Publications

Publications

Kalouptsoglou I, Tsoukalas D, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2022. Time Series Forecasting of Software Vulnerabilities Using Statistical and Deep Learning Models. Electronics 2022, 11(18), 2820.

Journal: Electronics 2022, 11(18), 2820 Authors: Kalouptsoglou I, Tsoukalas D, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. Abstract: Software security is a critical aspect of modern software products. The vulnerabilities that reside in their source code could become a major weakness for enterprises that build or utilize these products,…
Publications

Czachórski T, Gelenbe E, Kuaban G. 2022. Modelling energy changes in the energy harvesting battery of an IoT device. IEEE MASCOTS 2022.

Conference: IEEE MASCOTS 2022 Authors: Czachórski T, Gelenbe E, Kuaban G. Abstract: The complexity of battery-powered autonomous devices such as Internet of Things (IoT) nodes or Unmanned Aerial Vehicles (UAV) and the necessity to  ensure an acceptable quality of service, reliability, and security, have  significantly increased their energy demand. In…
Publications

Gelenbe E, Nakip M. 2022. G-Networks that Detect Different Types of Cyberattacks. IEEE MASCOTS 2022.

Conference: IEEE MASCOTS 2022 Authors: Gelenbe E, Nakip M. Abstract: Malicious network attacks are a serious source of concern, and machine learning techniques have been widely used to build Attack Detectors. In particular, network based attacks have been widely studied since attacks try to compromise systems as network packets that…
Publications

Gelenbe E, Nakip M, Czachórski T. 2022. Improving Massive Access to IoT Gateways. Performance Evaluation. 2022.

Journal: Performance Evaluation. 2022. Authors: Gelenbe E, Nakip M, Czachórski T. Abstract: IoT networks handle incoming packets from large numbers of IoT Devices (IoTDs) to IoT Gateways. This can lead to the IoT Massive Access Problem that causes buffer overflow, large end-to-end delays and missed deadlines. This paper analyzes a…