Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Browse by All Cardiff Authors

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 7.

Anthi, Eirini, Williams, Lowri, Javed, Amir and Burnap, Peter 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108 , 102352. 10.1016/j.cose.2021.102352
file

Anthi, Eirini, Williams, Lowri, Rhode, Matilda, Burnap, Peter and Wedgbury, Adam 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58 , 102717. 10.1016/j.jisa.2020.102717
file

Anthi, Eirini, Williams, Lowri, Burnap, Pete and Jones, Kevin 2021. A three-tiered intrusion detection system for Industrial Control Systems (ICS). Journal of Cybersecurity 7 (1) , tyab006. 10.1093/cybsec/tyab006
file

Anthi, Eirini, Williams, Lowri, Malgorzata, Slowinska, Theodorakopoulos, Georgios and Burnap, Peter 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6 (5) , pp. 9042-9053. 10.1109/JIOT.2019.2926365
file

Anthi, Eirini, Ahmad, Shazaib, Rana, Omer, Burnap, Pete and Theodorakopoulos, Georgios 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78 , pp. 477-490. 10.1016/j.cose.2018.07.016
file

Anthi, Eirini, Javed, Amir, Rana, Omer F. and Theodorakopoulos, Georgios 2017. Secure data sharing and analysis in cloud-based energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017. Published in: Longo, Antonella, Zappatore, Marco, Villari, Massimo, Rana, Omer, Bruneo, Dario, Ranjan, Rajiv, Fazin, Maria and Massonet, Philippe eds. IISSC 2017, CN4IoT 2017: Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer, pp. 228-242. 10.1007/978-3-319-67636-4_24
file

Anthi, Eirini and Theodorakopoulos, Georgios 2017. Sensitive data in Smartphone Applications: Where does it go? Can it be intercepted? [Technical Report]. Springer.
file

This list was generated on Sun Nov 28 06:55:39 2021 GMT.