Category

Publications

Publications

Kalouptsoglou I, Tsoukalas D, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2022. Time Series Forecasting of Software Vulnerabilities Using Statistical and Deep Learning Models. Electronics 2022, 11(18), 2820.

Journal: Electronics 2022, 11(18), 2820 Authors: Kalouptsoglou I, Tsoukalas D, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. Abstract: Software security is a critical aspect of modern software products. The vulnerabilities that reside in their source code could become a major weakness for enterprises that build or utilize these products,…
Publications

Czachórski T, Gelenbe E, Kuaban G. 2022. Modelling energy changes in the energy harvesting battery of an IoT device. IEEE MASCOTS 2022.

Conference: IEEE MASCOTS 2022 Authors: Czachórski T, Gelenbe E, Kuaban G. Abstract: The complexity of battery-powered autonomous devices such as Internet of Things (IoT) nodes or Unmanned Aerial Vehicles (UAV) and the necessity to  ensure an acceptable quality of service, reliability, and security, have  significantly increased their energy demand. In…
Publications

Gelenbe E, Nakip M. 2022. G-Networks that Detect Different Types of Cyberattacks. IEEE MASCOTS 2022.

Conference: IEEE MASCOTS 2022 Authors: Gelenbe E, Nakip M. Abstract: Malicious network attacks are a serious source of concern, and machine learning techniques have been widely used to build Attack Detectors. In particular, network based attacks have been widely studied since attacks try to compromise systems as network packets that…
Publications

Gelenbe E, Nakip M, Czachórski T. 2022. Improving Massive Access to IoT Gateways. Performance Evaluation. 2022.

Journal: Performance Evaluation. 2022. Authors: Gelenbe E, Nakip M, Czachórski T. Abstract: IoT networks handle incoming packets from large numbers of IoT Devices (IoTDs) to IoT Gateways. This can lead to the IoT Massive Access Problem that causes buffer overflow, large end-to-end delays and missed deadlines. This paper analyzes a…
Publications

Kalouptsoglou I, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2022. Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction. Entropy. 2022, 24, 651.

Journal: Entropy 2022, 24, 651. Authors: Kalouptsoglou I, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. Abstract: Software security is a very important aspect for software development organizations who wish to provide high-quality and dependable software to their consumers. A crucial part of software security is the early detection of…
Publications

Siavvas M, Gelenbe E, Tsoukalas D, Kalouptsoglou I, Mathioudaki M, Nakip M, Kehagias D, Tzovaras D. 2022. The IoTAC Software Security-by-Design Platform: Concept, Challenges, and Preliminary Overview. KCYEU2022

Conference: 1st International Workshop on Key challenges in global cybersecurity: Efforts and trends in EU (KCYEU), co-located with DRCN 2022 Authors: Siavvas M, Gelenbe E, Tsoukalas D, Kalouptsoglou I, Mathioudaki M, Nakip M, Kehagias D, Tzovaras D. Abstract: Critical everyday activities handled by modern IoT Systems imply that security is…
Publications

Nowak M, Pecka P. 2022. Routing Algorithms Simulation for Self-Aware SDN. Electronics. 2022, 11, 104.

Journal: Electronics. 2022, 11, 104. Authors: Nowak M, Pecka P. Abstract: This paper presents a self-aware network approach with cognitive packets, with a routing engine based on random neural networks. The simulation  study, performed using a custom simulator extension of OmNeT++, compares RNN routing with other routing methods. The performance…
Publications

Fietkau J, Runge D, Seifert JP. 2021. Free By Design: On the Feasibility of Free-Riding Attacks Against Zero-rated Services. CANS2021

Conference: 20th International Conference On Cryptology And Network Security (CANS 2021) Authors: Fietkau J, Runge D, Seifert JP. Abstract: With free-riding attacks against zero-rated services, an attacker can avoid expenses by transmitting wrongly labeled zero-rated network traffic. Previous research has shown that free-riding attacks can affect network quality and increase…