Publications

Publications

Siavvas M, Gelenbe E, Tsoukalas D, Kalouptsoglou I, Mathioudaki M, Nakip M, Kehagias D, Tzovaras D. 2022. The IoTAC Software Security-by-Design Platform: Concept, Challenges, and Preliminary Overview. KCYEU2022

Conference: 1st International Workshop on Key challenges in global cybersecurity: Efforts and trends in EU (KCYEU), co-located with DRCN 2022 Authors: Siavvas M, Gelenbe E, Tsoukalas D, Kalouptsoglou I, Mathioudaki M, Nakip M, Kehagias D, Tzovaras D. Abstract: Critical everyday activities handled by modern IoT Systems imply that security is…
Publications

Nowak M, Pecka P. 2022. Routing Algorithms Simulation for Self-Aware SDN. Electronics. 2022, 11, 104.

Journal: Electronics. 2022, 11, 104. Authors: Nowak M, Pecka P. Abstract: This paper presents a self-aware network approach with cognitive packets, with a routing engine based on random neural networks. The simulation  study, performed using a custom simulator extension of OmNeT++, compares RNN routing with other routing methods. The performance…
Publications

Fietkau J, Runge D, Seifert JP. 2021. Free By Design: On the Feasibility of Free-Riding Attacks Against Zero-rated Services. CANS2021

Conference: 20th International Conference On Cryptology And Network Security (CANS 2021) Authors: Fietkau J, Runge D, Seifert JP. Abstract: With free-riding attacks against zero-rated services, an attacker can avoid expenses by transmitting wrongly labeled zero-rated network traffic. Previous research has shown that free-riding attacks can affect network quality and increase…
Publications

Tsoukalas D, Siavvas M, Mathioudaki M, Kehagias D. 2021. An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary Results. 21st International Conference on Software Quality, Reliability and Security (IEEE QRS).

Conference: 21st IEEE International Conference on Software Quality, Reliability and Security (QRS 2021) Authors: Tsoukalas D, Siavvas M, Mathioudaki M, Kehagias D. Abstract: Critical software vulnerabilities are often caused by incorrect, vague, or missing security requirements. Hence, there is a strong need in the software engineering community for tools that…