• Assessment of Machine Learning Techniques for Building an Efficient IDS 

      Chytas S.P., Maglaras L., Derhab A., Stamoulis G. (2020)
      Intrusion Detection Systems (IDS) are the systems that detect and block any potential threats (e.g. DDoS attacks) in the network. In this project, we explore the performance of several machine learning techniques when used ...
    • Intrusion detection system for platooning connected autonomous vehicles 

      Kosmanos D., Pappas A., Aparicio-Navarro F.J., Maglaras L., Janicke H., Boiten E., Argyriou A. (2019)
      The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication ...
    • Smart devices security enhancement via power supply monitoring 

      Myridakis D., Spathoulas G., Kakarountas A., Schinianakis D. (2020)
      The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, ...
    • A test-bed for intrusion detection systems results post-processing 

      Spathoulas, G.; Katsikas, S. K.; Charoulis, A. (2014)
      Intrusion detection systems produce alert sets of low quality. Many post-processing methods have been proposed to make alert sets more meaningful to security analysts. Relevant research has to deal with an important task; ...
    • Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts 

      Spathoulas G., Theodoridis G., Damiris G.-P. (2021)
      Cyber-security attacks are becoming more frequent and more severe day by day. To detect the execution of such attacks, organizations install intrusion detection systems. It would be beneficial for such organizations to ...