Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Theodoros Spyridopoulos"'
Publikováno v:
IoT, Vol 5, Iss 2, Pp 356-380 (2024)
With the increase in the adoption of Internet of Things (IoT) devices, the security threat they face has become more pervasive. Recent research has demonstrated that most IoT devices are insecure and vulnerable to a range of cyber attacks. The impact
Externí odkaz:
https://doaj.org/article/1c1b28c718f74447be971bed5de992c0
Autor:
Ioannis Mavromatis, Theodoros Spyridopoulos, Pietro Carnelli, Woon Hau Chin, Ahmed Khalil, Jennifer Chakravarty, Lucia Cipolina Kun, Robert J. Piechocki, Colin Robbins, Daniel Cunnington, Leigh Chase, Lamogha Chiazor, Chris Preston, Rahul, Aftab Khan
Publikováno v:
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, Vol 10, Iss 4 (2024)
The way we travel is changing rapidly and Cooperative Intelligent Transportation Systems (C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces new risks and challenges, making cybersecurity a top priority for ens
Externí odkaz:
https://doaj.org/article/ad011100db094a3ab7ce97c0ededc6bb
Autor:
Ufuk Erol, Francesco Raimondo, James Pope, Samuel Gunner, Vijay Kumar, Ioannis Mavromatis, Pietro Carnelli, Theodoros Spyridopoulos, Aftab Khan, George Oikonomou
Publikováno v:
Data in Brief, Vol 49, Iss , Pp 109392- (2023)
A dataset of sensor measurements is presented. Our dataset contains discrete measurements of 8 IoT devices located in various places in a research lab at the University of Bristol. Nordic nRF52840 DK IoT devices periodically collects environmental da
Externí odkaz:
https://doaj.org/article/26a66c9fd3c94be88b7f5dfc900481f8
Publikováno v:
Science of Cyber Security ISBN: 9783031175503
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8bf6705e553e0bc00c05ae7f29b96905
https://doi.org/10.1007/978-3-031-17551-0_25
https://doi.org/10.1007/978-3-031-17551-0_25
Autor:
Ioannis Mavromatis, Adrian Sanchez-Mompo, Francesco Raimondo, James Pope, Marcello Bullo, Ingram Weeks, Vijay Kumar, Pietro Carnelli, George Oikonomou, Theodoros Spyridopoulos, Aftab Khan
Data integrity becomes paramount as the number of Internet of Things (IoT) sensor deployments increases. Sensor data can be altered by benign causes or malicious actions. Mechanisms that detect drifts and irregularities can prevent disruptions and da
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7a7f82778fbffae83edf4a38e6d91321
Autor:
Thomas Pasquier, Francesco Raimondo, Theodoros Spyridopoulos, Adrian Sanchez-Mompo, Bo Luo, James Pope, Pietro E. Carnelli, Ioannis Mavromatis, Robert J. Piechocki, Ryan McConville, Dan Howarth, Vijay Kumar, George Oikonomou, Aftab Khan
Publikováno v:
SenSys
Pope, J, Raimondo, F, Kumar, V, McConville, R, Piechocki, R J, Oikonomou, G, Paquier, T, Luo, B, Howarth, D, Mavromatis, I, Carnelli, P E, Sanchez-Mompo, A, Spyridopoulos, T & Khan, A 2021, ' Container Escape Detection for Edge Devices ', Paper presented at 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, 15/11/21-17/11/21 pp. 532-536 . https://doi.org/10.1145/3485730.3494114
Pope, J, Raimondo, F, Kumar, V, McConville, R, Piechocki, R J, Oikonomou, G, Paquier, T, Luo, B, Howarth, D, Mavromatis, I, Carnelli, P E, Sanchez-Mompo, A, Spyridopoulos, T & Khan, A 2021, ' Container Escape Detection for Edge Devices ', Paper presented at 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, 15/11/21-17/11/21 pp. 532-536 . https://doi.org/10.1145/3485730.3494114
Edge computing is rapidly changing the IoT-Cloud landscape. Various testbeds are now able to run multiple Docker-like containers developed and deployed by end-users on edge devices. However, this capability may allow an attacker to deploy a malicious
Autor:
Stylianos Karatzas, Vasiliki M. Lazari, Raya A. Al-Masri, Theo Tryfonas, Theodoros Spyridopoulos
Publikováno v:
Al-Masri, R, Spyridopoulos, T, Karatzas, S, Lazari, V & Tryfonas, T 2021, ' A Systems Approach to Understanding Geopolitical Tensions in the Middle East in the Face of a Global Water Shortage ', International Journal of System Dynamics Applications, vol. 10, no. 4, 31 . https://doi.org/10.4018/IJSDA.289431
In this paper the potential for conflict in the Middle East due to the depleting of regional water reserves is explored and the implications for regional policy making, in the light of other tensions are investigated. We use System Dynamics to develo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0e97de27e45a2d27da45d264023297df
https://hdl.handle.net/1983/e899ce5a-b628-4f08-bc8b-047ba930dde3
https://hdl.handle.net/1983/e899ce5a-b628-4f08-bc8b-047ba930dde3
Publikováno v:
CyberSA
Malicious software, often described as malware, is one of the greatest threats to modern computer systems, and attackers continue to develop more sophisticated methods to access and compromise data and resources. Machine learning methods have potenti
Autor:
George Oikonomou, Theodoros Spyridopoulos, Konstantinos Maraslis, Theo Tryfonas, Alexios Mylonas
Publikováno v:
Information Security Journal: A Global Perspective. 24:164-176
Literature in malware proliferation focuses on modeling and analyzing its spread dynamics. Epidemiology models, which are inspired by the characteristics of biological disease spread in human populations, have been used against this threat to analyze
Publikováno v:
Human Aspects of Information Security, Privacy and Trust ISBN: 9783319584591
HCI (22)
HCI (22)
Android users recently were given the ability to selectively grant access to sensitive resources of their mobile devices when apps request them at runtime. The Android fine-grained runtime permission model has been gracefully accepted by the majority
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::04120438c724c6eb0f64ec1ce69bacdc
https://doi.org/10.1007/978-3-319-58460-7_42
https://doi.org/10.1007/978-3-319-58460-7_42