Search Results for author: Stavros Shiaeles

Found 13 papers, 0 papers with code

Audio Interval Retrieval using Convolutional Neural Networks

no code implementations21 Sep 2021 Ievgeniia Kuzminykh, Dan Shevchuk, Stavros Shiaeles, Bogdan Ghita

Two tests are conducted to evaluate the performance of the models on two separate problems: audio classification and intervals retrieval based on a natural language query.

Audio Classification Retrieval

A proactive malicious software identification approach for digital forensic examiners

no code implementations20 Sep 2021 Muhammad Ali, Stavros Shiaeles, Nathan Clarke, Dimitrios Kontogeorgis

Digital investigators often get involved with cases, which seemingly point the responsibility to the person to which the computer belongs, but after a thorough examination malware is proven to be the cause, causing loss of precious time.

BotSpot: Deep Learning Classification of Bot Accounts within Twitter

no code implementations8 Sep 2021 Christopher Braker, Stavros Shiaeles, Gueltoum Bendiab, Nick Savage, Konstantinos Limniotis

In this paper, we introduce a novel bot detection approach using deep learning, with the Multi-layer Perceptron Neural Networks and nine features of a bot account.

Classification

Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation

no code implementations8 Sep 2021 Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita, Nicholas Kolokotronis

Internet of Things devices have seen a rapid growth and popularity in recent years with many more ordinary devices gaining network capability and becoming part of the ever growing IoT network.

Insider Detection using Deep Autoencoder and Variational Autoencoder Neural Networks

no code implementations6 Sep 2021 Efthimios Pantelidis, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis

Insider attacks are one of the most challenging cybersecurity issues for companies, businesses and critical infrastructures.

Detection of Insider Threats using Artificial Intelligence and Visualisation

no code implementations6 Sep 2021 Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab

Insider threats are one of the most damaging risk factors for the IT systems and infrastructure of a company or an organization; identification of insider threats has prompted the interest of the world academic research community, with several solutions having been proposed to alleviate their potential impact.

CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services

no code implementations28 Aug 2021 David Buckley, Gueltoum Bendiab, Stavros Shiaeles, Nick Savage, Nicholas Kolokotronis

The rise of the subscription-based business model has led to a corresponding increase in the number of subscriptions where a customer needs to manage their payments.

Management

IoT Malware Network Traffic Classification using Visual Representation and Deep Learning

no code implementations4 Oct 2020 Gueltoum Bendiab, Stavros Shiaeles, Abdulrahman Alruban, Nicholas Kolokotronis

The detection of malicious network traffic in the proposed approach works at the package level, significantly reducing the time of detection with promising results due to the deep learning technologies used.

General Classification Traffic Classification

Blockchain Solutions for Forensic Evidence Preservation in IoT Environments

no code implementations26 Mar 2019 Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Dimitris Kavallieros, Emanuele Bellini, Clement Pavue

The technological evolution brought by the Internet of things (IoT) comes with new forms of cyber-attacks exploiting the complexity and heterogeneity of IoT networks, as well as, the existence of many vulnerabilities in IoT devices.

Cryptography and Security

Detection of LDDoS Attacks Based on TCP Connection Parameters

no code implementations12 Mar 2019 Michael Siracusano, Stavros Shiaeles, Bogdan Ghita

Low-rate application layer distributed denial of service (LDDoS) attacks are both powerful and stealthy.

Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis

no code implementations12 Mar 2019 Muhammad Ali, Stavros Shiaeles, Maria Papadaki, Bogdan Ghita

Malicious software is detected and classified by either static analysis or dynamic analysis.

Malware Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.