Publications

Publications

Tsoukalas D, Siavvas M, Mathioudaki M, Kehagias D. 2021. An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary Results. 21st International Conference on Software Quality, Reliability and Security (IEEE QRS).

Conference: 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021) Authors: Tsoukalas D, Siavvas M, Mathioudaki M, Kehagias D. Abstract: Critical software vulnerabilities are often caused by incorrect, vague, or missing security requirements. Hence, there is a strong need in the software engineering community for tools that…
Publications

Gelenbe E, Nakip M, Marek D, Czachorski T. 2021. Diffusion Analysis Improves Scalability of IoT Networks to Mitigate the Massive Access Problem. MASCOTS 2021.

Conference: MASCOTS 2021 Authors: Gelenbe E, Nakip M, Marek D, Czachorski T. Abstract: A significant challenge of IoT networks is to offer Quality of Service (QoS) and meet deadline requirements when packets from a massive number of IoT devices are forwarded to an IoT gateway. Many IoT devices tend to…
Publications

Gelenbe E, Nowak M, Fröhlich P, Fiolka J, Checinski J. 2021. Energy, QoS and Security Aware Edge Services. EuroCybersec2021.

Conference: EuroCybersec2021 Authors: Gelenbe E, Nowak M, Fröhlich P, Fiolka J, Checinski J. Abstract: With the development of communication technologies and the increasing bandwidth of optical fibres and transmission speeds in current 5G and future 6G wireless networks, there is a growing demand for solutions organising traffic in such networks,…
Publications

Gelenbe E, Nakip M, Marek D, Czachorski T. 2021. Mitigating the Massive Access Problem in the Internet of Things. EuroCybersec2021.

Conference: EuroCybersec2021 Authors: Gelenbe E, Nakip M, Marek D, Czachorski T. Abstract: The traffic from the large number of IoT devices connected to the IoT is a source of congestion known as the Massive Access Problem (MAP), that results in packet losses, delays and missed deadlines for realtime data. This…
Publications

Fietkau J, Mehak Zahra S, Hartung M. 2021. Secure authentication for everyone! Enabling 2nd-factor authentication under real-world constraints. EuroCybersec2021.

Conference: EuroCybersec2021 Authors: Fietkau J, Mehak Zahra S, Hartung M. Abstract: Millions of user accounts have been exposed by data breaches within the last years. The leaked credentials pose a huge threat to many because they can be used for credential stuffing and brute-force attacks across all online services. The…