Select Publications
Book Chapters
2019, 'Software-Defined Network (SDN) data plane security: Issues, solutions, and future directions', in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 341 - 387, http://dx.doi.org/10.1007/978-3-030-22277-2_14
,2018, 'Function-based access control (FBAC): Towards preventing insider threats in organizations', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 143 - 165, http://dx.doi.org/10.1007/978-3-030-04834-1_8
,Journal articles
2022, 'AI for next generation computing: Emerging trends and future directions', Internet of Things (Netherlands), 19, http://dx.doi.org/10.1016/j.iot.2022.100514
,2022, 'iRECOVer: Patch your IoT on-the-fly', Future Generation Computer Systems, 132, pp. 178 - 193, http://dx.doi.org/10.1016/j.future.2022.02.014
,2022, 'Zero Trust Architecture (ZTA): A Comprehensive Survey', IEEE Access, 10, pp. 57143 - 57179, http://dx.doi.org/10.1109/ACCESS.2022.3174679
,2021, 'LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)', Computers and Security, 108, http://dx.doi.org/10.1016/j.cose.2021.102351
,2021, 'Detecting Internet of Things Bots: A Comparative Study', IEEE Access, 9, pp. 160391 - 160401, http://dx.doi.org/10.1109/ACCESS.2021.3130714
,2020, 'Security-aware autonomic allocation of cloud resources: A model, research trends, and future directions', Journal of Organizational and End User Computing, 32, pp. 15 - 22, http://dx.doi.org/10.4018/JOEUC.2020070102
,2020, 'Echo-id: Smart user identification leveraging inaudible sound signals', IEEE Access, 8, pp. 194508 - 194522, http://dx.doi.org/10.1109/ACCESS.2020.3031899
,Conference Papers
2024, 'Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification', in 2024 IEEE 49th Conference on Local Computer Networks (LCN), IEEE, pp. 1 - 7, presented at 2024 IEEE 49th Conference on Local Computer Networks (LCN), 08 October 2024 - 10 October 2024, http://dx.doi.org/10.1109/lcn60385.2024.10639633
,2024, 'AuditNet: A Conversational AI-based Security Assistant', in MobileHCI 2024 Adjunct Proceedings - Publication of the 26th International Conference on Mobile Human-Computer Interaction, http://dx.doi.org/10.1145/3640471.3680444
,2022, 'Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 115 - 127, http://dx.doi.org/10.1007/978-3-030-94822-1_7
,2021, 'Attacking with bitcoin: Using bitcoin to build resilient botnet armies', in Advances in Intelligent Systems and Computing, pp. 3 - 12, http://dx.doi.org/10.1007/978-3-030-57805-3_1
,2021, 'Health access broker: Secure, patient-controlled management of personal health records in the cloud', in Advances in Intelligent Systems and Computing, Springer Nature, pp. 111 - 121, http://dx.doi.org/10.1007/978-3-030-57805-3_11
,2020, 'Towards a lightweight continuous authentication protocol for device-to-device communication', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 1119 - 1126, http://dx.doi.org/10.1109/TrustCom50675.2020.00148
,2020, 'Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs', in 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020, http://dx.doi.org/10.1109/NCA51143.2020.9306689
,2020, 'Towards a Distributed Defence Mechanism against IoT-based Bots', in Proceedings - Conference on Local Computer Networks, LCN, pp. 449 - 452, http://dx.doi.org/10.1109/LCN48667.2020.9314830
,2020, 'Massage from the chairs', in Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, pp. VI, http://dx.doi.org/10.1109/ETSecIoT50046.2020.00011
,2019, 'PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices', in IoT S and P 2019 - Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, Association for Computing Machinery (ACM), ENGLAND, London, pp. 50 - 56, presented at Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, ENGLAND, London, 15 November 2019, http://dx.doi.org/10.1145/3338507.3358619
,2018, 'Gwardar: Towards protecting a software-defined network from malicious network operating systems', in NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications, IEEE, Cambridge, MA, USA, presented at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Cambridge, MA, USA, 01 November 2018 - 03 November 2018, http://dx.doi.org/10.1109/NCA.2018.8548074
,2018, 'Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations', in Proceedings - Conference on Local Computer Networks, LCN, pp. 553 - 561, http://dx.doi.org/10.1109/LCN.2018.8638245
,2017, 'Towards Policy Enforcement Point as a Service (PEPS)', in 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2016, pp. 50 - 55, http://dx.doi.org/10.1109/NFV-SDN.2016.7919475
,2017, 'WedgeTail: An intrusion prevention system for the data plane of software defined networks', in ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, pp. 849 - 861, presented at 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 02 April 2017 - 06 April 2017, http://dx.doi.org/10.1145/3052973.3053039
,2016, 'Function-based access control (FBAC): From access control Matrix to access control tensor', in MIST 2016 - Proceedings of the International Workshop on Managing Insider Security Threats, co-located with CCS 2016, pp. 89 - 92, http://dx.doi.org/10.1145/2995959.2995974
,Conference Abstracts
2014, 'An SDN-based framework for detection of illegal rebroadcasting of channels in P2PTV', in VideoNEXT 2014 - Proceedings of the 2014 Workshop on Design, Quality and Deployment of Adaptive Video Streaming, pp. 47 - 49, http://dx.doi.org/10.1145/2676652.2683465
,Preprints
2024, Towards Weaknesses and Attack Patterns Prediction for IoT Devices, http://dx.doi.org/10.48550/arxiv.2408.13172
,2024, Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification, http://dx.doi.org/10.48550/arxiv.2407.19662
,2022, AI for Next Generation Computing: Emerging Trends and Future Directions, http://dx.doi.org/10.48550/arxiv.2203.04159
,2021, Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines, http://dx.doi.org/10.48550/arxiv.2111.11874
,2020, Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs, http://dx.doi.org/10.48550/arxiv.2010.12134
,2020, Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication, http://dx.doi.org/10.48550/arxiv.2010.05144
,2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud, http://dx.doi.org/10.48550/arxiv.2005.07987
,2020, Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies, http://dx.doi.org/10.48550/arxiv.2004.01855
,2018, Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems, http://dx.doi.org/10.48550/arxiv.1809.06988
,2018, Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations, http://dx.doi.org/10.48550/arxiv.1807.02593
,2018, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions, http://dx.doi.org/10.48550/arxiv.1804.00262
,2017, WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks, http://dx.doi.org/10.48550/arxiv.1708.05477
,2016, Towards Policy Enforcement Point as a Service (PEPS), http://dx.doi.org/10.48550/arxiv.1610.02526
,