GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments
I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
develop trust relationships with clients, and maintain financial stability. A cybersecurity …
SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks
I Syamsuddin, OM Barukab - electronics, 2022 - mdpi.com
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …
Enhancing Industrial IoT Network Security through Blockchain Integration
In the rapidly evolving landscape of industrial ecosystems, Industrial IoT networks face
increasing security challenges. Traditional security methods often struggle to protect these …
increasing security challenges. Traditional security methods often struggle to protect these …
AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks
G Petihakis, A Farao, P Bountakas, A Sabazioti… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …
finance, and cybersecurity has simultaneously exposed these systems to unique …
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …
companies in this area face several challenges, such as a lack of data, a shortage of …
A Bring Your Own Device security awareness survey among professionals
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …
posed significant challenges to organizations in terms of security and management. This …
Analyzing coverages of cyber insurance policies using ontology
M Charalambous, A Farao… - Proceedings of the 17th …, 2022 - dl.acm.org
In an era where all the transactions, businesses and services are becoming digital and
online, the data assets and the services protection are of utmost importance. Cyber …
online, the data assets and the services protection are of utmost importance. Cyber …
SAMGRID: security authorization and monitoring module based on SealedGRID platform
IoT devices present an ever-growing domain with multiple applicability. This technology has
favored and still favors many areas by creating critical infrastructures that are as profitable as …
favored and still favors many areas by creating critical infrastructures that are as profitable as …
GLPS: A Geohash-Based Location Privacy Protection Scheme
B Liu, C Zhang, L Yao, Y Xin - Entropy, 2023 - mdpi.com
With the development of mobile applications, location-based services (LBSs) have been
incorporated into people's daily lives and created huge commercial revenues. However …
incorporated into people's daily lives and created huge commercial revenues. However …
A Stochastic Petri net Model of Continuous Integration and Continuous Delivery
S Bhadra - 2022 IEEE International Symposium on Software …, 2022 - ieeexplore.ieee.org
Modern software development organizations rely on continuous integration and continuous
delivery (CI/CD), since it allows developers to continuously integrate their code in a single …
delivery (CI/CD), since it allows developers to continuously integrate their code in a single …