• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Sheik AT, Maple C, Epiphaniou G, Dianati M. Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment. Sensors (Basel) 2023;24:241. [PMID: 38203103 DOI: 10.3390/s24010241] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/23/2023] [Revised: 12/04/2023] [Accepted: 12/14/2023] [Indexed: 01/12/2024]
2
Mehmood A, Epiphaniou G, Maple C, Ersotelos N, Wiseman R. A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites. Sensors (Basel) 2023;23:8720. [PMID: 37960419 PMCID: PMC10647391 DOI: 10.3390/s23218720] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/01/2023] [Revised: 09/16/2023] [Accepted: 09/17/2023] [Indexed: 11/15/2023]
3
Gallos P, DeLong R, Matragkas N, Blanchard A, Mraidha C, Epiphaniou G, Maple C, Katzis K, Delgado J, Llorente S, Maló P, Almeida B, Menychtas A, Panagopoulos C, Maglogiannis I, Papachristou P, Soares M, Breia P, Vidal AC, Ratz M, Williamson R, Erwee E, Stasiak L, Flores O, Clemente C, Mantas J, Weber P, Arvanitis TN, Hansen S. MedSecurance Project: Advanced Security-for-Safety Assurance for Medical Device IoT (IoMT). Stud Health Technol Inform 2023;302:337-341. [PMID: 37203674 DOI: 10.3233/shti230130] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 05/20/2023]
4
Yazdinejad A, Dehghantanha A, Parizi RM, Epiphaniou G. An optimized fuzzy deep learning model for data classification based on NSGA-II. Neurocomputing 2023. [DOI: 10.1016/j.neucom.2022.12.027] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/23/2022]
5
Alamri H, Maple C, Mohamad S, Epiphaniou G. Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store. Sensors (Basel) 2022;22:8964. [PMID: 36433560 PMCID: PMC9698788 DOI: 10.3390/s22228964] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/30/2022] [Revised: 11/11/2022] [Accepted: 11/12/2022] [Indexed: 06/16/2023]
6
Unal D, Hammoudeh M, Khan MA, Abuarqoub A, Epiphaniou G, Hamila R. Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102393] [Citation(s) in RCA: 11] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
7
Lallie HS, Shepherd LA, Nurse JR, Erola A, Epiphaniou G, Maple C, Bellekens X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput Secur 2021;105:102248. [DOI: 10.1016/j.cose.2021.102248] [Citation(s) in RCA: 45] [Impact Index Per Article: 15.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/28/2020] [Revised: 11/21/2020] [Accepted: 02/22/2021] [Indexed: 10/22/2022]
8
Ramalingam S, Gan H, Epiphaniou G, Mistretta E. A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments. Sensors (Basel) 2020;20:s20185252. [PMID: 32937974 PMCID: PMC7571198 DOI: 10.3390/s20185252] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/08/2020] [Revised: 09/08/2020] [Accepted: 09/09/2020] [Indexed: 11/17/2022]
9
Bottarelli M, Epiphaniou G, Ismail DKB, Karadimas P, Al-Khateeb H. Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.08.001] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
10
Epiphaniou G, French T, Maple C. The DarkWeb: Cyber-Security Intelligence Gathering Opportunities, Risks and Rewards. CIT 2014. [DOI: 10.2498/cit.1002282] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/12/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA