default search action
Helge Janicke
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c51]Yagmur Yigit, Kitty Kioskli, Laura Bishop, Nestoras Chouliaras, Leandros Maglaras, Helge Janicke:
Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins. WoWMoM 2025: 24-32 - 2024
- [j70]G. M. Sakhawat Hossain, Kaushik Deb, Helge Janicke, Iqbal H. Sarker:
PDF Malware Detection: Toward Machine Learning Modeling With Explainability Analysis. IEEE Access 12: 13833-13859 (2024) - [j69]Matthew G. Gaber, Mohiuddin Ahmed, Helge Janicke:
Malware Detection with Artificial Intelligence: A Systematic Literature Review. ACM Comput. Surv. 56(6): 148:1-148:33 (2024) - [j68]Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, Asif Gill, Leandros Maglaras:
Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects. ICT Express 10(4): 935-958 (2024) - [j67]Iqbal H. Sarker, Helge Janicke, Mohamed Amine Ferrag, Alsharif Abuadbba:
Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures. Internet Things 25: 101110 (2024) - [j66]Md. Zubair, Helge Janicke, Ahmad Mohsin, Leandros Maglaras, Iqbal H. Sarker:
Automated Sensor Node Malicious Activity Detection with Explainability Analysis. Sensors 24(12): 3712 (2024) - [i36]Mohammad Hasan, Mohammad Shahriar Rahman, Helge Janicke, Iqbal H. Sarker:
Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis. CoRR abs/2401.03530 (2024) - [i35]Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke:
Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities. CoRR abs/2405.04874 (2024) - [i34]Mohammad Amaz Uddin, Muhammad Nazrul Islam, Leandros Maglaras, Helge Janicke, Iqbal H. Sarker:
ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis. CoRR abs/2405.08026 (2024) - [i33]Ahmad Mohsin, Helge Janicke, Adrian Wood, Iqbal H. Sarker, Leandros Maglaras, Naeem Janjua:
Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs. CoRR abs/2406.12513 (2024) - [i32]Matthew Gaber, Mohiuddin Ahmed, Helge Janicke:
Zero Day Ransomware Detection with Pulse: Function Classification with Transformer Models and Assembly Language. CoRR abs/2408.07862 (2024) - 2023
- [j65]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. IEEE Secur. Priv. 21(6): 64-75 (2023) - [j64]Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke:
A Novel Authentication Method That Combines Honeytokens and Google Authenticator. Inf. 14(7): 386 (2023) - [j63]Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports. IEEE Trans. Intell. Transp. Syst. 24(2): 2368-2381 (2023) - [c50]Ahmad Mohsin, Helge Janicke, Surya Nepal, David Holmes:
Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity Operations. TPS-ISA 2023: 277-286 - [e6]Giampaolo Bella, Mihai Doinea, Helge Janicke:
Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13809, Springer 2023, ISBN 978-3-031-32635-6 [contents] - [i31]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. CoRR abs/2305.00639 (2023) - [i30]Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe:
Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper. CoRR abs/2308.05126 (2023) - [i29]Ahmad Mohsin, Helge Janicke, Surya Nepal, David Holmes:
Digital Twins and the Future of their Use Enabling Shift Left and Shift Right Cybersecurity Operations. CoRR abs/2309.13612 (2023) - [i28]Iqbal H. Sarker, Helge Janicke, Nazeeruddin Mohammad, Paul A. Watters, Surya Nepal:
AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity. CoRR abs/2310.12162 (2023) - 2022
- [j62]Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke:
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access 10: 40281-40306 (2022) - [j61]Leandros A. Maglaras, Mohamed Amine Ferrag, Helge Janicke, Nick Ayres, Leandros Tassiulas:
Reliability, Security, and Privacy in Power Grids. Computer 55(9): 85-88 (2022) - [j60]Chadni Islam, Muhammad Ali Babar, Roland Croft, Helge Janicke:
SmartValidator: A framework for automatic identification and classification of cyber threat data. J. Netw. Comput. Appl. 202: 103370 (2022) - [j59]Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag:
Cybersecurity of Critical Infrastructures: Challenges and Solutions. Sensors 22(14): 5105 (2022) - [c49]Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke:
Security Revisited: Honeytokens meet Google Authenticator. SEEDA-CECNSM 2022: 1-8 - [d1]Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke:
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning. IEEE DataPort, 2022 - [i27]Chadni Islam, Muhammad Ali Babar, Roland Croft, Helge Janicke:
SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data. CoRR abs/2203.07603 (2022) - [i26]Harjinder Lallie, Jane E. Sinclair, Mike Joy, Helge Janicke, Blaine A. Price, Richard Howley:
Pedagogic Challenges in Teaching Cyber Security - a UK Perspective. CoRR abs/2212.06584 (2022) - 2021
- [j58]Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu:
Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access 9: 138509-138542 (2021) - [j57]Richard Smith, Helge Janicke, Ying He, Fenia Ferra, Adham Albakri:
The Agile Incident Response for Industrial Control Systems (AIR4ICS) framework. Comput. Secur. 109: 102398 (2021) - [j56]Paul Loft, Ying He, Helge Janicke, Isabel Wagner:
Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis. Enterp. Inf. Syst. 15(4): 448-473 (2021) - [j55]Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke:
WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors 21(7): 2443 (2021) - [c48]Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris:
A novel Two-Factor HoneyToken Authentication Mechanism. ICCCN 2021: 1-7 - [c47]David Holmes, Maria Papathanasaki, Leandros Maglaras, Mohamed Amine Ferrag, Surya Nepal, Helge Janicke:
Digital Twins and Cyber Security - solution or challenge? SEEDA-CECNSM 2021: 1-8 - [c46]Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. TrustCom 2021: 887-894 - [i25]Ayodeji Oseni, Nour Moustafa, Helge Janicke, Peng Liu, Zahir Tari, Athanasios V. Vasilakos:
Security and Privacy for Artificial Intelligence: Opportunities and Challenges. CoRR abs/2102.04661 (2021) - [i24]Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. CoRR abs/2109.09259 (2021) - [i23]Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke:
Cybersecurity Revisited: Honeytokens meet Google Authenticator. CoRR abs/2112.08431 (2021) - 2020
- [j54]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert A. Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay K. Jha:
A Survey of COVID-19 Contact Tracing Apps. IEEE Access 8: 134577-134601 (2020) - [j53]Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports. IEEE Access 8: 209802-209834 (2020) - [j52]Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Aparicio-Navarro, Antonios Argyriou, Helge Janicke:
A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles. Array 5: 100013 (2020) - [j51]Dinesh Mothi, Helge Janicke, Isabel Wagner:
A novel principle to validate digital forensic models. Digit. Investig. 33: 200904 (2020) - [j50]Wen Zeng, Reem Bashir, Trevor Wood, François Siewe, Helge Janicke, Isabel Wagner:
How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems. EAI Endorsed Trans. Cloud Syst. 6(18): e1 (2020) - [j49]Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim, Makhlouf Derdour, Helge Janicke:
RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet 12(3): 44 (2020) - [j48]Mohamed Amine Ferrag, Leandros Maglaras, Sotiris Moschoyiannis, Helge Janicke:
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50 (2020) - [j47]Kevin I. Jones, Helge Janicke, Leandros Maglaras, Christos Xenakis:
Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems". J. Inf. Secur. Appl. 54: 102542 (2020) - [j46]Leandros Maglaras, Tiago Cruz, Mohamed Amine Ferrag, Helge Janicke:
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technol. Lett. 3(1) (2020) - [j45]Reem Bashir, Helge Janicke, Wen Zeng:
Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation. EAI Endorsed Trans. Security Safety 7(25): e2 (2020) - [j44]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke:
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues. Telecommun. Syst. 73(2): 317-348 (2020) - [j43]Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser, Helge Janicke:
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education. J. Comput. Virol. Hacking Tech. 16(1): 19-61 (2020) - [c45]George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook, Helge Janicke:
A NIS Directive Compliant Cybersecurity Maturity Assessment Framework. COMPSAC 2020: 1641-1646 - [c44]Maria Papathanasaki, Georgios Dimitriou, Leandros Maglaras, Ismini Vasileiou, Helge Janicke:
From Cyber Terrorism to Cyber Peacekeeping: Are we there yet? PCI 2020: 334-339 - [c43]Helge Janicke, Sharif Abuadbba, Surya Nepal:
Security and Privacy for a Sustainable Internet of Things. TPS-ISA 2020: 12-19 - [c42]Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva Raj Pokhrel, Surya Nepal, Helge Janicke:
Towards IoT Security Automation and Orchestration. TPS-ISA 2020: 55-63 - [c41]Nour Moustafa, Marwa Keshk, Essam Soliman Debie, Helge Janicke:
Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications. TrustCom 2020: 848-855 - [i22]George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook, Helge Janicke:
A NIS Directive compliant Cybersecurity Maturity Assessment Framework. CoRR abs/2004.10411 (2020) - [i21]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert A. Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay K. Jha:
A Survey of COVID-19 Contact Tracing Apps. CoRR abs/2006.10306 (2020) - [i20]Maria Papathanasaki, Georgios Dimitriou, Leandros Maglaras, Ismini Vasileiou, Helge Janicke:
From Cyber Terrorism to Cyber Peacekeeping: Are we there yet? CoRR abs/2010.07041 (2020) - [i19]Nour Moustafa, Marwa Keshk, Essam Soliman Debie, Helge Janicke:
Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications. CoRR abs/2010.08522 (2020) - [i18]Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke:
A novel Two-Factor HoneyToken Authentication Mechanism. CoRR abs/2012.08782 (2020)
2010 – 2019
- 2019
- [j42]Mark Glenn Evans, Ying He, Cunjin Luo, Iryna Yevseyeva, Helge Janicke, Leandros A. Maglaras:
Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form. IEEE Access 7: 102087-102101 (2019) - [j41]Mark Glenn Evans, Ying He, Cunjin Luo, Iryna Yevseyeva, Helge Janicke, Efpraxia D. Zamani, Leandros A. Maglaras:
Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique. IEEE Access 7: 142147-142175 (2019) - [j40]Mark Glenn Evans, Ying He, Leandros A. Maglaras, Helge Janicke:
HEART-IS: A novel technique for evaluating human error-related information security incidents. Comput. Secur. 80: 74-89 (2019) - [j39]Lee Hadlington, Masa Popovac, Helge Janicke, Iryna Yevseyeva, Kevin I. Jones:
Exploring the role of work identity and work locus of control in information security awareness. Comput. Secur. 81: 41-48 (2019) - [j38]Morta Vitunskaite, Ying He, Thomas Brandstetter, Helge Janicke:
Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. Comput. Secur. 83: 313-331 (2019) - [j37]Robert Luh, Helge Janicke, Sebastian Schrittwieser:
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes. Comput. Secur. 84: 120-147 (2019) - [j36]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros A. Maglaras:
Developing cyber peacekeeping: Observation, monitoring and reporting. Gov. Inf. Q. 36(2): 276-293 (2019) - [j35]Mark Glenn Evans, Ying He, Leandros A. Maglaras, Iryna Yevseyeva, Helge Janicke:
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. Int. J. Medical Informatics 127: 109-119 (2019) - [j34]Mark Glenn Evans, Ying He, Iryna Yevseyeva, Helge Janicke:
Published incidents and their proportions of human error. Inf. Comput. Secur. 27(3): 343-357 (2019) - [j33]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros A. Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet Things J. 6(2): 2188-2204 (2019) - [j32]Bruno Cruz, Silvana Gómez Meire, David Ruano-Ordás, Helge Janicke, Iryna Yevseyeva, José Ramón Méndez:
A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets. Sci. Program. 2019: 9067512:1-9067512:11 (2019) - [c40]Ahmed Ahmim, Leandros A. Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke:
A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models. DCOSS 2019: 228-233 - [c39]Cunjin Luo, Hasan Soygazi, Helge Janicke, Ying He:
Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS). EMBC 2019: 3454-3457 - [c38]Dimitrios Kosmanos, Apostolos Pappas, Francisco J. Aparicio-Navarro, Leandros A. Maglaras, Helge Janicke, Eerke A. Boiten, Antonios Argyriou:
Intrusion Detection System for Platooning Connected Autonomous Vehicles. SEEDA-CECNSM 2019: 1-9 - [i17]Leandros A. Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures. CoRR abs/1901.03899 (2019) - 2018
- [j31]Dimitrios Kosmanos, Leandros A. Maglaras, Michalis Mavrovouniotis, Sotiris Moschoyiannis, Antonios Argyriou, Athanasios Maglaras, Helge Janicke:
Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging. IEEE Access 6: 42551-42565 (2018) - [j30]Leandros A. Maglaras, Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, Tiago J. Cruz:
Cyber security of critical infrastructures. ICT Express 4(1): 42-45 (2018) - [j29]Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke:
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 101: 55-82 (2018) - [j28]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros Maglaras:
An introduction to cyber peacekeeping. J. Netw. Comput. Appl. 114: 70-87 (2018) - [j27]Leandros Maglaras, Lei Shu, Athanasios Maglaras, Jianmin Jiang, Helge Janicke, Dimitrios Katsaros, Tiago J. Cruz:
Editorial: Industrial Internet of Things (I2oT). Mob. Networks Appl. 23(4): 806-808 (2018) - [j26]Kyle Coffey, Richard Smith, Leandros Maglaras, Helge Janicke:
Vulnerability Analysis of Network Scanning on SCADA Systems. Secur. Commun. Networks 2018: 3794603:1-3794603:21 (2018) - [j25]Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. EAI Endorsed Trans. Security Safety 5(16): e1 (2018) - [j24]Robert Luh, Gregor Schramm, Markus Wagner, Helge Janicke, Sebastian Schrittwieser:
SEQUIN: a grammar inference framework for analyzing malicious system behavior. J. Comput. Virol. Hacking Tech. 14(4): 291-311 (2018) - [c37]Basil Alothman, Helge Janicke, Suleiman Y. Yerima:
Class Balanced Similarity-Based Instance Transfer Learning for Botnet Family Classification. DS 2018: 99-113 - [c36]Mark Glenn Evans, Ying He, Iryna Yevseyeva, Helge Janicke:
Analysis of Published Public Sector Information Security Incidents and Breaches to establish the Proportions of Human Error. HAISA 2018: 191-202 - [p1]Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, Awais Yousaf:
Vulnerability Assessment of Cyber Security for SCADA Systems. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 59-80 - [i16]Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Athanasios V. Vasilakos, Stylianos Rallis, Helge Janicke:
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues. CoRR abs/1803.10281 (2018) - [i15]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros Maglaras:
Developing Cyber Peacekeeping: Observation, Monitoring and Reporting. CoRR abs/1806.02608 (2018) - [i14]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. CoRR abs/1806.09099 (2018) - [i13]Ahmed Ahmim, Leandros Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke:
A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models. CoRR abs/1812.09059 (2018) - [i12]Michael Robinson, Kevin I. Jones, Helge Janicke, Leandros Maglaras:
Developing Cyber Buffer Zones. CoRR abs/1812.11900 (2018) - 2017
- [j23]Allan Cook, Helge Janicke, Richard Smith, Leandros A. Maglaras:
The industrial control system cyber defence triage process. Comput. Secur. 70: 467-481 (2017) - [j22]Andy Wood, Ying He, Leandros A. Maglaras, Helge Janicke:
A security architectural pattern for risk management of industry control systems within critical national infrastructure. Int. J. Crit. Infrastructures 13(2/3): 113-132 (2017) - [j21]Allan Cook, Richard Smith, Leandros A. Maglaras, Helge Janicke:
SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. Int. J. Cyber Warf. Terror. 7(2): 1-15 (2017) - [j20]Jacqueline Cope, François Siewe, Feng Chen, Leandros A. Maglaras, Helge Janicke:
On data leakage from non-production systems. Inf. Comput. Secur. 25(4): 454-474 (2017) - [j19]Barnaby Stewart, Luís Rosa, Leandros A. Maglaras, Tiago J. Cruz, Mohamed Amine Ferrag, Paulo Simões, Helge Janicke:
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes. EAI Endorsed Trans. Ind. Networks Intell. Syst. 4(10): e4 (2017) - [j18]Kevin I. Jones, Helge Janicke, Christian Facchi, Leandros A. Maglaras:
Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security". J. Inf. Secur. Appl. 34: 152 (2017) - [j17]Samuel Chapman, Richard Smith, Leandros A. Maglaras, Helge Janicke:
Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? J. Sens. Actuator Networks 6(3): 16 (2017) - [j16]Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, Lei Shu:
Authentication Protocols for Internet of Things: A Comprehensive Survey. Secur. Commun. Networks 2017: 6562953:1-6562953:41 (2017) - [j15]Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, Sebastian Schrittwieser:
Semantics-aware detection of targeted attacks: a survey. J. Comput. Virol. Hacking Tech. 13(1): 47-85 (2017) - [c35]Nasser Abwnawar, Helge Janicke, Richard Smith:
Towards location-aware access control and data privacy in inter-cloud communications. EUROCON 2017: 739-744 - [c34]Nasser Abwnawar, Helge Janicke, Richard Smith, Aboubaker Lasebae:
Towards data privacy in heterogeneous cloud environments: An extension to the SANTA policy language. FMEC 2017: 14-19 - [c33]Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke:
Design of an Anomaly-based Threat Detection & Explication System. ICISSP 2017: 397-402 - [c32]Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke, Edgar R. Weippl:
Poster: Design of an Anomaly-based Threat Detection & Explication System. SACMAT 2017: 119-120 - [e5]Leandros A. Maglaras, Helge Janicke, Kevin I. Jones:
Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 - November 1, 2016, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 188, 2017, ISBN 978-3-319-52568-6 [contents] - [i11]Mohamed Amine Ferrag, Leandros A. Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke:
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes. CoRR abs/1708.04027 (2017) - [i10]Dimitrios Kosmanos, Leandros A. Maglaras, Michalis Mavrovouniotis, Sotiris Moschoyiannis, Antonios Argyriou, Athanasios Maglaras, Helge Janicke:
Route Optimization of Electric Vehicles based on Dynamic Wireless Charging. CoRR abs/1710.03726 (2017) - [i9]Michael Robinson, Kevin I. Jones, Helge Janicke:
An Introduction to Cyber Peacekeeping. CoRR abs/1710.09616 (2017) - [i8]Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin I. Jones, Helge Janicke:
Internet of Cloud: Security and Privacy issues. CoRR abs/1711.00525 (2017) - 2016
- [j14]Shaimaa M. Nafea, Leandros A. Maglaras, François Siewe, Richard Smith, Helge Janicke:
Personalized Students' Profile Based On Ontology and Rule-based Reasoning. EAI Endorsed Trans. e Learn. 3(12): e6 (2016) - [j13]Allan Cook, Andrew Nicholson, Helge Janicke, Leandros A. Maglaras, Richard Smith:
Attribution of Cyber Attacks on Industrial Control Systems. EAI Endorsed Trans. Ind. Networks Intell. Syst. 3(7): e3 (2016) - [j12]Leandros A. Maglaras, Ali H. Al-Bayatti, Ying He, Isabel Wagner, Helge Janicke:
Social Internet of Vehicles for Smart Cities. J. Sens. Actuator Networks 5(1): 3 (2016) - [j11]Dimitrios Kosmanos, Nikolas Prodromou, Antonios Argyriou, Leandros A. Maglaras, Helge Janicke:
MIMO Techniques for Jamming Threat Suppression in Vehicular Networks. Mob. Inf. Syst. 2016: 8141204:1-8141204:9 (2016) - [j10]Mark Glenn Evans, Leandros A. Maglaras, Ying He, Helge Janicke:
Human behaviour as an aspect of cybersecurity assurance. Secur. Commun. Networks 9(17): 4667-4679 (2016) - [j9]Helge Janicke, Kevin I. Jones, Leandros A. Maglaras:
Security, Privacy and Trust in Cyber Physical Systems. EAI Endorsed Trans. Security Safety 3(7): e1 (2016) - [j8]Najlaa Almajed, Leandros A. Maglaras, François Siewe, Helge Janicke, Pooneh Bagheri Zadeh:
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities. EAI Endorsed Trans. Security Safety 3(7): e4 (2016) - [c31]Isabel Wagner, Ying He, Duska Rosenberg, Helge Janicke:
User interface design for privacy awareness in eHealth technologies. CCNC 2016: 38-43 - [c30]Aisha Abubakar, Pooneh Bagheri Zadeh, Helge Janicke, Richard Howley:
Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft. Cyber Security And Protection Of Digital Services 2016: 1-5 - [c29]Allan Cook, Richard Smith, Leandros A. Maglaras, Helge Janicke:
Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure. ICS-CSR 2016 - [c28]Allan Cook, Richard Smith, Leandros A. Maglaras, Helge Janicke:
Measuring the Risk of Cyber Attack in Industrial Control Systems. ICS-CSR 2016 - [c27]Andrew Wain, Stephan Reiff-Marganiec, Kevin I. Jones, Helge Janicke:
Towards a Distributed Runtime Monitor for ICS/SCADA Systems. ICS-CSR 2016 - [c26]Glen Hawthorne, Ying He, Leandros A. Maglaras, Helge Janicke:
Security Visualization: Detecting Denial of Service. INISCOM 2016: 39-49 - [c25]Barnaby Stewart, Luís Rosa, Leandros A. Maglaras, Tiago J. Cruz, Paulo Simões, Helge Janicke:
Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System. INISCOM 2016: 90-100 - [e4]Thomas Brandstetter, Helge Janicke:
4th International Symposium for ICS & SCADA Cyber Security Research 2016, ICS-CSR 2016, 23 - 25 August 2016, Queen's Belfast University, UK. Workshops in Computing, BCS 2016 [contents] - [i7]Mark Glenn Evans, Leandros A. Maglaras, Ying He, Helge Janicke:
Human Behaviour as an aspect of Cyber Security Assurance. CoRR abs/1601.03921 (2016) - [i6]Steve Harrison, Antonis Tzounis, Leandros A. Maglaras, François Siewe, Richard Smith, Helge Janicke:
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development. CoRR abs/1604.02368 (2016) - [i5]Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang:
A Survey on Privacy-preserving Schemes for Smart Grid Communications. CoRR abs/1611.07722 (2016) - [i4]Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang:
Authentication Protocols for Internet of Things: A Comprehensive Survey. CoRR abs/1612.07206 (2016) - 2015
- [j7]Michael Robinson, Kevin I. Jones, Helge Janicke:
Cyber warfare: Issues and challenges. Comput. Secur. 49: 70-94 (2015) - [j6]Giampaolo Bella, Helge Janicke:
Special issue on the Security Track at the ACM Symposium on Applied Computing 2013. Int. J. Inf. Sec. 14(2): 101-102 (2015) - [c24]Ying He, Leandros A. Maglaras, Helge Janicke, Kevin I. Jones:
An Industrial Control Systems incident response decision framework. CNS 2015: 761-762 - [c23]Ying He, Helge Janicke:
Towards Agile Industrial Control Systems Incident Response. ICS-CSR 2015 - [c22]Grigoris Tzokatziou, Leandros A. Maglaras, Helge Janicke:
Insecure by Design: Using Human Interface Devices to exploit SCADA systems. ICS-CSR 2015 - [c21]Pavlos Basaras, Leandros A. Maglaras, Dimitrios Katsaros, Helge Janicke:
A Robust Eco-Routing Protocol against Malicious Data in Vehicular Networks. WMNC 2015: 184-191 - [e3]Helge Janicke, Kevin I. Jones:
3rd International Symposium for ICS & SCADA Cyber Security Research 2015, ICS-CSR 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany. Workshops in Computing, BCS 2015 [contents] - [i3]Pavlos Basaras, Leandros A. Maglaras, Dimitrios Katsaros, Helge Janicke:
A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks. CoRR abs/1506.05017 (2015) - 2014
- [j5]Jonathan P. Bowen, Mike Hinchey, Helge Janicke, Martin P. Ward, Hussein Zedan:
Formality, Agility, Security, and Evolution in Software Development. Computer 47(10): 86-89 (2014) - [j4]Bernd Carsten Stahl, Neil F. Doherty, Mark Christopher Shaw, Helge Janicke:
Critical Theory as an Approach to the Ethics of Information Security. Sci. Eng. Ethics 20(3): 675-699 (2014) - [c20]Andrew Nicholson, Helge Janicke, Antonio Cau:
Position Paper: Safety and Security Monitoring in ICS/SCADA Systems. ICS-CSR 2014 - [c19]Stephan Reiff-Marganiec, Marcel Tilly, Helge Janicke:
Low-Latency Service Data Aggregation Using Policy Obligations. ICWS 2014: 526-533 - [c18]Ruzanna Chitchyan, Ahmed Obeid, Helge Janicke:
Study of Architectural Impact On Software Sustainability. RE4SuSy@RE 2014: 13-16 - [e2]Helge Janicke, Kevin I. Jones:
2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria. Workshops in Computing, BCS 2014, ISBN 978-1-78017-286-6 [contents] - [i2]Hosam Alhakami, Feng Chen, Helge Janicke:
An Extended Stable Marriage Problem Algorithm for Clone Detection. CoRR abs/1408.2969 (2014) - 2013
- [j3]Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan:
Dynamic Access Control Policies: Specification and Verification. Comput. J. 56(4): 440-463 (2013) - [j2]Antonio Cau, Helge Janicke, Ben C. Moszkowski:
Verification and enforcement of access control policies. Formal Methods Syst. Des. 43(3): 450-492 (2013) - [c17]Andrew Nicholson, Helge Janicke, Tim Watson:
An Initial Investigation into Attribution in SCADA Systems. ICS-CSR 2013 - [c16]Andreas Huebner, Christian Facchi, Markus Meyer, Helge Janicke:
A Model-Based Approach for RFID Application Testing. TrustCom/ISPA/IUCC 2013: 1490-1497 - [c15]Andreas Huebner, Christian Facchi, Markus Meyer, Helge Janicke:
RFID systems from a cyber-physical systems perspective. WISES 2013: 1-6 - [e1]Helge Janicke, Kevin I. Jones:
1st International Symposium for ICS & SCADA Cyber Security Research 2013, ICS-CSR 2013, 16-17 September 2013, Leicester, UK. Workshops in Computing, BCS 2013, ISBN 978-1-780172-32-3 [contents] - 2012
- [j1]Andrew Nicholson, Stuart Webber, Shaun Dyer, Tanuja Patel, Helge Janicke:
SCADA security in the light of Cyber-Warfare. Comput. Secur. 31(4): 418-436 (2012) - [c14]Adeeb Alnajjar, Helge Janicke:
Multi-Factor Authentication Using Hardware Information and User Profiling Techniques. HAISA 2012: 160-173 - [c13]Marcel Tilly, Stephan Reiff-Marganiec, Helge Janicke:
Efficient Data Processing for Large-Scale Cloud Services. SERVICES 2012: 242-250 - [i1]Hamza Aldabbas, Tariq Falah Alwada'n, Helge Janicke, Ali H. Al-Bayatti:
Data Confidentiality in Mobile Ad hoc Networks. CoRR abs/1203.1749 (2012) - 2011
- [c12]Tariq Falah Alwada'n, Helge Janicke, Omer Aldabbas, Mai Alfawair:
New Framework for Policy Support for Mobile Grid Services. CRiSIS 2011: 88-93 - [c11]Helge Janicke, Mohamed Sarrab, Hamza Aldabbas:
Controlling Data Dissemination. DPM/SETOP 2011: 303-309 - [c10]Tariq Falah Alwada'n, Helge Janicke, Omer Aldabbas, Hamza Aldabbas:
New Framework for Dynamic Policy Management in Grid Environments. WiMo/CoNeCo 2011: 297-304 - 2010
- [c9]Ali Alzahrani, Helge Janicke, Sarshad Abubaker:
Decentralized XACML Overlay Network. CIT 2010: 1032-1037 - [c8]Omar Alshathry, Helge Janicke:
Optimizing Software Quality Assurance. COMPSAC Workshops 2010: 87-92
2000 – 2009
- 2009
- [c7]Kevin I. Jones, Helge Janicke, Antonio Cau:
A Property Based Framework for Trust and Reputation in Mobile Computing. AINA Workshops 2009: 1031-1036 - 2008
- [c6]Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan:
Concurrent Enforcement of Usage Control Policies. POLICY 2008: 111-118 - 2007
- [b1]Helge Janicke:
The development of secure multi-agent systems. De Montfort University, Leicester, UK, 2007 - [c5]Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan:
Deriving Enforcement Mechanisms from Policies. POLICY 2007: 161-172 - [c4]Helge Janicke, Antonio Cau, Hussein Zedan:
A note on the formalisation of UCON. SACMAT 2007: 163-168 - 2006
- [c3]Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan, Kevin I. Jones:
A Compositional Event & Time-Based Policy Model. POLICY 2006: 173-182 - 2005
- [c2]Patrick Beautement, David N. Allsopp, Mark Greaves, Steve Goldsmith, Shannon Spires, Simon G. Thompson, Helge Janicke:
Autonomous Agents and Multi -agent Systems (AAMAS) for the Military - Issues and Challenges. DAMAS 2005: 1-13 - [c1]Helge Janicke, François Siewe, Kevin I. Jones, Antonio Cau, Hussein Zedan:
Analysis and Run-Time Verification of Dynamic Security Policies. DAMAS 2005: 92-103
Coauthor Index
aka: Leandros A. Maglaras
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint