Hammad, M., Steinhorst, S., et al. (2024). PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis. IEEE International Conference on Computer Communications (IEEE INFOCOM 2024). Link: https://zenodo.org/records/14806692
Hammadeh, Z. A. H., Hasan, M., & Hamad, M. (2024). Securing Real-Time Systems using Schedule Reconfiguration. 2024 IEEE 27th International Symposium on Real-Time Distributed Computing (ISORC). Link: https://zenodo.org/records/14806788
Hamad, M., Steinhorst, S., et al. (2024). Advanced IDPS Architecture for Connected and Autonomous Vehicles. 35th IEEE Intelligent Vehicles Symposium (IEEE IV). Link: https://zenodo.org/records/14806852
Islam, S., Papastergiou, S., Mouratidis, H., et al. (2024). Enhancing Malware Detection through Machine Learning using XAI with SHAP Framework. 20th AIAI (Artificial Intelligence Applications and Innovations). Link: https://zenodo.org/records/14832484
Islam, S., Papastergiou, S., Mouratidis, H., et al. (2024). Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection. 20th AIAI (Artificial Intelligence Applications and Innovations). Link: https://zenodo.org/records/14832599
Wüstrich, L., Gallenmüller, S., Pahl, M. O., et al. (2024). Shells Bells: Cyber-Physical Anomaly Detection in Data Centers. NOMS 2024 – IEEE Network Operations and Management Symposium. Link: https://zenodo.org/records/14807181
Javeed, D., Shahid Saeed, M., Kumar, P., Jolfaei, A., Islam, S., & Islam, N. (2023). Federated Learning-based Personalized Recommendation Systems: An Overview on Security and Privacy Challenges.
IEEE Transactions on Consumer Electronics.
Link: https://zenodo.org/records/10598308
Silvestri, S., Islam, S., Amelin, D., Weiler, G., Papastergiou, S., & Ciampi, M. (2024). Cyber threat assessment and management for securing healthcare ecosystems using natural language processing.
International Journal of Information Security, 23, pages 31–50.
Link: https://zenodo.org/records/13242578
Randhir, K., Ahamed, A., Shareeful, I., & Et al., (2024).
Digital twins-enabled zero-touch network: A smart contract and explainable AI integrated cybersecurity framework. Future Generation Computer Systems (Τ. 156, July 2024, pp. 191–205).
Link: https://zenodo.org/records/11074335
Katrakazas, P., & Papastergiou, S. (2024). A Stakeholder Needs Analysis in Cybersecurity: A Systemic Approach to Enhancing Digital Infrastructure Resilience.
Link: https://zenodo.org/records/13254710
Islam, S., Javeed, D., Saeed, M. S., Kumar, P., Et al., (2024). Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS.
Cognitive Computing (>V. 16, pages 2611–2625).
Link: https://zenodo.org/records/13254989
Hamad, M., Finkenzeller, A., Kühr, M., Roberts, A., Maennel, O., Prevelakis, V., & Steinhorst, S. (2024). REACT: Autonomous intrusion response system for intelligent vehicles.
Computers & Security (V. 145).
Link:https://zenodo.org/records/13255072
Basheer, N., Islam, S., Alwaheidi, M. K. S., & Papastergiou, S. (2024). Adoption of deep-learning models for managing threats in API calls with transparency obligation practice for overall resilience. Sensors, 24(15), 4859.
Link: https://zenodo.org/records/14806311
Haurogné, J., Basheer, N., & Islam, S. (2024). Vulnerability detection using BERT-based LLM model with transparency obligation practice towards trustworthy AI.
Link: https://zenodo.org/records/14806381