Now showing items 1-14 of 14

    • An Academic Approach to Digital Forensics 

      Angelopoulou, Olga; Vidalis, Stilianos (2015)
      Digital forensics as a field of study creates a number of challenges when it comes to the academic environment. The aim of this paper is to explore these challenges in relation to the learning and teaching theories. We ...
    • Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases 

      Sharma, Gaurav; Vidalis, Stilianos; Menon, Catherine; Anand, Niharika (2023-05-30)
      Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the vulnerability management practitioners of an organization in which the ...
    • Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment 

      Gaurav, Gaurav Sharma; Vidalis, Stilianos; Menon, Catherine; Anand, Niharika; Kumar, Somesh (2021-07-31)
      Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security ...
    • Assessing Identity Theft in the Internet of Things 

      Vidalis, Stilianos; Angelopoulou, Olga (2014-03-01)
      In the Internet of Things everything is interconnected. In the same context that “man-made fire” got the party started for human civilisation, “man-made TCP” enabled computing devices to participate in our lives. Today we ...
    • Bridging Semantics with Ontologies 

      Chowdhurry, Tameem; Tubb, Christopher; Vidalis, Stilianos (2014)
      Semantic metadata enables contextual and relevant data to be identified for a particular entity. The use of ontologies creates a bridging mechanism, whereby semantic metadata can be referenced and validated to ensure that ...
    • Extracting Intelligence from Digital Forensic Artefacts 

      Vidalis, Stilianos; Angelopoulou, Olga; Jones, Andrew (2016-07-07)
      Forensic science and in particular digital forensics as a business process has predominantly been focusing on generating evidence for court proceedings. It is argued that in today’s socially-driven, knowledge-centric, ...
    • Forensically classifying files using HSOM algorithms 

      Pierris, Georgios; Vidalis, Stilianos (2012)
      It has been accepted by Cloud Computing vendors that retrieving data from a cloud environment once they have been deleted is next to impossible. This constitutes a major hurdle for the digital forensics examiner as it ...
    • Information Security and Digital Forensics in the world of Cyber Physical Systems 

      Jones, Andrew; Vidalis, Stilianos; Abouzakhar, Nasser (Institute of Electrical and Electronics Engineers (IEEE), 2017-01-26)
      The security of Cyber Physical Systems and any digital forensic investigations into them will be highly dependent on data that is stored and processed in the Cloud. This paper looks at a number of the issues that will need ...
    • Rethinking Digital Forensics 

      Jones, Andrew; Vidalis, Stilianos (2019-04-01)
      In the modern socially-driven, knowledge-based virtual computing environment in which organisations are operating, the current digital forensics tools and practices can no longer meet the need for scientific rigour. There ...
    • Smart homes under siege: Assessing the robustness of physical security against wireless network attacks 

      Allen, Ashley; Mylonas, Alexios; Vidalis, Stilianos; Gritzalis, Dimitris (2024-04)
      Nowadays domestic smart security devices, such as smart locks, smart doorbells, and security cameras, are becoming increasingly popular with users, due to their ease of use, convenience, and declining prices. Unlike ...
    • A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues 

      Sharma, Gaurav; Vidalis, Stilianos; Anand, Niharika; Menon, Catherine; Kumar, Somesh (2021-10-01)
      Security is a mandatory issue in any network, where sensitive data are transferred safely in the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile areas for different applications. ...
    • Towards the Resolution of Safety and Security Conflicts 

      Menon, Catherine; Vidalis, Stilianos (Institute of Electrical and Electronics Engineers (IEEE), 2022-02-25)
      Safety engineering and cyber security have complementary aims, but typically realise these using different techniques, risk assessment methods and cultural approaches. As a result, the integration of safety and cyber ...
    • A Trust-Based Approach for Data Sharing in the MQTT Environment 

      Chen, Liang; Vidalis, Stilianos; Yang, Su (IEEE Canada, 2023-11-22)
      Internet of Things (IoT) is considered as a giant network of connected devices who collect data and share them with each other. There has been extensive developments on IoT standards and protocols that enable IoT devices ...
    • When biology meets cyber-security: a review 

      Hassan, Mohamed; Vidalis, Stilianos; Mylonas, Alexios (2016-09-05)
      From the observations made on biology and nature, it could be seen that biological living creatures are very efficient in the functions of recognising and eliminating danger around them. Their ability to adapt within the ...