MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments

I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …

HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles

S Panda, S Rass, S Moschoyiannis, K Liang… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each
other and with road infrastructure on a common network, has promising socio-economic …

Cybersecurity in robotics: Challenges, quantitative modeling, and practice

Q Zhu, S Rass, B Dieber… - Foundations and Trends …, 2021 - nowpublishers.com
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to
market occasionally goes at the cost of neglecting security mechanisms during the …

Cyber risk assessment and optimization: A small business case study

M Tsiodra, S Panda, M Chronopoulos… - IEEE Access, 2023 - ieeexplore.ieee.org
Assessing and controlling cyber risk is the cornerstone of information security management,
but also a formidable challenge for organisations due to the uncertainties associated with …

Privacy impact assessment of cyber attacks on connected and autonomous vehicles

S Panda, E Panaousis, G Loukas… - Proceedings of the 18th …, 2023 - dl.acm.org
Connected and autonomous vehicles (CAVs) are vulnerable to security gaps that can result
in serious consequences, including cyber-physical and privacy risks. For example, an …

Research on optimization of array honeypot defense strategies based on evolutionary game theory

L Shi, X Wang, H Hou - Mathematics, 2021 - mdpi.com
Honeypot has been regarded as an active defense technology that can deceive attackers by
simulating real systems. However, honeypot is actually a static network trap with fixed …

Securing Blockchain-based IoT Systems: A Review

D Commey, B Mai, SG Hounsinou, GV Crosby - IEEE Access, 2024 - ieeexplore.ieee.org
This paper reviews the role of blockchain technology in enhancing the security of Internet of
Things (IoT) systems and maintaining data integrity. We address the increased …

A survey of anomaly detection methods for power grids

S Madabhushi, R Dewri - International Journal of Information Security, 2023 - Springer
The power grid is a constant target for attacks as they have the potential to affect a large
geographical location, thus affecting hundreds of thousands of customers. With the advent of …

Optimising user security recommendations for AI-powered smart-homes

E Scott, S Panda, G Loukas… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Research in the context of user awareness has shown that smart-home occupants often lack
cybersecurity awareness even when it comes to frequently used technologies such as …