Cyber Risk Lab
Cyber Risk Lab
People
Projects
Publications
Contact
Emmanouil Panaousis
Latest
Multi-Stage Threat Modelling and Security Monitoring in 5GCN
Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT&CK
Automated Cyber and Privacy Risk Management Toolkit
Game-Theoretic Decision Support for Cyber Forensic Investigations
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review
Cyber-Insurance: Past, Present and Future
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations
Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning
How Secure is Home: Assessing Human Susceptibility to IoT Threats
Multiobjective Optimization Algorithms for Wireless Sensor Networks
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid
SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services
Deep Binarized Convolutional Neural Network Inferences over Encrypted Data
TT-SVD: an Efficient Sparse Decision Making Model with Two-way Trust Recommendation in the AI Enabled IoT Systems
An Efficient Attribute-based Multi-Keyword Search Scheme in Encrypted Keyword Generation
Dynamic Decision Support for Resource Offloading in Heterogeneous Internet of Things environments
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
On-the-fly Privacy for Location Histograms
Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users
DT-CP: a Double-TTPs Based Contract-Signing Protocol With Lower Computational Cost
A Taxonomy and Survey of Attacks Against Machine Learning
Post-Incident Audits on Cyber Insurance Discounts
Cut-The-Rope: A Game of Stealthy Intrusion
Honeypot Type Selection Games for Smart Grid Networks
CUREX: seCUre and pRivate hEalth data eXchange
Using Sparse Representation to Detect Anomalies in Complex WSNs
Distributed Key Management in Microgrids
Apparatus: A Framework for Security Analysis in Internet of Things Systems
Attacking IEC-60870-5-104 SCADA Systems
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality
TAW: Cost-Effective Threshold Authentication with Weights for Internet of Things
A Taxonomy and Survey of Cyber-Physical Intrusion Detection Approaches for Vehicles
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation
Cyber-Insurance as a Signaling Game: Self-Reporting and External Security Audits
An Enhanced Cyber Attack Attribution Framework
Towards the Definition of a Security Incident Response Modelling Language
Unsupervised Learning for Trustworthy IoT
Risk Assessment Uncertainties in Cybersecurity Investments
An Options Approach to Cybersecurity Investment
COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks
Selecting Security Mechanisms in Secure Tropos
Apparatus: Reasoning About Security Requirements in the Internet of Things
ASTo: A Tool for Security Analysis of IoT Systems
A Conceptual Model to Support Security Analysis in the Internet of Things
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions
Security Requirements Modelling for Virtualized 5G Small Cell Networks
Game Theoretic Path Selection to Support Security in Device-to-Device Communications
Evaluating Case-based Reasoning Knowledge Discovery in Fraud Detection
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments
Decision Support Approaches for Cyber Security Investment
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking
A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
Secure Message Delivery Games for Device-to-Device Communications
Cybersecurity Games and Investments: A Decision Support Approach
Game Theory Meets Information Security Management
Standardisation Advancements in the Area of Routing for Mobile Ad-Hoc Networks
A Probabilistic Algorithm for Secret Matrix Share Size Reduction
Secure Decentralised Ubiquitous Networking for Emergency Communications
Security Model for Emergency Real-Time Communications in Autonomous Networks
A Case Study of Internet of Things Based on Wireless Sensor Networks and Smart Phones
Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions
Recipients' Anonymity in Multihop Ad-Hoc Networks
Performance evaluation of secure video transmission over WIMAX
A Testbed Implementation for Securing OLSR in Mobile Ad-hoc Networks
ChaMeLeon (CML): A hybrid and adaptive routing protocol for Emergency Situations
ROBUST: Reliable Overlay Based Utilisation of Services and Topology for emergency MANETs
Secure Routing for Supporting Ad-hoc Extreme Emergency Infrastructures
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks
End-to-End Security Protection
A Framework Supporting Extreme Emergency Services
A Game Theoretic Approach for Securing AODV in Emergency Mobile Ad Hoc Networks
Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications
Maximizing Network Throughput
Optimizing the Channel Load Reporting Process in IEEE 802.11 k-enabled WLANs
Cite
×