
In International Journal of Human - Computer Studies June 2024 186
Cyber hygiene measures are often recommended for strengthening an organization's security posture, especially for protecting against social engineering attacks that target the human element. However, the related recommendations are typically the same
Externí odkaz:
http://arxiv.org/abs/2001.03782
Publikováno v:
In Computers & Security July 2023 130
Publikováno v:
Phys. Rev. E 99, 050303 (2019)
Social networks are the prime channel for the spreading of computer viruses. Yet the study of their propagation neglects the temporal nature of social interactions and the heterogeneity of users' susceptibility. Here, we introduce a theoretical frame
Externí odkaz:
http://arxiv.org/abs/1901.02801
Publikováno v:
In Forensic Science International: Digital Investigation March 2023 44