Leandros Maglaras
Orcid: 0000-0001-5360-9782Affiliations:
- De Montfort University, School of Computer Science and Informatics, Leicester, UK
According to our database1,
Leandros Maglaras
authored at least 179 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on maglaras.org
-
on dmu.ac.uk
On csauthors.net:
Bibliography
2025
Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025
2024
AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks.
IEEE Internet Things J., November, 2024
Sensors, June, 2024
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns.
Int. J. Inf. Sec., June, 2024
Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects.
ICT Express, 2024
A novel TLS-based Fingerprinting approach that combines feature expansion and similarity mapping.
CoRR, 2024
Alignment of Cybersecurity Incident Prioritisation with Incident Response Management Maturity Capabilities.
CoRR, 2024
CoRR, 2024
Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs.
CoRR, 2024
ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis.
CoRR, 2024
CoRR, 2024
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems.
CoRR, 2024
Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing.
Comput., 2024
Proceedings of the 30th IEEE International Conference on Telecommunications, 2024
Cyber-Twin: Digital Twin-Boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024
Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
ICT Express, August, 2023
Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications.
J. Sens. Actuator Networks, June, 2023
Veh. Commun., February, 2023
Wirel. Pers. Commun., 2023
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing.
Sensors, 2023
PeerJ Comput. Sci., 2023
Inf., 2023
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise.
Inf. Comput. Secur., 2023
Toward a real-time TCP SYN Flood DDoS mitigation using Adaptive Neuro-Fuzzy classifier and SDN Assistance in Fog Computing.
CoRR, 2023
Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing.
CoRR, 2023
Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper.
CoRR, 2023
Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing.
Proceedings of the Wireless Internet - 16th EAI International Conference, 2023
Proceedings of the 8th South-East Europe Design Automation, 2023
Proceedings of the IEEE Globecom Workshops 2023, 2023
The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023
Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
2022
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning.
Dataset, April, 2022
PeerJ Comput. Sci., 2022
FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.
J. Parallel Distributed Comput., 2022
Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends.
IEEE Internet Things Mag., 2022
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity.
Comput., 2022
DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data.
IEEE Access, 2022
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.
IEEE Access, 2022
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks.
IEEE Access, 2022
Proceedings of the 7th South-East Europe Design Automation, 2022
Enhancing Privacy of Online Chat Apps Utilising Secure Node End-to-End Encryption (SNE2EE).
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
Proceedings of the Complex Networks and Their Applications XI, 2022
2021
EAI Endorsed Trans. Security Safety, 2021
WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.
Sensors, 2021
RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks.
Secur. Commun. Networks, 2021
Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia.
PeerJ Comput. Sci., 2021
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles.
J. Inf. Secur. Appl., 2021
Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies.
IEEE CAA J. Autom. Sinica, 2021
Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.
IEEE Access, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the 6th South-East Europe Design Automation, 2021
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021
Proceedings of the 2021 IEEE International Conference on Engineering, 2021
Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles.
Proceedings of the Cognitive Radio Oriented Wireless Networks and Wireless Internet, 2021
2020
DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids.
IEEE Trans. Engineering Management, 2020
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues.
Telecommun. Syst., 2020
Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems.
Sensors, 2020
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.
Sensors, 2020
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.
Internet Technol. Lett., 2020
J. Inf. Secur. Appl., 2020
Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems".
J. Inf. Secur. Appl., 2020
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study.
J. Inf. Secur. Appl., 2020
Int. J. Cyber Warf. Terror., 2020
RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.
Future Internet, 2020
ZKPs: Does This Make The Cut? Recent Advances and Success of Zero-Knowledge Security Protocols.
CoRR, 2020
A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles.
Array, 2020
Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges.
IEEE Access, 2020
The Impact of the Adversary's Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles.
Proceedings of the 5th South-East Europe Design Automation, 2020
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 6th Collaborative European Research Conference (CERC 2020), 2020
2019
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.
Sensors, 2019
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.
Secur. Commun. Networks, 2019
IEEE Internet Things J., 2019
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector.
Int. J. Medical Informatics, 2019
Gov. Inf. Q., 2019
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends.
CoRR, 2019
CoRR, 2019
DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services.
Comput., 2019
HEART-IS: A novel technique for evaluating human error-related information security incidents.
Comput. Secur., 2019
Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique.
IEEE Access, 2019
Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form.
IEEE Access, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 4th South-East Europe Design Automation, 2019
A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
2018
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures.
EAI Endorsed Trans. Security Safety, 2018
Secur. Commun. Networks, 2018
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes.
J. Netw. Comput. Appl., 2018
Convergence of detection probability, computational gains, and asymptotic analysis of an algorithm for physical-layer intrusion detection system.
Trans. Emerg. Telecommun. Technol., 2018
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.
CoRR, 2018
IEEE Access, 2018
Proceedings of the 11th IEEE Conference on Service-Oriented Computing and Applications, 2018
Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), 2018
2017
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems.
EAI Endorsed Trans. Security Safety, 2017
Secur. Commun. Networks, 2017
Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
J. Sens. Actuator Networks, 2017
Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security".
J. Inf. Secur. Appl., 2017
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017
SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.
Int. J. Cyber Warf. Terror., 2017
A security architectural pattern for risk management of industry control systems within critical national infrastructure.
Int. J. Crit. Infrastructures, 2017
IEEE Commun. Surv. Tutorials, 2017
Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems.
Comput. Secur., 2017
2016
IEEE Trans. Veh. Technol., 2016
A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems.
IEEE Trans. Ind. Informatics, 2016
EAI Endorsed Trans. Security Safety, 2016
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities.
EAI Endorsed Trans. Security Safety, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Mob. Inf. Syst., 2016
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems.
J. Inf. Secur. Appl., 2016
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2016
EAI Endorsed Trans. e Learn., 2016
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development.
CoRR, 2016
Proceedings of the 12th Annual Conference on Wireless On-demand Network Systems and Services, 2016
Proceedings of the Industrial Networks and Intelligent Systems, 2016
Proceedings of the Industrial Networks and Intelligent Systems, 2016
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
2015
EAI Endorsed Trans. Security Safety, 2015
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015
Proceedings of the 8th IFIP Wireless and Mobile Networking Conference, 2015
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
EAI Endorsed Trans. Mob. Commun. Appl., 2014
OCSVM model combined with K-means recursive clustering for intrusion detection in SCADA systems.
Proceedings of the 10th International Conference on Heterogeneous Networking for Quality, 2014
2013
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013
Exploiting vehicular communications for reducing CO2 emissions in urban environments.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013
Proceedings of the IEEE International Conference on Communications, 2013
Optimization of Corona onset and breakdown voltage of small air gaps stressed by DC and impulse voltages.
Proceedings of Eurocon 2013, 2013
2012
New measures for characterizing the significance of nodes in wireless ad hoc networks via localized path-based neighborhood analysis.
Soc. Netw. Anal. Min., 2012
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012
Distributed Skip Air Index for smart broadcasting in intelligent transportation systems.
Proceedings of the 2012 IEEE Intelligent Vehicles Symposium, 2012
Proceedings of the Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, 2012
2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
2009
New Metrics for Characterizing the Significance of Nodes in Wireless Networks via Path-Based Neighborhood Analysis.
Proceedings of the PCI 2009, 2009