no code implementations • 21 Sep 2021 • Ievgeniia Kuzminykh, Dan Shevchuk, Stavros Shiaeles, Bogdan Ghita
Two tests are conducted to evaluate the performance of the models on two separate problems: audio classification and intervals retrieval based on a natural language query.
no code implementations • 20 Sep 2021 • Muhammad Ali, Stavros Shiaeles, Nathan Clarke, Dimitrios Kontogeorgis
Digital investigators often get involved with cases, which seemingly point the responsibility to the person to which the computer belongs, but after a thorough examination malware is proven to be the cause, causing loss of precious time.
no code implementations • 20 Sep 2021 • Christos Constantinides, Stavros Shiaeles, Bogdan Ghita, Nicholas Kolokotronis
Attack vectors are continuously evolving in order to evade Intrusion Detection systems.
no code implementations • 8 Sep 2021 • Christopher Braker, Stavros Shiaeles, Gueltoum Bendiab, Nick Savage, Konstantinos Limniotis
In this paper, we introduce a novel bot detection approach using deep learning, with the Multi-layer Perceptron Neural Networks and nine features of a bot account.
no code implementations • 8 Sep 2021 • Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita, Nicholas Kolokotronis
Internet of Things devices have seen a rapid growth and popularity in recent years with many more ordinary devices gaining network capability and becoming part of the ever growing IoT network.
no code implementations • 6 Sep 2021 • Efthimios Pantelidis, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis
Insider attacks are one of the most challenging cybersecurity issues for companies, businesses and critical infrastructures.
no code implementations • 6 Sep 2021 • Joseph Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis
Raw traffic is also passed on to the machine learning classifier for examination and identification of potential attacks.
no code implementations • 6 Sep 2021 • Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab
Insider threats are one of the most damaging risk factors for the IT systems and infrastructure of a company or an organization; identification of insider threats has prompted the interest of the world academic research community, with several solutions having been proposed to alleviate their potential impact.
no code implementations • 28 Aug 2021 • David Buckley, Gueltoum Bendiab, Stavros Shiaeles, Nick Savage, Nicholas Kolokotronis
The rise of the subscription-based business model has led to a corresponding increase in the number of subscriptions where a customer needs to manage their payments.
no code implementations • 4 Oct 2020 • Gueltoum Bendiab, Stavros Shiaeles, Abdulrahman Alruban, Nicholas Kolokotronis
The detection of malicious network traffic in the proposed approach works at the package level, significantly reducing the time of detection with promising results due to the deep learning technologies used.
no code implementations • 26 Mar 2019 • Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Dimitris Kavallieros, Emanuele Bellini, Clement Pavue
The technological evolution brought by the Internet of things (IoT) comes with new forms of cyber-attacks exploiting the complexity and heterogeneity of IoT networks, as well as, the existence of many vulnerabilities in IoT devices.
Cryptography and Security
no code implementations • 12 Mar 2019 • Michael Siracusano, Stavros Shiaeles, Bogdan Ghita
Low-rate application layer distributed denial of service (LDDoS) attacks are both powerful and stealthy.
no code implementations • 12 Mar 2019 • Muhammad Ali, Stavros Shiaeles, Maria Papadaki, Bogdan Ghita
Malicious software is detected and classified by either static analysis or dynamic analysis.