Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Ryan Heartfield"'
Publikováno v:
IEEE Access, Vol 6, Pp 3491-3508 (2018)
Detection of cyber attacks against vehicles is of growing interest. As vehicles typically afford limited processing resources, proposed solutions are rule-based or lightweight machine learning techniques. We argue that this limitation can be lifted w
Externí odkaz:
https://doaj.org/article/1089faa40e054bbc863de673054b2d94
Publikováno v:
IEEE Access, Vol 4, Pp 6910-6928 (2016)
Semantic social engineering attacks are a pervasive threat to computer and communication systems. By employing deception rather than by exploiting technical vulnerabilities, spear-phishing, obfuscated URLs, drive-by downloads, spoofed websites, scare
Externí odkaz:
https://doaj.org/article/053bd208536544268def780a210f20dc
Virtually Secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments
Autor:
Blessing Odeleye, George Loukas, Ryan Heartfield, Georgia Sakellari, Emmanouil Panaousis, Fotios Spyridonis
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fcd10c052528733234c77866370b4974
https://bura.brunel.ac.uk/handle/2438/25370
https://bura.brunel.ac.uk/handle/2438/25370
The modern Internet of Things (IoT)-based smart home is a challenging environment to secure: devices change, new vulnerabilities are discovered and often remain unpatched, and different users interact with their devices differently and have different
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9497c96b09dd776b9436105c46484611
Autor:
Panagiotis Monachelis, Panagiotis Kasnesis, Charalampos Patrikakis, Xing Liang, Ryan Heartfield, George Loukas, Nelson Escravana, Soulla Louca
Following along the “technology as the solution” line of thought but with the added twist of putting a human in the loop, a team of eight coauthors led by Panagiotis Monachelis proposes to combine peer-to-peer decentralized networks and blockchai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::38fb94ae3d16dbe57abd379841e4c359
Autor:
Ryan Heartfield, Xing Liang, Panagiotis Kasnesis, George Loukas, Charalampos Z. Patrikakis, Lazaros Toumanidis
Publikováno v:
ICME Workshops
2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)
2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)
Identifying the provenance of information posted on social media and how this information may have changed over time can be very helpful in assessing its trustworthiness. Here, we introduce a novel mechanism for discovering "post-based" information c
Autor:
George Loukas, Ryan Heartfield
Publikováno v:
Computers & Security. 76:101-127
The notion that the human user is the weakest link in information security has been strongly, and, we argue, rightly contested in recent years. Here, we take a step further showing that the human user can in fact be the strongest link for detecting a
Publikováno v:
Simulation Modelling Practice and Theory. 73:83-94
Computation offloading has been used and studied extensively in relation to mobile devices. That is because their relatively limited processing power and reliance on a battery render the concept of offloading any processing/energy-hungry tasks to a r
Autor:
Michael G. Xevgenis, Evangelos Katsadouros, George Loukas, Ryan Heartfield, Dimitrios G. Kogias, Charalampos Z. Patrikakis, Maria Polychronaki, Helen C. Leligou
Publikováno v:
IT Professional
Crowdsourcing has been pursued as a way to leverage the power of the crowd for many different purposes in diverse sectors from collecting information, aggregating funds, and gathering employees to perform tasks of different sizes among other targets.
Autor:
George Loukas, Ryan Heartfield
Publikováno v:
International Journal on Cyber Situational Awareness. 1:110-129
While the human as a sensor concept has been utilised extensively for the detection of threats to safety and security in physical space, especially in emergency response and crime reporting, the concept is largely unexplored in the area of cyber secu