Gregory Epiphaniou
Orcid: 0000-0003-1054-6368
According to our database1,
Gregory Epiphaniou
authored at least 83 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Resilient Machine Learning: Advancement, Barriers, and Opportunities in the Nuclear Industry.
ACM Comput. Surv., September, 2024
IET Quantum Commun., March, 2024
Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment.
Sensors, 2024
Pattern Recognit. Lett., 2024
SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing.
Internet Things, 2024
A Comprehensive Survey of Threats in Platooning - A Cloud-Assisted Connected and Autonomous Vehicle Application.
Inf., 2024
Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, 2024
Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, 2024
INSAFEDARE Project: Innovative Applications of Assessment and Assurance of Data and Synthetic Data for Regulatory Decision Support.
Proceedings of the Digital Health and Informatics Innovations for Sustainable Health Care Systems, 2024
Proceedings of the Digital Health and Informatics Innovations for Sustainable Health Care Systems, 2024
A Novel Taxonomy for Navigating and Classifying Synthetic Data in Healthcare Applications.
Proceedings of the Collaboration across Disciplines for the Health of People, Animals and Ecosystems, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Automated APT Defense Using Reinforcement Learning and Attack Graph Risk-based Situation Awareness.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024
2023
Analysis of outage performance in a 6G-V2X communications system utilising free-space optical quantum key distribution.
IET Quantum Commun., December, 2023
A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites.
Sensors, October, 2023
AI-augmented usability evaluation framework for software requirements specification in cyber physical human systems.
Internet Things, October, 2023
An Efficient Cross-Layer Authentication Scheme for Secure Communication in Vehicular Ad-Hoc Networks.
IEEE Trans. Veh. Technol., July, 2023
Simul. Model. Pract. Theory, May, 2023
IEEE Syst. J., March, 2023
J. Sens. Actuator Networks, February, 2023
Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey.
IEEE Trans. Engineering Management, 2023
A Deep-Learning-Based Solution for Securing the Power Grid Against Load Altering Threats by IoT-Enabled Devices.
IEEE Internet Things J., 2023
Neurocomputing, 2023
CoRR, 2023
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2023
MedSecurance Project: Advanced Security-for-Safety Assurance for Medical Device IoT (IoMT).
Proceedings of the Caring is Sharing - Exploiting the Value in Data for Health and Innovation - Proceedings of MIE 2023, Gothenburg, Sweden, 22, 2023
Proceedings of the 11th International Workshop on Biometrics and Forensics, 2023
Proceedings of the Joint Proceedings of the Second International Workshop on Knowledge Graph Generation From Text and the First International BiKE Challenge co-located with 20th Extended Semantic Conference (ESWC 2023), 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition.
IEEE Trans. Inf. Forensics Secur., 2022
Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store.
Sensors, 2022
J. Sens. Actuator Networks, 2022
Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks.
IEEE Internet Things J., 2022
Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems.
IEEE Internet Things J., 2022
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022
Barriers and Opportunities In Cyber Risk And Compliance Management For Data-Driven Supply Chains.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
2021
IEEE Trans. Veh. Technol., 2021
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021
Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles.
Phys. Commun., 2021
J. Sens. Actuator Networks, 2021
J. Sens. Actuator Networks, 2021
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things.
Comput. Secur., 2021
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
Comput. Secur., 2021
Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data.
Comput. Electr. Eng., 2021
Ad Hoc Networks, 2021
Proceedings of the Science and Technologies for Smart Cities, 2021
2020
Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security.
IEEE Trans. Engineering Management, 2020
Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security".
IEEE Trans. Engineering Management, 2020
A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments.
Sensors, 2020
IEEE Internet Things Mag., 2020
Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives.
IEEE Internet Things J., 2020
CyRes - Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract).
CoRR, 2020
2019
Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems.
J. Sens. Actuator Networks, 2019
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.
Ad Hoc Networks, 2019
AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms.
Proceedings of the 12th IEEE International Conference on Global Security, 2019
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace.
Proceedings of the 12th IEEE International Conference on Global Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
2018
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet Things J., 2018
Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
CoRR, 2018
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies.
CoRR, 2018
Physical characteristics of wireless communication channels for secret key establishment: A survey of the research.
Comput. Secur., 2018
Quantisation feasibility and performance of RSS-based secret key extraction in VANETs.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
2017
Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility.
Telematics Informatics, 2017
Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors.
CoRR, 2017
Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
2016
2014
Prevention against threats to self co-existence - A novel authentication protocol for cognitive radio networks.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014
2013
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
2012
Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls.
IET Inf. Secur., 2012
2011
A Theoretical Framework for Addressing Trust in Open Pervasive Networks.
Proceedings of the PECCS 2011, 2011
2010
An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes.
Proceedings of the SIGMAP 2010, 2010
The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss.
Proceedings of the ARES 2010, 2010