Skip to main content
Top

2018 | OriginalPaper | Chapter

European Cybersecurity Research and the SerIoT Project

Authors : Joanna Domańska, Mateusz Nowak, Sawomir Nowak, Tadeusz Czachórski

Published in: Computer and Information Sciences

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper briefly reviews some recent research in Cybersecurity in Europe funded by the European Commission in areas such as mobile telephony, networked health systems, the Internet of Things. We then outline the objectives of the SerIoT Project which started in 2018 to address the security needs of fields such as Smart Cities, Smart Transportation Systems, Supply Chains and Industrial Informatics.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Abdelrahman, O.H., Gelenbe, E.: Time and energy in team-based search. Phys. Rev. E 87(3), 032125 (2013)CrossRef Abdelrahman, O.H., Gelenbe, E.: Time and energy in team-based search. Phys. Rev. E 87(3), 032125 (2013)CrossRef
3.
go back to reference Abdelrahman, O.H., Gelenbe, E., Görbil, G., Oklander, B.: Mobile network anomaly detection and mitigation: The nemesys approach. In: Gelenbe E., Lent R. (eds.) Information Sciences and Systems 2013, pp. 429–438. Springer International Publishing, Cham (2013)CrossRef Abdelrahman, O.H., Gelenbe, E., Görbil, G., Oklander, B.: Mobile network anomaly detection and mitigation: The nemesys approach. In: Gelenbe E., Lent R. (eds.) Information Sciences and Systems 2013, pp. 429–438. Springer International Publishing, Cham (2013)CrossRef
4.
go back to reference Akinwande, O.J., Bi, H., Gelenbe, E.: Managing crowds in hazards with dynamic grouping. IEEE Access 3, 1060–1070 (2015)CrossRef Akinwande, O.J., Bi, H., Gelenbe, E.: Managing crowds in hazards with dynamic grouping. IEEE Access 3, 1060–1070 (2015)CrossRef
5.
go back to reference Akriotou, M., Mesaritakis, C., Grivas, E., Chaintoutis, C., Fragkos, A., Syvridis, D.: Random number generation from a secure photonic physical unclonable hardware module. In: Gelenbe, E., et al. (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop. CCIS, vol. 821. Springer, Cham (2018) Akriotou, M., Mesaritakis, C., Grivas, E., Chaintoutis, C., Fragkos, A., Syvridis, D.: Random number generation from a secure photonic physical unclonable hardware module. In: Gelenbe, E., et al. (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop. CCIS, vol. 821. Springer, Cham (2018)
6.
go back to reference Brun, O., Wang, L., Gelenbe, E.: Big data for autonomic intercontinental communications. IEEE Trans. Sel. Areas Commun. 34(3), 575–583 (2016)CrossRef Brun, O., Wang, L., Gelenbe, E.: Big data for autonomic intercontinental communications. IEEE Trans. Sel. Areas Commun. 34(3), 575–583 (2016)CrossRef
7.
go back to reference Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y.M., Augusto-Gonzalez, J., Ramos, M.: Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. In: Gelenbe, E. (ed.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop. CCIS, vol. 821. Springer, Cham (2018) Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y.M., Augusto-Gonzalez, J., Ramos, M.: Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. In: Gelenbe, E. (ed.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop. CCIS, vol. 821. Springer, Cham (2018)
8.
go back to reference Castaldo, L., Cinque, V.: Blockchain based logging for the cross-border exchange of ehealth data in Europe. Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop. CCIS, vol. 821. Springer, Cham (2018) Castaldo, L., Cinque, V.: Blockchain based logging for the cross-border exchange of ehealth data in Europe. Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop. CCIS, vol. 821. Springer, Cham (2018)
9.
go back to reference Collen, A., et al.: Ghost - safe-guarding home IoT environments with personalised real-time risk control. In: Gelenbe, E., et al. (eds.) Recent Cyber security Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Communications in Computer and Information Science, vol. 821. Springer, Cham (2018) Collen, A., et al.: Ghost - safe-guarding home IoT environments with personalised real-time risk control. In: Gelenbe, E., et al. (eds.) Recent Cyber security Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Communications in Computer and Information Science, vol. 821. Springer, Cham (2018)
10.
go back to reference Cramer, C.E., Gelenbe, E.: Video quality and traffic QoS in learning-based subsampled and receiver-interpolated video sequences. IEEE J. Sel. Areas Commun. 18(2), 150–167 (2000)CrossRef Cramer, C.E., Gelenbe, E.: Video quality and traffic QoS in learning-based subsampled and receiver-interpolated video sequences. IEEE J. Sel. Areas Commun. 18(2), 150–167 (2000)CrossRef
11.
go back to reference Czachórski, T., Gelenbe, E., Lent, R.: Information Sciences and Systems. Springer International Publishing, Cham (2014) Czachórski, T., Gelenbe, E., Lent, R.: Information Sciences and Systems. Springer International Publishing, Cham (2014)
12.
13.
go back to reference Domanska, J., Czachòrski, T., Nowak, M., Nowak, S., Gelenbe, E.: Sercpn: smart software defined network for IoT (2018). (To appear) Domanska, J., Czachòrski, T., Nowak, M., Nowak, S., Gelenbe, E.: Sercpn: smart software defined network for IoT (2018). (To appear)
14.
go back to reference Domanska, J., Gelenbe, E., Czachorski, T., Drosou, A., Tzovaras, D.: Research and innovation action for the security of the internet of things: the SerIoT project. In: Gelenbe, E. (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Communications in Computer and Information Science, vol. 821. Springer, Cham (2018) Domanska, J., Gelenbe, E., Czachorski, T., Drosou, A., Tzovaras, D.: Research and innovation action for the security of the internet of things: the SerIoT project. In: Gelenbe, E. (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Communications in Computer and Information Science, vol. 821. Springer, Cham (2018)
16.
go back to reference Faiella, G., et al.: Building an ethical framework for cross-border applications: the konfido project. In: Gelenbe, E., et al. (eds.) Recent Cyber security Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Communications in Computer and Information Science, vol. 821. Springer, Cham (2018) Faiella, G., et al.: Building an ethical framework for cross-border applications: the konfido project. In: Gelenbe, E., et al. (eds.) Recent Cyber security Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Communications in Computer and Information Science, vol. 821. Springer, Cham (2018)
17.
go back to reference François, F., Abdelrahman, O.H., Gelenbe, E.: Impact of signaling storms on energy consumption and latency of LTE user equipment. In: 17th IEEE International Conference on High Performance Computing and Communications, HPCC 2015, 7th IEEE International Symposium on Cyberspace Safety and Security, CSS 2015, and 12th IEEE International Conference on Embedded Software and Systems, ICESS 2015, New York, NY, USA, 24–26 Aug 2015, pp. 1248–1255 (2015). https://doi.org/10.1109/HPCC-CSS-ICESS.2015.84 François, F., Abdelrahman, O.H., Gelenbe, E.: Impact of signaling storms on energy consumption and latency of LTE user equipment. In: 17th IEEE International Conference on High Performance Computing and Communications, HPCC 2015, 7th IEEE International Symposium on Cyberspace Safety and Security, CSS 2015, and 12th IEEE International Conference on Embedded Software and Systems, ICESS 2015, New York, NY, USA, 24–26 Aug 2015, pp. 1248–1255 (2015). https://​doi.​org/​10.​1109/​HPCC-CSS-ICESS.​2015.​84
18.
go back to reference François, F., Gelenbe, E.: Optimizing secure sdn-enabled inter-data centre overlay networks through cognitive routing. In: 24th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2016, London, United Kingdom, 19–21 Sept 2016, pp. 283–288 (2016). https://doi.org/10.1109/MASCOTS.2016.26 François, F., Gelenbe, E.: Optimizing secure sdn-enabled inter-data centre overlay networks through cognitive routing. In: 24th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2016, London, United Kingdom, 19–21 Sept 2016, pp. 283–288 (2016). https://​doi.​org/​10.​1109/​MASCOTS.​2016.​26
20.
go back to reference Gelenbe, E. et al. (eds.): Proceedings of the 2018 ISCIS Security Workshop: Recent Cybersecurity Research in Europe, vol. 821. Lecture Notes CCIS, Springer (2018) Gelenbe, E. et al. (eds.): Proceedings of the 2018 ISCIS Security Workshop: Recent Cybersecurity Research in Europe, vol. 821. Lecture Notes CCIS, Springer (2018)
21.
go back to reference Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1(4), 502–510 (1989)CrossRef Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1(4), 502–510 (1989)CrossRef
22.
go back to reference Gelenbe, E.: Réseaux neuronaux aléatoires stables. Comptes Rendus de l’Académie des sciences. Série 2 310(3), 177–180 (1990) Gelenbe, E.: Réseaux neuronaux aléatoires stables. Comptes Rendus de l’Académie des sciences. Série 2 310(3), 177–180 (1990)
23.
go back to reference Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput. 5(1), 154–164 (1993)CrossRef Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput. 5(1), 154–164 (1993)CrossRef
24.
go back to reference Gelenbe, E.: Genetic algorithms with analytical solution. In: Proceedings of the 1st Annual Conference on Genetic Programming, pp. 437–443. MIT Press (1996) Gelenbe, E.: Genetic algorithms with analytical solution. In: Proceedings of the 1st Annual Conference on Genetic Programming, pp. 437–443. MIT Press (1996)
25.
go back to reference Gelenbe, E.: Dealing with software viruses: a biological paradigm. Inf. Sec. Tech. Rep. 12(4), 242–250 (2007)CrossRef Gelenbe, E.: Dealing with software viruses: a biological paradigm. Inf. Sec. Tech. Rep. 12(4), 242–250 (2007)CrossRef
26.
go back to reference Gelenbe, E.: Steady-state solution of probabilistic gene regulatory networks. Phys. Rev. E 76(1), 031903 (2007)CrossRef Gelenbe, E.: Steady-state solution of probabilistic gene regulatory networks. Phys. Rev. E 76(1), 031903 (2007)CrossRef
27.
go back to reference Gelenbe, E.: Steps toward self-aware networks. Commun. ACM 52(7), 66–75 (2009)CrossRef Gelenbe, E.: Steps toward self-aware networks. Commun. ACM 52(7), 66–75 (2009)CrossRef
28.
go back to reference Gelenbe, E.: Search in unknown random environments. Phys. Rev. E 82, 061112 (2010)CrossRef Gelenbe, E.: Search in unknown random environments. Phys. Rev. E 82, 061112 (2010)CrossRef
30.
go back to reference Gelenbe, E., Bi, H.: Emergency navigation without an infrastructure. Sensors 14(8), 15142–15162 (2014)CrossRef Gelenbe, E., Bi, H.: Emergency navigation without an infrastructure. Sensors 14(8), 15142–15162 (2014)CrossRef
31.
go back to reference Gelenbe, E., Caseau, Y.: The impact of information technology on energy consumption and carbon emissions. Ubiquity 2015(June), 1 (2015)CrossRef Gelenbe, E., Caseau, Y.: The impact of information technology on energy consumption and carbon emissions. Ubiquity 2015(June), 1 (2015)CrossRef
32.
go back to reference Gelenbe, E., Domanska, J., Czachorski, T., Drosou, A., Tzovaras, D.: Security for internet of things: the seriot project. In: Proceedings of the International Symposium on Networks, Computers and Communications. IEEE (2018) Gelenbe, E., Domanska, J., Czachorski, T., Drosou, A., Tzovaras, D.: Security for internet of things: the seriot project. In: Proceedings of the International Symposium on Networks, Computers and Communications. IEEE (2018)
33.
go back to reference Gelenbe, E. et al.: Nemesys: Enhanced network security for seamless service provisioning in the smart mobile ecosystem. In: Gelenbe E., Lent R. (eds.) Information Sciences and Systems 2013, pp. 369–378. Lecture Notes in Electrical Engineering, vol 264. Springer International Publishing, Cham (2013)CrossRef Gelenbe, E. et al.: Nemesys: Enhanced network security for seamless service provisioning in the smart mobile ecosystem. In: Gelenbe E., Lent R. (eds.) Information Sciences and Systems 2013, pp. 369–378. Lecture Notes in Electrical Engineering, vol 264. Springer International Publishing, Cham (2013)CrossRef
34.
go back to reference Gelenbe, E. et al.: Security for smart mobile networks: the nemesys approach. In: 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1–8. IEEE (2013) Gelenbe, E. et al.: Security for smart mobile networks: the nemesys approach. In: 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1–8. IEEE (2013)
35.
go back to reference Gelenbe, E., Kadioglu, Y.M.: Energy life-time of wireless nodes with network attacks and mitigation. In: Proceedings of ICC 2018, 20–24 May 2018, W04: IEEE Workshop on Energy Harvesting Wireless Communications. IEEE Gelenbe, E., Kadioglu, Y.M.: Energy life-time of wireless nodes with network attacks and mitigation. In: Proceedings of ICC 2018, 20–24 May 2018, W04: IEEE Workshop on Energy Harvesting Wireless Communications. IEEE
36.
go back to reference Gelenbe, E., Lent, R.: Power-aware ad hoc cognitive packet networks. Ad Hoc Netw. 2(3), 205–216 (2004)CrossRef Gelenbe, E., Lent, R.: Power-aware ad hoc cognitive packet networks. Ad Hoc Netw. 2(3), 205–216 (2004)CrossRef
37.
go back to reference Gelenbe, E., Lent, R., Montuori, A., Xu, Z.: Cognitive packet networks: Qos and performance. In: Proceedings of 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, MASCOTS 2002, pp. 3–9. IEEE (2002) Gelenbe, E., Lent, R., Montuori, A., Xu, Z.: Cognitive packet networks: Qos and performance. In: Proceedings of 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, MASCOTS 2002, pp. 3–9. IEEE (2002)
38.
go back to reference Gelenbe, E., Lent, R., Nunez, A.: Self-aware networks and qos. Proc. IEEE 92(9), 1478–1489 (2004)CrossRef Gelenbe, E., Lent, R., Nunez, A.: Self-aware networks and qos. Proc. IEEE 92(9), 1478–1489 (2004)CrossRef
39.
go back to reference Gelenbe, E., Lent, R., Xu, Z.: Design and performance of cognitive packet networks. Perform. Eval. 46(2), 155–176 (2001)CrossRef Gelenbe, E., Lent, R., Xu, Z.: Design and performance of cognitive packet networks. Perform. Eval. 46(2), 155–176 (2001)CrossRef
40.
go back to reference Gelenbe, E., Lent, R., Xu, Z.: Measurement and performance of a cognitive packet network. Comput. Netw. 37(6), 691–701 (2001)CrossRef Gelenbe, E., Lent, R., Xu, Z.: Measurement and performance of a cognitive packet network. Comput. Netw. 37(6), 691–701 (2001)CrossRef
41.
go back to reference Gelenbe, E., Lent, R., Xu, Z.: Towards networks with cognitive packets. In: Goto K., Hasegawa T., Takagi H., Takahashi Y. (eds.) Performance and QoS of Next Generation Networking, pp. 3–17. Springer, Cham (2001) Gelenbe, E., Lent, R., Xu, Z.: Towards networks with cognitive packets. In: Goto K., Hasegawa T., Takagi H., Takahashi Y. (eds.) Performance and QoS of Next Generation Networking, pp. 3–17. Springer, Cham (2001)
42.
go back to reference Gelenbe, E., Liu, P.: Qos and routing in the cognitive packet network. In: Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks, WoWMoM 2005, pp. 517–521. IEEE (2005) Gelenbe, E., Liu, P.: Qos and routing in the cognitive packet network. In: Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks, WoWMoM 2005, pp. 517–521. IEEE (2005)
43.
go back to reference Gelenbe, E., Liu, P., Laine, J.: Genetic algorithms for route discovery. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 36(6), 1247–1254 (2006)CrossRef Gelenbe, E., Liu, P., Laine, J.: Genetic algorithms for route discovery. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 36(6), 1247–1254 (2006)CrossRef
44.
go back to reference Gelenbe, E., Loukas, G.: A self-aware approach to denial of service defence. Comput. Netw. 51(5), 1299–1314 (2007)CrossRef Gelenbe, E., Loukas, G.: A self-aware approach to denial of service defence. Comput. Netw. 51(5), 1299–1314 (2007)CrossRef
45.
go back to reference Gelenbe, E., Mahmoodi, T.: Energy-aware routing in the cognitive packet network. Energy, pp. 7–12 (2011) Gelenbe, E., Mahmoodi, T.: Energy-aware routing in the cognitive packet network. Energy, pp. 7–12 (2011)
46.
go back to reference Gelenbe, E., Mahmoodi, T.: Distributed energy-aware routing protocol. In: Computer and Information Sciences II, pp. 149–154. Springer, London (2012)CrossRef Gelenbe, E., Mahmoodi, T.: Distributed energy-aware routing protocol. In: Computer and Information Sciences II, pp. 149–154. Springer, London (2012)CrossRef
47.
go back to reference Gelenbe, E., Ngai, E.C.H.: Adaptive qos routing for significant events in wireless sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008, pp. 410–415. IEEE (2008) Gelenbe, E., Ngai, E.C.H.: Adaptive qos routing for significant events in wireless sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008, pp. 410–415. IEEE (2008)
48.
go back to reference Gelenbe, E., Ngai, E.C., Yadav, P.: Routing of high-priority packets in wireless sensor networks. In: IEEE Second International Conference on Computer and Network Technology, IEEE (2010) Gelenbe, E., Ngai, E.C., Yadav, P.: Routing of high-priority packets in wireless sensor networks. In: IEEE Second International Conference on Computer and Network Technology, IEEE (2010)
49.
go back to reference Gelenbe, E., Pujolle, G.: Introduction aux réseaux de files d’attente. Edition Hommes et Techniques et Techniques, Eyrolles (1982)MATH Gelenbe, E., Pujolle, G.: Introduction aux réseaux de files d’attente. Edition Hommes et Techniques et Techniques, Eyrolles (1982)MATH
50.
go back to reference Gelenbe, E., Sakellari, G., D’arienzo, M.: Admission of qos aware users in a smart network. ACM Trans. Auton. Adapt. Syst. (TAAS) 3(1), 4 (2008)CrossRef Gelenbe, E., Sakellari, G., D’arienzo, M.: Admission of qos aware users in a smart network. ACM Trans. Auton. Adapt. Syst. (TAAS) 3(1), 4 (2008)CrossRef
52.
go back to reference Gelenbe, E., Wu, F.J.: Large scale simulation for human evacuation and rescue. Comput. Math. Appl. 64(12), 3869–3880 (2012)CrossRef Gelenbe, E., Wu, F.J.: Large scale simulation for human evacuation and rescue. Comput. Math. Appl. 64(12), 3869–3880 (2012)CrossRef
53.
go back to reference Gelenbe, E., Wu, F.J.: Future research on cyber-physical emergency management systems. Future Internet 5(3), 336–354 (2013)CrossRef Gelenbe, E., Wu, F.J.: Future research on cyber-physical emergency management systems. Future Internet 5(3), 336–354 (2013)CrossRef
54.
go back to reference Gelenbe, E., Yin, Y.: Deep learning with random neural networks. In: 2016 International Joint Conference on Neural Networks (IJCNN). IEEE, July 2016 Gelenbe, E., Yin, Y.: Deep learning with random neural networks. In: 2016 International Joint Conference on Neural Networks (IJCNN). IEEE, July 2016
55.
go back to reference Geneiatakis, D., Baldini, G., Fovino, I.N., Vakalis, I.: Towards a mobile malware detection framework with the support of machine learning. In: Gelenbe, E., et al. (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS, vol. 821, Springer (2018) Geneiatakis, D., Baldini, G., Fovino, I.N., Vakalis, I.: Towards a mobile malware detection framework with the support of machine learning. In: Gelenbe, E., et al. (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS, vol. 821, Springer (2018)
56.
go back to reference Gorbil, G., Abdelrahman, A.H., Pavloski, M., Gelenbe, E.: Modeling and analysis of rrc-based signaling storms in 3g networks. IEEE Trans. Emerg. Topics Comput. 4(1), 113–127 (2016)CrossRef Gorbil, G., Abdelrahman, A.H., Pavloski, M., Gelenbe, E.: Modeling and analysis of rrc-based signaling storms in 3g networks. IEEE Trans. Emerg. Topics Comput. 4(1), 113–127 (2016)CrossRef
57.
go back to reference Gorbil, G., Gelenbe, E.: Opportunistic communications for emergency support systems. Procedia Comput. Sci. 5, 39–47 (2011)CrossRef Gorbil, G., Gelenbe, E.: Opportunistic communications for emergency support systems. Procedia Comput. Sci. 5, 39–47 (2011)CrossRef
58.
go back to reference Görbil, G., Abdelrahman, O.H., Gelenbe, E.: Storms in mobile networks. In: Mueller, P., Foschini, L., Yu, R. (eds.) Q2SWinet’14, Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Montreal, QC, Canada, September 21–22, 2014. pp. 119–126. ACM (2014). https://doi.org/10.1145/2642687.2642688 Görbil, G., Abdelrahman, O.H., Gelenbe, E.: Storms in mobile networks. In: Mueller, P., Foschini, L., Yu, R. (eds.) Q2SWinet’14, Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Montreal, QC, Canada, September 21–22, 2014. pp. 119–126. ACM (2014). https://​doi.​org/​10.​1145/​2642687.​2642688
59.
go back to reference Horváth, M., Buttyán, L.: Problem domain analysis of iot-driven secure data markets. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS, vol. 821, Springer (2018) Horváth, M., Buttyán, L.: Problem domain analysis of iot-driven secure data markets. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS, vol. 821, Springer (2018)
61.
go back to reference Kouzinopoulos, C.S. et al.: Using blockchains to strengthen the security of internet of things. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS. vol. 821, Springer (2018) Kouzinopoulos, C.S. et al.: Using blockchains to strengthen the security of internet of things. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS. vol. 821, Springer (2018)
63.
go back to reference Liu, P., Gelenbe, E.: Recursive routing in the cognitive packet network. In: 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007, pp. 1–6. IEEE (2007) Liu, P., Gelenbe, E.: Recursive routing in the cognitive packet network. In: 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007, pp. 1–6. IEEE (2007)
64.
go back to reference Ngai, E.C., Gelenbe, E., Humber, G.: Information-aware traffic reduction for wireless sensor networks. In: IEEE 34th Conference on Local Computer Networks, 2009. LCN 2009, pp. 451–458. IEEE (2009) Ngai, E.C., Gelenbe, E., Humber, G.: Information-aware traffic reduction for wireless sensor networks. In: IEEE 34th Conference on Local Computer Networks, 2009. LCN 2009, pp. 451–458. IEEE (2009)
65.
go back to reference Oke, G., Loukas, G., Gelenbe, E.: Detecting denial of service attacks with bayesian classifiers and the random neural network. In: IEEE International Fuzzy Systems Conference, 2007. FUZZ-IEEE 2007, pp. 1–6. IEEE (2007) Oke, G., Loukas, G., Gelenbe, E.: Detecting denial of service attacks with bayesian classifiers and the random neural network. In: IEEE International Fuzzy Systems Conference, 2007. FUZZ-IEEE 2007, pp. 1–6. IEEE (2007)
66.
go back to reference Pavloski, M.: Signalling attacks in mobile telephony. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS No. 821, Springer (2018) Pavloski, M.: Signalling attacks in mobile telephony. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS No. 821, Springer (2018)
67.
go back to reference Pavloski, M., Gelenbe, E.: Mitigating for signalling attacks in umts networks. In: Information Sciences and Systems 2014, pp. 159–165. Springer International Publishing (2014) Pavloski, M., Gelenbe, E.: Mitigating for signalling attacks in umts networks. In: Information Sciences and Systems 2014, pp. 159–165. Springer International Publishing (2014)
69.
go back to reference Sakellari, G., Gelenbe, E.: Adaptive resilience of the cognitive packet network in the presence of network worms. In: Proceedings of the NATO Symposium on C3I for Crisis, Emergency and Consequence Management, pp. 11–12 (2009) Sakellari, G., Gelenbe, E.: Adaptive resilience of the cognitive packet network in the presence of network worms. In: Proceedings of the NATO Symposium on C3I for Crisis, Emergency and Consequence Management, pp. 11–12 (2009)
70.
go back to reference Sakellari, G., Gelenbe, E.: Demonstrating cognitive packet network resilience to worm attacks. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 636–638. ACM (2010) Sakellari, G., Gelenbe, E.: Demonstrating cognitive packet network resilience to worm attacks. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 636–638. ACM (2010)
71.
go back to reference Sakellari, G., Hey, L., Gelenbe, E.: Adaptability and failure resilience of the cognitive packet network. In: Demo Session of the 27th IEEE Conference on Computer Communications (INFOCOM2008), Phoenix, Arizona, USA (2008) Sakellari, G., Hey, L., Gelenbe, E.: Adaptability and failure resilience of the cognitive packet network. In: Demo Session of the 27th IEEE Conference on Computer Communications (INFOCOM2008), Phoenix, Arizona, USA (2008)
72.
go back to reference Siavvas, M., Gelenbe, E., Kehagias, D., Tzovaras, D.: Static analysis-based approaches for secure software development. In: Gelenbe, E. et al., (eds.) Proceedings of the 2018 ISCIS Security Workshop: Recent Cybersecurity Research in Europe. vol. 821. Lecture Notes CCIS, Springer (2018) Siavvas, M., Gelenbe, E., Kehagias, D., Tzovaras, D.: Static analysis-based approaches for secure software development. In: Gelenbe, E. et al., (eds.) Proceedings of the 2018 ISCIS Security Workshop: Recent Cybersecurity Research in Europe. vol. 821. Lecture Notes CCIS, Springer (2018)
73.
go back to reference Staffa, M. et al.: An openncp-based secure ehealth data exchange system. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS No. 821, Springer (2018) Staffa, M. et al.: An openncp-based secure ehealth data exchange system. In: Gelenbe, E. et al., (eds.) Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS No. 821, Springer (2018)
74.
go back to reference Wang, L., Brun, O., Gelenbe, E.: Adaptive workload distribution for local and remote clouds. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 003984–003988. IEEE (2016) Wang, L., Brun, O., Gelenbe, E.: Adaptive workload distribution for local and remote clouds. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 003984–003988. IEEE (2016)
75.
go back to reference Wang, L., Gelenbe, E.: Adaptive dispatching of tasks in the cloud. IEEE Trans. Cloud Comput. 6(1), 33–45 (2018)CrossRef Wang, L., Gelenbe, E.: Adaptive dispatching of tasks in the cloud. IEEE Trans. Cloud Comput. 6(1), 33–45 (2018)CrossRef
77.
go back to reference Yu, C.M., Ni, G.K., Chen, Y., Gelenbe, E., Kuo, S.Y.: Top-k query result completeness verification in sensor networks. In: 2013 IEEE International Conference on Communications Workshops (ICC), pp. 1026–1030. IEEE (2013) Yu, C.M., Ni, G.K., Chen, Y., Gelenbe, E., Kuo, S.Y.: Top-k query result completeness verification in sensor networks. In: 2013 IEEE International Conference on Communications Workshops (ICC), pp. 1026–1030. IEEE (2013)
Metadata
Title
European Cybersecurity Research and the SerIoT Project
Authors
Joanna Domańska
Mateusz Nowak
Sawomir Nowak
Tadeusz Czachórski
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00840-6_19

Premium Partner