Now showing items 1-6 of 6

    • AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks 

      Ali, Sameer; Tan, Saw Chin; Lee, Ching Kwang; Yusoff, Zulfadzli; Haque, Muhammad Reazul; Mylonas, Alexios; Pitropakis, Nikolaos (2023-11-02)
      Software-Defined Networking (SDN), which is used in Industrial Internet of Things, uses a controller as its “network brain” located at the control plane. This uniquely distinguishes it from the traditional networking ...
    • A Comparative Analysis of Honeypots on Different Cloud Platforms 

      Kelly, Christopher; Pitropakis, Nikolaos; Mylonas, Alexios; McKeown, Sean; Buchanan, William J. (2021-04-01)
      In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The financial and operational advantages of moving ...
    • Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection 

      Kantartopoulos, Panagiotis; Pitropakis, Nikolaos; Mylonas, Alexios; Kylilis, Nicolas (2020-11-06)
      Social media has become very popular and important in people’s lives, as personal ideas, beliefs and opinions are expressed and shared through them. Unfortunately, social networks, and specifically Twitter, suffer from ...
    • Investigating Machine Learning Attacks on Financial Time Series Models 

      Gallagher, Michael; Pitropakis, Nikolaos; Chrysoulas, Christos; Papadopoulos, Pavlos; Mylonas, Alexios; Katsikas, Sokratis (2022-12-31)
      Machine learning and Artificial Intelligence (AI) already support human decision-making and complement professional roles, and are expected in the future to be sufficiently trusted to make autonomous decisions. To trust ...
    • Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT 

      Papadopoulos, Pavlos; Thornewill von Essen, Oliver; Pitropakis, Nikolaos; Chrysoulas, Christos; Mylonas, Alexios; Buchanan, William J. (2021-06)
      As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an ...
    • Towards lightweight url-based phishing detection 

      Butnaru, Andrei; Mylonas, Alexios; Pitropakis, Nikolaos (2021-06-13)
      Nowadays, the majority of everyday computing devices, irrespective of their size and operating system, allow access to information and online services through web browsers. However, the pervasiveness of web browsing in our ...