Helphed: Hybrid ensemble learning phishing email detection

P Bountakas, C Xenakis - Journal of network and computer applications, 2023 - Elsevier
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …

MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles

S Panda, S Rass, S Moschoyiannis, K Liang… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each
other and with road infrastructure on a common network, has promising socio-economic …

AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks

G Petihakis, A Farao, P Bountakas, A Sabazioti… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …

Enhancing cybersecurity capability investments: Evidence from an experiment

A Pigola, PR Da Costa, M Ferasso, LFC da Silva - Technology in Society, 2024 - Elsevier
In recent years, investments in cybersecurity capabilities (CC) have emerged as an essential
practice in reducing cyberattacks and optimizing the usage of technologies. Therefore …

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain

A Farao, G Paparis, S Panda, E Panaousis… - International Journal of …, 2024 - Springer
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …

Cyber risk assessment and optimization: A small business case study

M Tsiodra, S Panda, M Chronopoulos… - IEEE Access, 2023 - ieeexplore.ieee.org
Assessing and controlling cyber risk is the cornerstone of information security management,
but also a formidable challenge for organisations due to the uncertainties associated with …

A Bring Your Own Device security awareness survey among professionals

G Petihakis, D Kiritsis, A Farao, P Bountakas… - Proceedings of the 18th …, 2023 - dl.acm.org
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …

Privacy impact assessment of cyber attacks on connected and autonomous vehicles

S Panda, E Panaousis, G Loukas… - Proceedings of the 18th …, 2023 - dl.acm.org
Connected and autonomous vehicles (CAVs) are vulnerable to security gaps that can result
in serious consequences, including cyber-physical and privacy risks. For example, an …

Tackling Cyberattacks through AI-based Reactive Systems: A Holistic Review and Future Vision

SB Molina, P Nespoli, FG Mármol - arXiv preprint arXiv:2312.06229, 2023 - arxiv.org
There is no denying that the use of Information Technology (IT) is undergoing exponential
growth in today's world. This digital transformation has also given rise to a multitude of …