Professor Leandros Maglaras

Job: Professor of Cybersecurity

Faculty: Computing, Engineering and Media

School/department: School of Computer Science and Informatics

Research group(s): Cyber Security Centre

Address: De Montfort University, The Gateway, Leicester, LE1 9BH

T: +44 116 2078483

E: Leandros.maglaras@dmu.ac.uk

 

Personal profile

I am Professor in the School of Computer Science and Informatics of De Montfort University conducting research in the Cyber Security Centre & Software Technology Research Laboratory. I obtained the B.Sc. (M.Sc. equivalent) in Electrical and Computer Engineering from Aristotle University of Thessaloniki, Greece in 1998, M.Sc. in Industrial Production and Management from University of Thessaly in 2004 and M.Sc. and PhD degrees in Electrical & Computer Engineering from University of Thessaly, in 2008 and 2014 respectively.

From September 2017 to November 2019, I was the Director of the Cyber Security Directorate and Head of the National Cyber Security Authority of Greece. I was leading a group of highly skilled professionals in order to organize public sector in Greece in terms of cyber security of systems and applications. We were implementing NIS directive in the Greek Public sector by organizing several security awareness events, dedicated educational programs, proposing security policies and measures and running focused projects that can foster the security of systems and applications of the Greek public sector. We also focused on securing Critical infrastructures of Greece, following the directions given by the NIS directive and we cooperated with all major stakeholders in Greece both from the public and the private sector. We drafted the Greek Cyber Security Strategy (03/2018), the NIS Greek National Law (11/2018) and the Ministerial Decree (10/2019) that included the incident response procedure, the list of OES of Greece and minimum security requirements. During my tenure as the Director of the National Cyber Security Authority, Greece managed to be ranked 1st among 160 countries (10/2019) in the NCSI index which measures the preparedness of countries to prevent cyber threats and manage cyber incidents, climbing 31 positions in less than 2 years.

I have participated in various research programs investigating vehicular and ICT technologies (C4C-project.eu, reduction-project.eu), sustainable development (islepact.eu, smilegov), cyber security (HCYMAF [NCSC UK], CONCORDIA [H2020], COCKPITCI [FP7],  FASTPASS [FP7]) and optimization and prediction of the dielectric behavior of air gaps (optithesi.webs.com)

I serve on the Editorial Board of several International peer-reviewed journals such as IEEE ACCESS, ELSEVIER ARRAY, ELSEVIER ICT EXPRESS, Wiley Jounral on Security & Communication Networks, etc. I am a Senior Member of the Institute of Electrical & Electronic Engineers (IEEE) and a member of the Institution of Engineering and Technology (IET) and the Technical Chamber of Greece (TEE).

Research group affiliations

The Cyber Security Centre (CSC)

Software Technology Research Laboratory (STRL)

Publications and outputs

Journal papers 

[J.93] Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke, "Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning", IEEE Access, Accepted, April 2022 (IF: 3.37), DOI: 10.1109/ACCESS.2022.3165809

[J.92] Othmane Friha, Mohamed Amine Ferrag, Leandros Maglaras, Lei Shu, "Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends", IEEE Internet of Things Magazine, Accepted Pending Minor Revisions (IF:2.075)

[J.91] O. Friha, M. A. Ferrag, L. Shu, L. Maglaras, Kim-Kwang R. Choo, M. Nafa, "FELIDS: Federated Learning-based Intrusion Detection System for Agricultural Internet of Things", Elsevier Journal of Parallel and Distributed Computing, March 2022, DOI: 10.1016/j.jpdc.2022.03.003 (IF:3.37)

[J.90] Apostolos Gerodimos, Leandros Maglaras, Ioanna Kantzavelou, NIck Ayres, "IoT: Communication Protocols and Security Threats", Advances in Computer Science & Communications (ACSC), 2022

[J.89] Ying He, Leandros Maglaras, Aliyu Aliyu, Cunjin Luo, "Healthcare Security Incident Response Strategy - A Proactive Incident Response (IR) Procedure", Security and Communication Networks (Hindawi, Wiley), January 2022 (IF:1.79) DOI: 10.1155/2022/2775249

[J.88] Ioanna Kantzavelou, Leandros Maglaras, Panagiotis Tzikopoulos, Sokratis Katsikas, "A Multiplayer Game Model to Detect Insiders in Wireless Sensor Networks", Peerj Computer Science, Accepted, October 2021 (IF:1.39)

[J.87] Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu, "Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis", IEEE Access, October 2021, DOI: 10.1109/ACCESS.2021.3118642 (IF:3.37)

[J.86] Yahya Lambat, Nick Ayres, Leandros Maglaras, Mohamed Amine Ferrag, "A Mamdani Type Fuzzy Inference system to calculate employee susceptibility to phishing attacks", MDPI Applied Sciences, September 2021, DOI: 10.3390/app11199083 (IF:2.68)

[J.85] Panagiotis Fountas, Taxiarchis Kouskouras, Georgios Kranas, Leandros Maglaras, Mohamed Amine Ferrag, "Intrusion Detection in Critical Infrastructures: A literature review", MDPI Smart Cities, August 2021, DOI: 10.3390/smartcities4030061

[J.84] Iman Almomani, Mohanned Ahmed, Leandros Maglaras, "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia", PeerJ Computer Science, September 2021 , DOI: 10.7717/peerj-cs.703 (IF: 1.39)

[J.83] Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras, "RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks", Security and Communication Networks (Hindawi, Wiley), August 2021, DOI: 10.1155/2021/9959310 (IF:1.79)

 

[J.82] Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke, "WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles", MDPI Sensors, Accepted, March 2021, DOI: 10.3390/s21072443 (IF: 3.275)

[J.81] Nestoras Chouliaras, George Kittes, Ioanna Kantzavelou, Leandros Maglaras, Grammati Pantziou, Mohamed A. Ferrag, "Cyber Ranges and TestBeds for Education, Training and Research", MDPI Applied Sciences, Accepted, January 2021 (IF: 2.474)

[J.80] S. E. Merzougui, M. A. Ferrag, O. Friha, L. Maglaras, "EASBF: An Efficient Authentication Scheme over Blockchain for Fog Computing-enabled Internet of Vehicles", Elsevier Journal of Information Security and Applications, Under minor revision (IF: 2.327)

[J.79] O. Friha, M. Ferrag, L. Shu, L. Maglaras, X. Wang, "Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies", IEEE/CAA of Automatica Sinica, Vol.8, No.4, April 2021, DOI: 10.1109/JAS.2021.1003925 [IF:5.129]

[J.78] Dharmesh Faquir, Nestoras Chouliaras, Vlachou Sofia, Kalopoulou Olga, Leandros Maglaras, "Cybersecurity in Smart Grids, Challenges and Solutions", AIMS Electronics and Electrical Journal, January 2021, DOI: 10.3934/electreng2021001

[J.77] Bil Hallq, Andrew Nickolson, Richard Smith, Leandros Maglaras, Allan Cook, Helge Janicke, Kevin Jones, "A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems", International Journal on Smart Security Technologies (IGI-Global), January 2021, DOI: 10.4018/IJSST.2021010102

[J.76] Fraser HallLeandros MaglarasTheodoros AivaliotisLoukas XagorakisIoanna Kantzavelou, "Smart Homes: Security Challenges and Privacy Concerns", International Journal of Computers, NAUN, November 2020, DOI: 10.46300/9108.2020.14.5

[J.75] Abdelouahid Derhab, Abdelghani Bouras, Mohamed Belaoued, Leandros Maglaras, Farrukh Aslam Khan, "Two-hop Monitoring Mechanism based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks", MDPI Sensors, Under Revision (IF: 3,275)

[J.74] Najmudin Saqib, Vasileios Germanos, Wen Zeng, Leandros Maglaras, "Mapping of the Security Requirements of GDPR and NISD", EAI Transactions on Security and Safety, Accepted, September 2020, DOI: 0.4108/eai.30-6-2020.166283

[J.73] Dave Bullock, Aliyu Aliyu, Leandros Maglaras and Mohamed Amine Ferrag, "Security and Privacy Challenges in the field of iOS device forensics", AIMS Electronis and Electrical Engineering Journal, June 2020, DOI: 10.3934/ElectrEng.2020.3.249

[J.72] Christos Tselikis, Christos Douligeris, Leandros Maglaras, Sarandis Mitropoulos, “On the Conference Key Distribution System with User Anonymity”, Elsevier Journal of Information Security and Applications, Accepted, May 2020, DOI: 10.1016/j.jisa.2020.102556 2214-2126 (IF: 2.327)

[J.71] Aliyu Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten. Allan Cook and Helge Janicke, "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom", MDPI Applied Sciences, May 2020, DOI: 10.3390/app10103660 (IF:2.474)

[J.70] Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmin, Makhlouf Derdour, Helge Janicke, "RDTIDS: Rules and Decision Tree-based Intrusion Detection System for Internet -of-things networks", MDPI Future Internet, March 2020, DOI: 10.3390/fi12030044 (CiteScore: 1.89), [Selected as Cover Topic for Issue 3, Vol.12]

[J.69] James C. Howden, Leandros Maglaras, Mohamed Amine Ferrag, "The Security Aspects of Automotive Over-the-Air Updates", International Journal of Cyber Warfare and Terrorism (IGI-Global), Volume 10, Issue 2, March 20202020, DOI: 10.4018/IJCWT.2020040104

[J.68] Mohamed Amine Ferrag, Lei Shu, Xing Yang, Abdelouahid Derhab, Leandros Maglaras, "Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges", IEEE Access, February 2020, DOI: 10.1109/ACCESS.2020.2973178 (IF: 4,01)

[J.67] Ioannis Vourgidis, Leandros Maglaras, Ahmed S. Alfakeeh, Ali H. Al-Bayatti, Mohamed Amine Ferrag, “Use of smartphones for ensuring vulnerable road user safety through path prediction and early warning: An in-depth review of Capabilities, Limitations and their applications in Cooperative Intelligent Transport Systems”, MDPI Sensors, February, 2020, DOI: 10.3390/s20040997 (IF: 3.03)

[J.66] George Drivas, Leandros Maglaras, Helge Janicke, Sotiris Ioannidis, "Assessing Cybersecurity Threats and Risks in the Public Sector in Greece", Journal of Information Warfare, Vol. 19, Issue 1, 2020

[J.65] Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Navarro, Antonios Argyriou and Helge Janicke, "A Novel Intrusion Detection System Against Spoofing Attacks in Connected Electric Vehicles", Elsevier Array, Vol. 5, March 2020, DOI: 10.1016/j.array.2019.100013

[J.64] Mohamed Amine Ferrag, Leandros Maglaras, Sotiris Moschoyiannis, and Helge Janicke, "Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study", Elsevier Journal of Information Security and Applications, February, 2020 DOI: 10.1016/j.jisa.2019.102419 (IF: 1.537)

[J.63] Leandros Maglaras, Tiago Cruz, Mohamed Amine Ferrag, Helge Janicke, "Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed", WILEY Internet Technology Letters, January/February 2020, Vol. 3, Issue 1, DOI:10.1002/itl2.132

[J.62] Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke, "Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues", Springer Telecommunication Systems, vol. 73(2), pages 317-348, 2020, DOI: 10.1007/s11235-019-00612-5 (IF: 1.707)

[J.61] Michael Robinson, Leandros Maglaras, Kevin Jones, Helge Janicke, "Protecting Civilians from Cyber Warfare with Cyber Buffer Zones", International Journal of Smart Security Technologies (IGI-Global), Vol. 6, Issue 1, 2019, DOI: 10.4018/IJSST.2019010103

[J.60] Dimitrios Kosmanos, Antonios Argyriou, Leandros Maglaras, "Estimating the Relative Speed of RF Jammers in VANETs", Security and Communication Networks (Hindawi, Wiley), November 2019, DOI: 10.1155/2019/2064348 (IF:1.38)

[J.59] Mark Evans, Ying He, Cunjin Luo, Iryna Yevseyeva, Helge Janicke, Efpraxia Zamani, Leandros Maglaras, "Real-time information security incident management: a case study using the IS-CHEC technique", IEEE Access, vol. 7, pp. 142147-142175, 2019, DOI: 10.1109/ACCESS.2019.2944615 (IF: 4,01)

[J.58] Mohamed Amine Ferrag, Leandros Maglaras, "DeliveryCoin: An IDS and Blockchain-based Delivery Framework for Drone-Delivered Services", MDPI, Computers 20198(3), 58; DOI: 10.3390/computers8030058 (CiteScore: 1.5), [Selected as Cover Topic for Issue 3, Vol. 8]

[J.57] Abdelouahid Derhab, Mohamed Guerroumi, Abdu Gumaei, Leandros Maglaras, Mohamed Amine Ferrag, Mithun Mukherjee, Farrukh Aslam Khan "Blockchain and Random Subspace Learning-based IDS for SDN-enabled Industrial IoT Security", MDPI, Sensors 201919(14), 3119; DOI: 10.3390/s19143119 (IF: 3.03)

[J.56] Mark Evans, Ying He, Cunjin Luo, Iryna Yevseyeva, Helge Janicke, Leandros Maglaras "Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form", IEEE Access, vol. 7, pp. 102087-102101, 2019, DOI: 10.1109/ACCESS.2019.2927195 (IF: 4,01)

[J.55] Mohamed Amine Ferrag, Leandros Maglaras, "DeepCoin: A Novel Deep learning and Blockchain-based Energy Exchange Framework for Smart Grids", July 2019, IEEE Transactions on Engineering Management, DOI: 10.1109/TEM.2019.2922936 (IF:1.87)

[J.54] Mark Evans, Ying He, Leandros Maglaras, Irina Yevseyeva, Helge Janicke, “Evaluating Information Security Core Human Error Causes (IS-CHEC) Technique in Public Sector and Comparison with the Private Sector”, Elsevier International Journal of Medical Informatics, Volume 127, July 2019, Pages 109-119, DOI: 10.1016/j.ijmedinf.2019.04.019 (IF:2.73)

[J.53] Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, "Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends", Security and Communication Networks (Hindawi, Wiley), May 2019, DOI: 10.1155/2019/5452870 (IF: 1.38)

[J.52] Abdullah Al-Barnawi, Ying He, Leandros A.Maglaras, Helge Janicke, “Electronic Medical records and Risk Management in MOH Hospitals in Saudi Arabia”, Informatics of Health and Social Care (Francis & Taylor), 44:2, 189-203, April 2019, DOI:10.1080/17538157.2018.1434181 (IF:1,14)

[J.51] Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras, “Developing Cyber Peacekeeping: Observation, Monitoring and Reporting”, Elsevier Journal of Government Information Quarterly, Volume 36, Issue 2, April 2019, Pages 276-293, DOI: 10.1016/j.giq.2018.12.001 (IF:4,31)

[J.50] Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke, “Blockchain Technologies for the Internet of Things: Research Issues and Challenges”, IEEE Internet of Things Journal, Volume: 6, Issue: 2, April 2019, pp: 2188 - 2204, DOI: 10.1109/JIOT.2018.2882794 (IF:9.52)

[J.49] Mark Evans, Ying He, Leandros Maglaras, Helge Janicke, “HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents”, Elsevier Computers and Security, vol. 80, pp. 74-89, January 2019, DOI: 10.1016/j.cose.2018.09.002 (IF: 2.65)

[J.48] Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis, “Threats, Protection and Attribution of Cyber Attacks on National Critical Infrastructures”, EAI Transactions on Security and Safety, Issue 16, Vol. 5, December 2018, DOI: 10.4108/eai.15-10-2018.155856

[J.47] Dimitrios Kosmanos, Leandros Maglaras, Michalis Mavrovouniotis, Sotiris Moschoyiannis, Antonios Argyriou, Athanasios Maglaras, Helge Janicke,“Route Optimization of Electric Vehicles based on Dynamic Wireless Charging”, IEEE Access, July 2018, DOI: 10.1109/ACCESS.2018.2847765 (IF: 4,01)

[J.46] Allan Cook, Richard Smith, Leandros Maglaras, Helge Janicke, "Managing Incident Response in Industrial Internet of Things”, International Journal of Internet technology and secured transactions (Inderscience), Vol. 8, No. 2, July 2018, DOI: 10.1504/IJITST.2018.10014544

[J.45] Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras “An Introduction to Cyber Peacekeeping”, Elsevier Journal of Network and Computer Applications, Vol. 114, July 2018, pp. 70-87, DOI: 10.1016/j.jnca.2018.04.010 (IF: 5.27)

[J.44] Awais Yousaf, Asim Loan, Radu F. Babiceanu, Leandros Maglaras, Onaiza Yousaf, “Convergence of Detection Probability, Computational Gains and Asymptotic Analysis of an Algorithm for Physical-Layer Intrusion Detection System”, Wiley Transactions on Emerging Telecommunications Technologies, May 2018, DOI:10.1002/ett.3430 (IF: 1.61)

[J.43] Leandros A. Maglaras, George Drivas, Kleanthis Noou, Stylianos Rallis, "NIS directive: The case of Greece", EAI Transactions on Security and Safety, May 2018, DOI: 10.4108/eai.15-5-2018.154769

[J.42] Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, Lei Shu, "A systematic review of data protection and privacy preservation schemes for smart grid communications", Sustainable Cities and Society (Elsevier), Vol. 38, April 2018, pp. 806-835, DOI: 10.1016/j.scs.2017.12.041 (IF.4.62)

[J.41] Kyle Coffey, Richard Smith, Leandros Maglaras, Helge Janicke, “Vulnerability Analysis of Network Scanning on SCADA Systems”, Security and Communication Networks (Hindawi, Wiley), March 2018, DOI:10.1155/2018/3794603 (IF:1,38)

[J.40] Leandros A. Maglaras, Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, Tiago J. Cruz, ”Cyber Security of Critical Infrastructures”, ICT Express (Elsevier), Volume 4, Issue 1, March 2018, Pages 42-45, DOI: 10.1016/j.icte.2018.02.001 (CiteScore: 2,60)

[J.39] Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, and Helge Janicke, “Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes”, Journal of Network and Computer Applications (Elsevier), Vol. 101, January 2018, pp. 55-82 DOI: 10.1016/j.jnca.2017.10.017 (IF:5.27)

[J.38] Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke, Jianmin Jiang, Lei Shu, “Authentication Protocols for Internet of Things: A Comprehensive Survey”, Security and Communication Networks (Wiley, Hindawi), November 2017, DOI: 10.1155/2017/6562953 (IF:1,067)

[J.37] Andy Wood, Ying He, Leandros Maglaras, Helge Janicke, “A Security Architectural Pattern for Risk Management of Industry Control Systems within Critical National Infrastructure”, International Journal of Critical Infrastructures (Inderscience), Vol. 13, No 2/3, pp. 113-132, November 2017, DOI: 10.1504/IJCIS.2017.1009242

[J.36] Mithun Mukherjee, Rakesh Matam, Lei Shu, Nikumani Choudhury, Leandros Maglaras, Mohamed Amine Ferrag and Vikas Kumar, “Security and Privacy in Fog Computing: Challenges”, IEEE Access, September 2017, DOI: 10.1109/ACCESS.2017.2749422 (IF: 3,244)

[J.35] Allan Cook, Helge Janicke, Richard Smith, Leandros Maglaras, “The industrial control system cyber defence triage process”, Computers and Security (Elsevier), Volume 70, September 2017, Pages 467-481, DOI: 10.1016/j.cose.2017.07.009(IF: 2,85)

[J.34] Awais Yousaf, Asim Loan, Radu F Babiceanu, Leandros Maglaras, Onaiza Yousaf, “Architectural and Information Theoretic Perspectives of Physical Layer Intruders for Direct Sequence Spread Spectrum System”, Computers and Security (Elsevier), Volume 70, September 2017, Pages 124-143, DOI: 10.1016/j.cose.2017.05.011(IF: 2,85)

[J.33] Samuel Chapman, Richard Smith, Leandros Maglaras, Helge Janicke, “Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?”, Journal of Sensor and Actuator Networks (MDPI), 6(3), 16, August 2017, DOI:10.3390/jsan6030016 (CiteScore: 2.58)

[J.32] Mohamed Amine Ferrag, Leandros A. Maglaras, Ahmed Ahmim, "Privacy Preserving schemes for Ad Hoc Social Networks: A Survey", IEEE Communications Surveys and Tutorials, June, 2017, DOI: 10.1109/COMST.2017.2718178 (IF: 20,23)

[J.31] Allan Cook, Helge Janicke, Leandros Maglaras, Richard Smith, “An Assessment of the Application of IT Security Mechanisms to Industrial Control Systems”, International Journal of Internet technology and secured transactions (Inderscience), Vol. 7, No 2, pp 144-174, 2017, DOI: 10.1504/IJIST.2017.10008030

[J.30] Allan Cook, Richard Smith, Leandros Maglaras, Helge Janicke, "SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control Systems", International Journal of Cyber Warfare and Terrorism (IGI-Global), Volume 7, Issue 2, May 2017, DOI: 10.4018/IJCWT.2017040101

[J.29] Jacqueline Cope, Francois Siewe, Feng Chen, Leandros Maglaras and Helge Janicke, "On Data Leakage from Non-production Systems", Information and Computer Security, (Emerald), Vol.25, Issue 4, pp. 454-474, 2017, DOI: 10.1108/ICS-02-2017-0004 (CiteScore: 1,41)

[J.28] Barnaby Stewart, Luis Rosa, Leandros Maglaras, Tiago Cruz, Mohamed Amine Ferrag, Paulo Simoes, Helge Janicke, ”A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes”, EAI Transactions on Industrial Networks and Intelligent Systems, February 2017, DOI: 10.4108/eai.1-2-2017.152155

[J.27] Tiago Cruz, Luis Rosa, Jorge Proenca, Leandros Maglaras, Matthieu Aubigny, Leonid Lev, Jianmin Jiang, Paulo Simoes, "A cyber Security Detection Framework for Supervisory Control and Data Acquisition Systems", IEEE Transactions on Industrial Informatics, Volume 12, Issue 6, December 2016, Pages 2236-2246, DOI: 10.1109/TII.2016.2599841 (IF:6.7)

[J.26] Raphael Riebl, Markus Monz, Simon Varga, Helge Janicke, Leandros Maglaras, Ali Bayatti, Christian Facchi, “Improved Security Performance for VANET Simulations”, Elsevier IFAC-PapersOnLine, Vol. 49, Issue 30, pp 233-238, DOI: 10.1016/j.ifacol.2016.11.173IFAC-PapersOnLine (CiteScore0,99)

[J.25] Nicholas Ayres, Leandros A. Maglaras, Helge Janicke, Richard Smith, Ying He, "The mimetic virus: A vector for cyber security", International Journal of Business Continuity and Risk Management (Inderscience), Vol. 6, No. 4, pp: 259-271, December 2016, DOI: 10.1504/IJBCRM.2016.10002276

[J.24] Shaimaa Nafea, Leandros A. Maglaras, Francois Siewe, Richard Smith, Helge Janicke "Personalized Students’ Profile Based On Ontology and Rule-based Reasoning", EAI Transactions on e-Learning, December 2016, DOI: 10.4108/eai.2-12-2016.151720

[J.23] Najlaa AlMajed, Leandros A. Maglaras, Francois Siewe, Helge janicke, Pooneh Bagheri Zadeh, "Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities", EAI Transactions on Security and Safety, Volume 3, Issue 7, December 2016, DOI:10.4108/eai.8-12-2016.151727

[J.22] Mark Evans, Leandros Maglaras, Ying He, Helge Janicke, "Human behavior as an aspect of Cyber Security Assurance", Security and Communication Networks (WILEY), Volume 9, Issue 17, November 2016, pages: 4667-4679, DOI: 10.1002/sec.1657 (IF:1.07)

[J.21] Dimitrios Kosmanos, Nikolas Prodromou, Antonios Argyriou, Leandros Maglaras, Helge Janicke, "MIMO techniques for improving diversity and suppressing Jamming threats in Vehicular Ad Hoc Networks", Mobile Information Systems (Hindawi), October 2016, DOI: 10.1155/2016/8141204 (IF:0.85)

[J.20] Nicholas Ayres, Leandros A. Maglaras, "Cyberterrorism targeting general public through social media", Security and Communication Networks (WILEY), Volume 9, Issue 15, October 2016, pp: 2864-2875, DOI: 10.1002/sec.1568 (IF:1.07)

[J.19] Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz, "Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems", Journal of Information Security and Applications (Elsevier), May 2016, DOI: 10.1016/j.jisa.2016.04.002 (IF:1.54)

[J.18] Harry Doubleday, Leandros A. Maglaras, Helge Janicke, “SSH Honeypot: Building, Deploying and Analysis”, International Journal of Advanced Computer Science and Applications (IJACSA), Volume 7, Issue 5, May 2016, DOI: 10.14569/IJACSA.2016.070518

[J.17] Allan Cook, Andrew Nicholson, Helge Janicke, Leandros A. Maglaras, Richard Smith, "Attribution of Cyber Attacks on Industrial Control Systems", EAI Transactions on Industrial Networks and Intelligent Systems, vol. 3, issue 7, e3, pp. 1-15, April 2016, DOI: 10.4108/eai.21-4-2016.151158

[J.16] Steve Harrison, Antonis Tzounis, Leandros A. Maglaras, Francois Siewe, Richard Smith, Helge Janicke, "A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development", International Journal of Network Security and its Applications (IJNSA), Vol 8, No 2, pp 51-69, March, 2016, DOI: 10.5121/ijnsa.2016.8204

[J.15] Leandros A. Maglaras, Ali Al-Bayatti, Ying He, Isabel Wagner, Helge Janicke, "Social Internet of Vehicles for Smart Cities", MDPI Journal of Sensor and Actuator Networks, February 2016, 5(1), 3;, February 2016, DOI:10.3390/jsan5010003 (CiteScore: 2.58)

[J.14] Leandros A. Maglaras, Dimitrios Katsaros, "Social Clustering of Vehicles based on Semi-Markov Processes", IEEE Transactions on Vehicular Technology, vol. 65, No. 1, pp 318-332, January, 2016, DOI: 10.1109/TVT.2015.2394367 (IF:4.07)

[J.13] Zibusiso Dewa, Leandros A. Maglaras, "Data Mining and Intrusion Detection Systems", International Journal of Advanced Computer Science and Applications (IJACSA), Volume 7, Issue 1, January 2016, DOI: 10.14569/IJACSA.2016.070109

[J.12] Grigoris Tzokatziou, Leandros A. Maglaras, Helge Janicke, Ying He, "Exploiting SCADA vulnerabilities using a Human Interface Device", International Journal of Advanced Computer Science and Applications (IJACSA), Volume 6, Issue 7, July 2015, DOI: 10.14569/IJACSA.2015.060634

[J.11] Leandros A. Maglaras, Jianmin Jiang, Athanasios Maglaras, Frangiskos Topalis, Sotiris Moschoyiannis, "Dynamic wireless charging of electric vehicles on the move with Mobile Energy Disseminators", International Journal of Advanced Computer Science and Applications (IJACSA), Volume 6, Issue 6, June 2015, DOI: 10.14569/IJACSA.2015.060634

[J.10] Leandros A. Maglaras, "Coupling of the synchronization stations of an Extended Kanban system", EAI Transactions on Industrial Networks and Intelligent Systems, Special Issue on Innovation for Community Services, vol. 2, issue 4, e5, pp. 1-9, June 2015, DOI: 10.4108/inis.2.4.e5

[J.09] Leandros A. Maglaras, "A Novel Distributed Intrusion Detection System for Vehicular Ad Hoc Networks", International Journal of Advanced Computer Science and Applications (IJACSA), Volume 6, Issue 4, April 2015, DOI: 10.14569/IJACSA.2015.060414

[J.08] Leandros A. Maglaras, Efstathios Stathakidis, Jianmin Jiang, “Social Aspect of Vehicular Communications”, EAI Transactions on Cloud systems, Special Issue on IoT as-a-Service, vol. 1, issue 1,e6, pp. 1-10, February 2015, DOI: 10.4108/cs.1.1.e6

[J.07] Leandros A. Maglaras, Jianmin Jiang, "A novel intrusion detection method based on OCSVM and K-means recursive clustering", EAI Transactions on Security and Safety, vol. 2, no 3, e5, pp. 1-10, January 2015, DOI : 10.4108/sesa.2.3.e5

[J.06] Leandros A. Maglaras, Jianmin Jiang, Tiago Cruz, “Integrated OCSVM mechanism for intrusion detection in SCADA systems”, IET Electronics Letters, Volume 50, issue 25, December 2014, p 1935-1936, DOI: 10.1049/el.2014.2897 (IF:0.92)

[J.05] Leandros A. Maglaras, Jianmin Jiang, "A real time OCSVM Intrusion Detection module with low overhead for SCADA systems", International Journal of Advanced Research in Artificial Intelligence (IJARAI), Vol. 3, No.10, pp. 45-53, October, 2014, DOI: 10.14569/IJARAI.2014.031006

[J.04] Leandros A. Maglaras, Dimitrios Katsaros, "Delay Efficient Backpressure Routing in Wireless Ad Hoc networks", EAI Transactions on Mobile Communications and Applications, vol. 14, no 1, e5, pp. 1-16, September, 2014, DOI: 10.4108/mca.1.4.e5

[J.03] Tiago Cruz, Jorge Proença, Paulo Simões, Matthieu Aubigny, Moussa Ouedraogo, Antonio Graziano, Leandros Maglaras, "A Distributed IDS for Industrial Control Systems", International Journal of Cyber Secutiry and Terorism (IGI-Global), vol. 4, No 2, April 2014, pp 1-22, DOI: 10.4018/ijcwt.2014040101

[J.02] Leandros A. Maglaras, Dimitrios Katsaros. "New measures for characterizing the significance of nodes in wireless ad hoc networks via localized path-based neighborhood analysis", Social network Analysis and Mining (Springer), vol. 2, no. 2, pp. 97-106, June, 2012, DOI: 10.1007/s13278-011-0029-5

[J.01] Leandros A. Maglaras, Athanasios Maglaras, Frangiskos Topalis "The influence of the effect of grounding and corona current on the field strength, the corona onset and the breakdown voltage of small air gaps", WSEAS transactions on Power Systems, Issue 3, Vol. 3, pp. 103-110, March 2008 (e-library)

Books

[B.02] Leandros Maglaras, Ioanna Kantzavelou, Mohamed Amine Ferrag, "Cybersecurity of Critical Infrastructures: Challenges and Solutions", MDPI AG, 2021

[B.01] Leandros Maglaras, Ioanna Kantzavelou, "Cybersecurity Issues in Emerging Technologies", CRC Press, 2021, DOI: 10.1201/9781003109952

 

Editorials

[E.08] Leandros A. Maglaras, Ioanna Kantzavelou, Mohamed Amine Ferrag, "Digital Transformation and Cyber security of Critical Infrastructures", Applied Sciences (MDPI), September 2021, DOI: 10.3390/app11188357

[E.07] Kevin Jones, Helge Janicke, Leandros Maglaras, Christos Xenakis ”Introduction to the Special Issue on Industrial Control Systems Cyber Security”, Journal of Information Security and Applications (Elsevier), 2020, DOI: 10.1016/j.jisa.2020.102542

[E.06] Leandros Maglaras, Lei Shu, Athanasios Maglaras, Jianmin Jiang, Helge Janicke, Dimitrios Katsaros, Tiago J. Cruz, “Introduction to the Special Issue on ”Industrial Internet of Things (I2oT)”, Journal of ACM/Springer Mobile Networks & Applications (MONET), Vol.23, Issue 4, August 2018, DOI 10.1007/s11036-017-0937-3

[E.05] Leandros Maglaras, Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Artemios Voyiotzis, Athanasios Maglaras, Haewoon Nam, Pavlina Fragkou, Tiago Cruz, "SI: CI & Smart Grid Cyber Security", ICT Express (Elsevier), Volume 4, Issue 1, Pages 1-54, march 2018

[E.04] Sencun Zhu, Kevin Jones, Leandros Maglaras, "Defense Mechanisms for Public Systems", EAI Transactions on Security and Safety, January 2018, DOI: 10.4108/eai-4-12018.153524

[E.03] Sencun Zhu, Kevin Jones, Leandros Maglaras, "Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems", EAI Transactions on Security and Safety, December 2017, DOI:10.4108/eai.28-12.2017-153514

[E.02] Kevin Jones, Helge Janicke, Christian Facchi, Leandros Maglaras, ”Introduction to the Special Issue on ICS & SCADA Cyber Security”, Journal of Information Security and Applications (Elsevier), July 2017, DOI: 10.1016/j.jisa.2017.05.009

[E.01] Helge Janicke, Kevin Jones, Leandros Maglaras, “Security, Privacy and Trust in Cyber Physical Systems”, EAI Transactions on Security and Safety, Volume 3, Issue 7, December 2016, DOI: 10.4108/eai.8-12-2016.151724

Edited Proceedings

[P.02] Jones, K., Janicke, H., Brandstetter, T., & Maglaras, L. A. (2019). 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR 2019), BCS Learning & Development, DOI: 10.14236/ewic/ICSCSR2019.0

[P.01] Leandros A. Maglaras, Helge Janicke, and Kevin Jones, eds. Industrial Networks and Intelligent Systems: Second International Conference, INISCOM 2016, Leicester, UK, October 31–November 1, 2016, Revised Selected Papers. Vol. 188. Springer, 2017, DOI: 10.1007/978-3-319-52569-3

Articles in international conference proceedings

[C.61] Leandros Maglaras, Nick Ayres, Sotiris Moschoyiannis, Leandros Tassiulas, "The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms", IEEE International Conference on Computer Communications (INFOCOM 2022), 2-5 May 2022 // Virtual Conference

[C.60] Taha Abdelgalil, Vasileios Manolas, Leandros Maglaras, Ioanna Kantzavelou, Mohamed Amine Ferrag, "Blockchain Technology: A case study in supply chain management", Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, December 13 - 15, 2021

[C.59] Vasileios Dimitriadis, Leandros Maglaras, Nineta Polemi, Ioanna Kantzavelou, Nick Ayres, "Uncuffed: A Blockchain-based Secure Messaging System", 25th Pan-Hellenic Conference on Informatics (PCI 2021), Volos, Greece, November 26-28, 2021

[C.58] David Holmes, Maria Papathanasaki, Leandros Maglaras, Mohamed Amine Ferrag, Surya Nepal and Helge Janicke, "Digital Twins and Cyber Security – solution or challenge?", 6th IEEE South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2021), 24-26 September 2021, Preveza, Greece, DOI: 10.1109/SEEDA-CECNSM53056.2021.9566277

[C.57] Maria Papathanasaki, Panagiotis Fountas, Leandros Maglaras, Christos Douligeris, Mohamed Amine Ferrag, "Quantum Cryptography in Maritime Telecommunications", IEEE International Conference on Cyber Security and Resilience (IEEE CSR), July 26-28 2021, DOI: 10.1109/CSR51186.2021.9527973

[C.56] Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Nasreddine Lagra, Mohamed Amine Ferrag, Leandros Maglaras, "SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing attacks on Internet of Vehicles", 14th EAI International Wireless Internet Conference, November 9-10, 2021, Orillia, Canada

[C.55] Ray Walshe, Ansgar Koene, Sabine Baumann, Massimo Panella, Leandros Maglaras, Francisco Medeiros, "Artificial Intelligence as Enabler for Sustainable Development", 27th ICE/IEEE International Technology Management Conference, 21-23 June 2021

[C.54] Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris, "A novel Two-Factor HoneyToken Authentication Mechanism", 30th IEEE International Conference on Computer Communications and Networks (ICCCN 2021), July 19-22 2021

[C.53] Messaoud Babaghayou, Nabila Labraoui, Mohamed Amine Ferrag, Leandros Maglaras, "Between Location Protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles", 39th IEEE International Conference on Consumer Electronics (ICCE) , January 10-12, 2021

[C.52] Messaoud Babaghayou, Nabila Labraoui, Ado Adamou, Mohamed Amine Ferrag, Leandros Maglaras, "Preserving the Location Privacy of Drivers Using Transmission Range Changing Techniques in Internet of Vehicles", 4th International Symposium on Informatics and its Applications (ISIA 2020), Mohamed Boudiaf University of M'sila , Algeria, December 15-16 2020

[C.51] Leandros Maglaras, George Drivas, Nestoras Chouliaras, Eerke Boiten, Costas Lambrinoudakis, Sotiris Ioannidis, "Cybersecurity in the Era of Digital Transformation: The case of Greece", IEEE international Conference on Internet of Things and Intelligent Applications (ITIA2020) , 27-29 November, 2020, Zhenjiang, China

[C.50] Dimitrios Tsiostas, George Kittes, Nestoras Chouliaras, Ioanna Kantzavelou, Leandros Maglaras, Christos Douligeris and Vasileios Vlachos, "The insider threat: Reasons, Effects and Mitigation Techniques", 24th Pan-Hellenic Conference on Informatics (PCI 2020), Athens, Greece, November 20th-22nd, 2020

[C.49] Maria Papathanasaki, Georgios Dimitriou, Leandros Maglaras, Ismini Vasileiou, Helge Janicke, "From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?", 24th Pan-Hellenic Conference on Informatics (PCI 2020), Athens, Greece, November 20th-22nd, 2020

[C.48] Stavros Kassaras, Leandros Maglaras, "ZKPs: Does This Make The Cut? Recent Advances and Success of Zero-Knowledge Security Protocols", Collaborative European Research Conference (CERC), Belfast, Northern-Ireland September 10-11, 2020

[C.47] Dimitrios Kosmanos, Savvas Chatzisavvas, Antonios Argyriou, Leandros Maglaras, "Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks", 3rd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2020), in Conjunction with ESORICS 2020, Surrey, UK, 14-18 September 2020

[C.46] Sotirios Panagiotis Chytas, Leandros Maglaras, Abdelouahid Derhab and George Stamoulis, "Assessment of Machine Learning Techniques for Building an Efficient IDS", First International Conference of Smart Systems and Emerging Technologies (SMARTTECH 2020), Prince Sultan University, Riyadh, Saudi Arabia , 3-5 November 2020

[C.45] Messaoud Babaghayou, Nabila Labraoui, Ado Adamou, Amine Ferrag, Leandros Maglaras, "The Impact of the Adversary's Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles", 5th IEEE South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2020), Rhodes, Greece

[C.44] George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook and Helge Janicke, "A NIS Directive compliant Cybersecurity Maturity Model", IEEE Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2020), 13-17 July 2020, DOI: 10.1109/COMPSAC48688.2020.00-20

[C.43] Yash Soni, Leandros Maglaras, Mohamed Amine Ferrag, "Blockchain Based Voting Systems", 19th European Conference on Cyber Warfare and Security (ECCWS 2020), 25-26 June 2020, Chester, UK

[C.42] Eda Tumer, Leandros Maglaras, "Security of Systems on Chip", 19th European Conference on Cyber Warfare and Security (ECCWS 2020), 25-26 June 2020, Chester, UK

[C.41] Dimitrios Kosmanos, Apostolos Pappas, Francisco J. Aparicio-Navarro, Leandros Maglaras, Helge Janicke, Eerke Boiten and Antonios Argyriou, "Intrusion Detection System for Platooning Connected Autonomous Vehicles", 4th IEEE South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2019), September 20-22, 2019, Piraeus, Greece, DOI10.1109/SEEDA-CECNSM.2019.8908528

[C.40] Mohamed Amine Ferrag, Leandros Maglaras, and Helge Janicke, "Deep Learning Techniques for Cyber Security Intrusion Detection: A Detailed Analysis", Proceedings of the 6th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR 2019), Athens, 10-12 September 2019, DOI: 10.14236/ewic/icscsr19.16

[C.39] Abdelouahid Derhab, Mohamed Guerroumi, Leandros Maglaras, Mohamed Amine Ferrag, Mithun Mukherjee and Farrukh Aslam Khan, "BLOSTER: Blockchain-based System for Detection of Fraudulent Rules in Software-Defined Networks", Proceedings of the 6th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR 2019), Athens, 10-12 September 2019, DOI: 10.14236/ewic/icscsr19.5

[C.38] Georgios Chrysanidis, Dimitrios Kosmanos, Antonios Argyriou, Leandros Maglaras, "Stochastic Optimization of Electric Vehicle Charging Stations", IEEE Smart World Congress, 19-23 August 2019, De Montfort University, Leicester, UK, DOI 10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00046

[C.37] Ahmed Ahmim, Mohamed Amine Ferrag, Leandros Maglaras, Makhlouf Derdour, Helge Janicke, George Drivas, "Taxonomy of Supervised Machine Learning for Intrusion Detection Systems", International Conference on Strategic Innovative Marketing and Tourism (ICSIMAT 2019), 17-21 July, Chios, Springer Proceedings in Business and Economics, DOI: 10.1007/978-3-030-36126-6_69

[C.36] Ahmed Ahmim, Mohamed Amine Ferrag, Leandros Maglaras, Makhlouf Derdour, Helge Janicke, "A Detailed Analysis of Using Supervised Machine Learning for Intrusion Detection", International Conference on Strategic Innovative Marketing and Tourism (ICSIMAT 2019), 17-21 July, Chios, Springer Proceedings in Business and Economics, DOI: 10.1007/978-3-030-36126-6_70

[C.35] George Drivas, Leandros Maglaras, Helge Janicke, Sotiris Ioannidis, "Cyber Security Assessment of the Public Sector in Greece", 18th European Conference on Cyber Warfare and Security (ECCWS 2019), 4-5 July 2019, Coimbra, Portugal, ISBN: 978-1-912764-29-7

[C.34] Ahmed Ahmim, Leandros Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour and Helge Janicke, "A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models", 1st International Workshop on Security and Reliability of IoT Systems in conjunction with the 15th IEEE Annual International Conference on Distributed Computing in Sensor Systems (DCOSS 2019), Santorini Island, Greece, May 29 - 31, 2019,DOI: 10.1109/DCOSS.2019.00059, Best Paper Award

[C.33] Sotiris Moschoyiannis, Leandros Maglaras and Nurulhuda A Manaf, “Trace-based Verification of Rule-based Service Choreographies”, 11th IEEE International Conference on Service-Oriented Computing and Applications (SOCA 2018), 20-22 November 2018, Paris, France, DOI: 10.1109/SOCA.2018.00034

[C.32] Mohamed Amine Ferrag, Abdelouahid Derhab, Leandros Maglaras, Mithun Mukherjee, Helge Janicke, “Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges”, 7th IEEE International Conference on Smart Communications in Network Technologies (SACONET’18), 27-31 October 2018, La Gazelle d’or, El Oued, Algeria, DOI: 10.1109/SaCoNeT.2018.8585538

[C.31] Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelaouahid Derhab, Abdelaziz Amara Kobra, "Taxonomy of Biometric-based Authentication Schemes for Mobile Devices", 3rd IEEE International Conference on Pattern Recognition and Intelligent Systems (PAIS 2018), 24-25 October 2018, Tebessa, Algeria, DOI: 10.1109/PAIS.2018.8598491

[C.30] Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, and Helge Janicke, “Cyber Security: From Regulations and Policies to Practice”, International Conference on Strategic Innovative Marketing and Tourism (ICSIMAT 2018), 17-20 October 2018, Athens, Springer Proceedings in Business and Economics, DOI: 10.1007/978-3-030-12453-3_88

[C.29] Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke, ”Blockchain and Its Role in the Internet of Things”, International Conference on Strategic Innovative Marketing and Tourism (ICSIMAT 2018), 17-20 October 2018, Athens, Springer Proceedings in Business and Economics, DOI: 10.1007/978-3-030-12453-3_119

[C.28] Barnaby Stewart, Luis Rosa, Leandros Maglaras, Tiago Cruz, Paulo Simoes, Helge Janicke, ”Effect of Network Architecture Changes on OCSVM based Intrusion Detection System”, Proceedings of the 2nd International Conference on Industrial Networks and Intelligent Systems (INISCOM 2016), Leicester, United Kingdom, 31/10-01/11 2016, Springer International Publishing, DOI: 10.1007/978-3-319-52569-3_8

[C.27] Glen Hawthorne, Ying He, Leandros Maglaras, Helge Janicke, “Security Visualization: Detecting Denial Of Service”, Proceedings of the 2nd International Conference on Industrial Networks and Intelligent Systems (INISCOM 2016), Leicester, United Kingdom, 31/10-01/11 2016, Springer International Publishing, DOI: 10.1007/978-3-319-52569-3_4

[C.26] Allan Cook, Richard Smith, Leandros Maglaras, Helge Janicke, "Measuring the Risk of Cyber Attack in Industrial Control Systems", Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR 2016), Belfast, 23-25 August 2016, DOI: 10.14236/ewic/ICS2016.12

[C.25] Allan Cook, Richard Smith, Leandros Maglaras, Helge Janicke, "Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure", Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR 2016), Belfast, 23-25 August 2016, DOI:10.14236/ewic/ICS2016.10

[C.24] Pavlos Basaras, Ioannis-Prodromos Belikaidis, Leandros A. Maglaras, Dimitrios Katsaros, "Blocking Epidemics Propagation in Vehicular Networks", Proceedings of the 12th IEEE/IFIP Annual Conference on Wireless on-Demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy, January 20-22 2016, INSPEC Accession Number:1583661

[C.23] Shaimaa Nafea, Leandros A. Maglaras, Francois Siewe, N.Eleman Shehab, "A Novel Adaptive Learning Management System Using Ontology", Proceedings of the 7th IEEE International Conference on Intelligent Computing and Information Systems, Cairo, Egypt, 12-14 December 2015, DOI: 10.1109/IntelCIS.2015.7397242

[C.22] Pavlos Basaras, Leandros A. Maglaras, Dimitrios Katsaros, Helge Janicke "A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks", Proceedings of the 8th IFIP Wireless and Mobile Networking Conference (WMNC 2015), Munich, Germany, 5-7 October 2015, DOI: 10.1109/WMNC.2015.27

[C.21] Ying He, Leandros A. Maglaras, Helge Janicke, Kevin Jones, "An Indusrtial Control Systems Incident Response Framework", Proceedings of the IEEE conference on Communications and Network security (CNS 2015), Florence, Italy,28-30 September 2015, DOI: 10.1109/CNS.2015.7346923

[C.20] Grigoris Tzokatziou, Leandros A. Maglaras, Helge Janicke, "Insecure by Design: Using Human Interface Devices to exploit SCADA systems", Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR 2015), Ingolstadt, 17-18 September 2015, DOI:10.14236/ewic/ICS2015.13

[C.19] Leandros A. Maglaras, Jianmin Jiang, Athanasios Maglaras, Frangiskos Topalis, "Mobile Energy Disseminators increase electrical vehicles range in a smart city", Proceedings of the 5th IET Hybrid and Electric Vehicle Conference (HEVC 2014), London, 5-6 November 2014, DOI:10.1049/cp.2014.0947

[C.18] Leandros A. Maglaras, Jianmin Jiang, "Intrusion Detection in SCADA systems using machine learning techniques", Proceedings of the 2nd Science and Information Conference (SAI 2014), 626-631. doi:10.1109/SAI.2014.6918252

[C.17] Leandros A. Maglaras, Jianmin Jiang "OCSVM model combined with k-means clustering for intrusion detection in SCADA systems", Proceedings of the 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE 2014) 133-134. doi:10.1109/QSHINE.2014.6928673

[C.16] Leandros A. Maglaras, Frangiskos Topalis and Athanasios Maglaras, "Cooperative approaches for dymanic wireless charging of Electric Vehicles in a smart city", Proceedings of the IEEE International Energy Conference (EnergyCon 2014), 1365-1369, doi:10.1109/ENERGYCON.2014.6850600

[C.15] Athanasios Maglaras, Frangiskos Topalis, Leandros A. Maglaras and Tsilika Kyriaki, "Optimization and Prediction of Dielectric Behavior of Small Air Gaps Stressed by DC Voltages", Proceedings of the IEEE International Energy Conference (EnergyCon 2014), 439-445. doi:10.1109/ENERGYCON.2014.6850464

[C.14] Leandros A. Maglaras, Pavlos Basaras and Dimitrios Katsaros, "Exploiting Vehicular Communications for Reducing CO2 emissions in Urban Environments", Proceedings of the 2nd IEEE International Conference on Connected Vehicles and Expo (ICCVE 2013) - Proceedings, 32-37. doi:10.1109/ICCVE.2013.6799765

[C.13] Athanasios Maglaras, Triphon G. Kousiouris, Fragkiskos V. Topalis, Dimitrios Katsaros and Leandros A. Maglaras "Optimization of the Corona effects and breakdown voltage of small rod-plate air gaps stressed by dc and impulse voltages", Proceedings of the 11th IEEE International Conference on Solid Dielectrics (ICSD 2013), pp.160-165, Bologna, Italy, doi:10.1109/ICSD.2013.6619741

[C.12] Athanasios Maglaras , Kousiouris G. T., Topalis F. V., Leandros A. Maglaras . “Optimization of Corona Onset and Breakdown Voltage of Small Air Gaps Stressed by DC and Impulse Voltages”, Proceedings of the IEEE EuroCon 2013, 1207-1214. doi : 10.1109/EUROCON.2013.6625134

[C.11] Leandros A. Maglaras, Dimitrios Katsaros. "Clustering in Urban environments: Virtual forces applied to vehicles", Proceedings of the IEEE International Conference on Communications, Workshops (ICC 2013), 484-488. doi:10.1109/ICCW.2013.6649282

[C.10] Leandros A. Maglaras, Dimitrios Katsaros. "Enhanced Spring Clustering in VANETs with Obstruction Considerations", Proceedings of the 77th IEEE Vehicular Technology Conference - Spring: (VTC-Spring 2013), Dresden, Germany, June 2-5, 2013, doi: 10.1109/VTCSpring.2013.6692552

[C.09] Athanasios Maglaras, Trifon Kousiouris, Frangiskos Topalis, Dimitrios Katsaros and Leandros Maglaras "Method of controlling Corona effects and breakdown voltage of small air gaps stressed by impulse voltages", Proceedings of the 31st IEEE Electrical Insulation Conference (EIC 2013), Ottawa, Ontario, Canada, 2-5 June 2013

[C.08] Athanasios Maglaras, Trifon Kousiouris, Frangiskos Topalis and Leandros Maglaras "Optimization of Corona Effects in Small Air Gaps Stressed by DC Voltages", Proceedings of the 6th IEEE European Modelling Symposium (EMS 2012), Malta, Nov 14-16, 2012, doi: 10.1109/EMS.2012.49

[C.07] Leandros A. Maglaras, Dimitrios Katsaros. "Distributed Clustering in Vehicular Networks", Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2012), Barcelona, Spain, doi:10.1109/WiMOB.2012.6379136

[C.06] Leandros A. Maglaras, Dimitrios Katsaros, "Distributed Skip Air Index for Smart Broadcasting in Intelligent Transportation Systems", Proceedings of the IEEE Intelligent Vehicles Symposium (IV 2012), Madrid, Spain,624-629. doi:10.1109/IVS.2012.6232223

[C.05] Leandros A. Maglaras, Dimitrios Katsaros, "Layered Backpressure Scheduling for Delay Reduction in Ad Hoc Networks", Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011), doi:10.1109/WoWMoM.2011.5986388 (Acceptance rate: 18.5%)

[C.04] Leandros A. Maglaras, Dimitrios Katsaros, "New Metrics for Characterizing the Significance of Nodes in Wireless Networks via Path-Based Neighborhood Analysis", Proceedings of the 13th Panhellenic Conference on Informatics (PCI-2009), pp. 143-147. doi:10.1109/PCI.2009.12

[C.03] Maglaras A., Maglaras L. and Dafopoulos V., “The ground effect, the polarity effect, and the mirror effect in small rod-plate and rod-rod air gaps stressed by dc voltage”, Proceedings of ISH 15th Intern. Sympos. High Voltage Engineering, Ljubljana, Slovenia, T4-334, p. 181, 2007

[C.02] Maglaras A., Maglaras L., “The Polarity effect and the corona current in small air gaps“, Proceedings of the 2nd Intern. Conf. Experiments, Process, System Modeling, Simulation & Optimization (2nd EpsMsO), Vol. III, pp. 1063-1070, Athens, Greece, 2007

[C.01] Maglaras A., Maglaras L., “Numerical modeling and analysis of electric field distribution in rod – plate air gaps, with or without barrier, stressed by breakdown voltages”, Proceedings of the 1st Intern. Conf. Experiments, Process, System, Modeling, Simulation & Optimization (1st IC-EpsMsO), Athens, Greece, Volume III, pp. 729-737, 2005

Book Chapters

[BCh.22] Sophie Rice, Leandros Maglaras, "Artificial Intelligence: Practical & Ethical Challenges", Chapter in Explainable Artificial Intelligence for Cyber Security - Next Generation Artificial Intelligence, Springer Nature, 2021

[BCh.21] Mark Evans, Ying He, Leandros Maglaras, Helge Janicke, “Development and application of the Information Security Core Human Error Causes (IS-CHEC) technique”, Chapter in Cybersecurity, Psychology, and Cognitive Science, Elsevier, 2021

[BCh.20] Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, "A tutorial on Cross Site Scripting Attack – Defense", Chapter in Securing Social Networks in Cyberspace, CRC Press, 2021

[BCh.19] Helge Janicke, Richard Smith, Leandros Maglaras, Allan Cook, Ying He, Fenia Ferra, "Agile Incident Response in Industrial Control Environments", Chapter in Cybersecurity Issues in Emerging Technologies, CRC Press, 2021

[BCh.18] Panagiotis Efstathiadis, Anna Karanika, Nestoras Chouliaras, Leandros Maglaras, Ioanna Kantzavelou, "Smart Cars and Over-the-Air Updates", Chapter in Cybersecurity Issues in Emerging Technologies, CRC Press, 2021

[BCh.17] Nathan Clark, Leandros Maglaras, Ioanna Kantzavelou, Nestoras Chouliaras, Mohamed Amine Ferrag, "Blockchain Technology: Security and Privacy Issues", Chapter in Blockchain Technology and Innovation in Business Process, Springer, 2021

[BCh.16] Muhammad Mashhood Ahmed, Leandros Maglaras, Mohamed Amine Ferrag, "Cyber Threats in Healthcare sector and countermeasures", Chapter in Entrepreneurial Development and Innovation in Family Businesses and SMEs, IGI Global, June 2020, DOI: 10.4018/978-1-7998-3648-3

[BCh.15] Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag, "The cost perspective of Password Security", Chapter in Handbook of Research on Multimedia Cyber Security, IGI Global, April 2020, DOI: 10.4018/978-1-7998-2701-6.ch017

[BCh.14] Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras, "Developing Cyber Buffer Zones", Chapter in Encyclopedia of Criminal Activities and the Deep Web, IGI Global, February 2020, DOI: 10.4018/978-1-5225-9715-5.ch019

[BCh.13] Leandros Maglaras, Helge Janicke, Jianmin Jiang, Andrew Crampton, “Novel Intrusion Detection mechanism with low overhead for SCADA systems”, Chapter in Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, IGI Global, September 2019, DOI: 10.4018/978-1-5225-9866-4.ch017

[BCh.12M. Mukherjee, M. A. Ferrag, L. Maglaras, A. Derhab, and M. Aazam, “Security and Privacy Issues and Solutions for Fog”, Chapter accepted in Fog and Fogonomics: Challenges and Practices of Fog Computing, Networking, Strategy, and Economics, Wiley, March 2020, ISBN-10: 1119501091, DOI: 10.1002/9781119501121.ch14

[BCh.11] Nicholas Ayres, Leandros Maglaras, Helge Janicke, "OSNs as cyberterrorist weapons against the general public", Chapter in National Security: Breakthroughs in Research and Practice, IGI Global, February 2019, DOI: 10.4018/978-1-5225-7912-0.ch013

[BCh.10] Allan Cook, Richard Smith, Leandros Maglaras, Helge Janicke, "SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control Systems", Chapter in Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (Mehdi Khosrow-Pour), IGI Global, May 2018, DOI: 10.4018/978-1-5225-5634-3.ch033

[BCh.09] Bil Hallaq, Andrew Nickolson, Richard Smith, Leandros Maglaras, Helge Janicke, Kevin Jones, "CYRAN, a Hybrid Cyber Range for testing security on ICS/SCADA systems", Chapter in Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (Mehdi Khosrow-Pour), IGI Global, May 2018, DOI: 10.4018/978-1-5225-5634-3.ch057

[BCh.08] Kyle Coffey, Leandros Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, Awais Yousaf, “Vulnerability assessment of Cybersecurity in SCADA systems”, Chapter in Guide to Vulnerability Analysis for Computer Networks and Systems (Simon Parkinson, Andrew Crampton, Richard Hill), Springer, 2018, ISBN:978-3-319-92624-7, DOI: 10.1007/978-3-319-92624-7_3

[BCh.07] Ioannis Vourgidis, Jenny Carter, Leandros Maglaras, Helge Janicke, Pavlina Fragkou, Zoe Folia, “A novel method for Calculating Customer Reviews Ratings”, Chapter in Handbook of Research on Contemporary Perspectives on Web-Based Systems (Atilla Elçi), IGI Global, May 2018, DOI: 10.4018/978-1-5225-5384-7.ch020

[BCh.06] Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, and Helge Janicke, “Internet of Cloud: Security and Privacy issues”, Chapter in Cloud Computing for Optimization: Foundations, Applications, Challenges, (Bhabani Shankar Prasad Mishra, Himansu Das, Satchidanand Dehuri, Alok Kumar Jagadev), Springer, Studies in Big data book series, May 2018, DOI: 10.1007/978-3-319-73676-1_11

[BCh.05] Jacqueline Cope, Leandros Maglaras, Francois Siewe, Feng Chen and Helge Janicke, "A Framework for Minimising Data Leakage from Non-Production Systems", Chapter in Big Data Analytics: From Planning to Performance, CRC Press, November 2017, ISBN: 9781138032392

[BCh.04] Leandros A. Maglaras, Pavlos Basaras, Dimitrios Katsaros, Helge Janicke, “Social Clustering of Vehicles”, Chapter in Vehicular Social Networks (Anna Maria Vegni, Valeria Loscri, Athanasios V. Vasilakos), CRC Press, March 2017, ISBN-13: 978-1498749190

[BCh.03] Leandros Maglaras, Helge Janicke, Jianmin Jiang, Andrew Crampton, “Novel Intrusion Detection mechanism with low overhead for SCADA systems”, Chapter in Security Solutions and Applied Cryptography in Smart Grid Communications (Mohamed Amine Ferrag, Ahmed Ahmim), IGI Global, November 2016, DOI: 10.4018/978-1-5225-1829-7.ch009

[BCh.02] Bil Hallaq, Andrew Nickolson, Richard Smith, Leandros Maglaras, Helge Janicke, Kevin Jones, "CYRAN, a Hybrid Cyber Range for testing security on ICS/SCADA systems", Chapter in Security Solutions and Applied Cryptography in Smart Grid Communications (Mohamed Amine Ferrag, Ahmed Ahmim), IGI Global, November 2016, DOI: 10.4018/978-1-5225-1829-7.ch012

[BCh.01] Nicholas Ayres, Leandros Maglaras, Helge Janicke, "OSNs as cyberterrorist weapons against the general public", Chapter in Threat Mitigation and Detection of Cyber Warfare and Terrorism (Maximiliano E Korstanje) , IGI Global, November 2016, DOI: 10.4018/978-1-5225-1938-6.ch008

Technical Reports

[R.32] Apostolos Gerodimos, Leandros Maglaras, NIck Ayres, "IoT: Communication Protocols and Security Threats", Preprints 2021, DOI: 10.20944/preprints202111.0214.v1

[R.31] Ahmim Ahmed, Mohamed Amine Ferragm Leandros Maglaras, "ESIKE: An efficient and secure internet key exchange protocol", August 2021

[R.30] Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris, "A novel Two-Factor HoneyToken Authentication Mechanism", December 2020

[R.29] Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, "A Tutorial on Cross Site Scripting Attack - Defense", December 2020

[R.28] Fraser HallLeandros MaglarasTheodoros AivaliotisLoukas XagorarisIoanna Kantzavelou, "Smart Homes: Security Challenges and Privacy Concerns", October 2020

[R.27] Maria PapathanasakiGeorgios DimitriouLeandros MaglarasIsmini VasileiouHelge Janicke, "From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?", October 2020

[R.26] Stavros Kassaras, Leandros Maglaras, "ZKPs: Does This Make The Cut? Recent Advances and Success of Zero-Knowledge Security Protocols", June 2020

[R.25] Saqib, N.; Germanos, V.; Zeng, W.; Maglaras, L, "Mapping of the Security Requirements of GDPR and NIS", Preprints 2020, 2020060193

[R.24] Aliyu, A.; Maglaras, L.; He, Y.; Yevseyeva, I.; Boiten, E.; Cook, A.; Janicke, H., "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions",. Preprints 2020, 2020040420

[R.23] George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook and Helge Janicke, "A NIS Directive compliant Cybersecurity Maturity Model", April 2020

[R.22] Dimitrios Kosmanos, Savvas Chatzisavvas, Antonios Argyriou, Leandros Maglaras, "Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks", April 2020

[R.21] Vourgidis, I.; Maglaras, L.; Alfakeeh, A.S.; Al-Bayatti, A.H.; Ferrag, M.A. "A Prediction - Communication P2V Framework for Enhancing Vulnerable Road Users' Safety"Preprints 2020, 2020010017 DOI: 10.20944/preprints202001.0017.v1

[R.20] Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras, "Developing Cyber Buffer Zones", December 2018

[R.19] Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras, "RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks", December 2018

[R.18] Dimitrios Kosmanos, Antonios Argyriou, Leandros Maglaras, "Estimating the Relative Speed of RF Jammers in VANETs", December 2018

[R.17] Ahmed Ahmim, Leandros Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke, "A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models", December 2018

[R.16] Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke, “Blockchain Technologies for the Internet of Things: Research Issues and Challenges”, June 2018

[R.15] Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras “Developing Cyber Peacekeeping : Observation, Monitoring and Reporting”, June 2018

[R.14] Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras “An Introduction to Cyber Peacekeeping”, April 2018

[R.13] Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Athanasios V. Vasilakos, Stylianos Rallis, Helge Janicke, “Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues”, March 2018

[R.12] Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, and Helge Janicke, “Internet of Cloud: Security and Privacy issues”, October 2017

[R.11] Dimitrios Kosmanos, Leandros Maglaras, Michalis Mavrovouniotis, Sotiris Moschoyiannis, Antonios Argyriou, Athanasios Maglaras, Helge Janicke,“Route Optimization of Electric Vehicles based on Dynamic Wireless Charging”, October 2017

[R.10] Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, and Helge Janicke, “Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes”, August 2017

[R.09] Chapman, S.; Smith, R.; Maglaras, L.; Janicke, H. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?. Preprints 2017, 2017060119 (doi: 10.20944/preprints201706.0119.v1)

[R.08] Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke, Jianmin Jiang, “Authentication Protocols for Internet of Things: A Comprehensive Survey”, December 2016

[R.07] Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke, Jianmin Jiang, “A Survey on Privacy-preserving Schemes for Smart Grid Communications”, November 2016

[R.06] Mohamed Amine Ferrag, Leandros A. Maglaras, Ahmed Ahmim, "Privacy Preserving schemes for Ad Hoc Social Networks: A Survey", October 2016

[R.05] Steve Harrison, Antonis Tzounis, Leandros A. Maglaras, Francois Siewe, Richard Smith, Helge Janicke, "A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development", April 2016

[R.04] Mark Evans, Leandros A. Maglaras, Ying He, helge Janicke, " Human Behaviour as an aspect of Cyber Security Assurance", January 2016

[R.03] Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz, "Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems", July 2015

[R.02] Pavlos Basaras, Leandros Maglaras, Dimitrios Katsaros, Helge Janicke, "A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks", June 2015

[R.01] Athanasios Maglaras, Trifon Kousiouris, Frangiskos Topalis, Dimitrios Katsaros, Leandros A. Maglaras, Konstantina Giannakopoulou, "Method of Controlling Corone Effects and breakdown Voltage of small air gaps stressed by Impulse Voltages", October 2014⁹

Research interests/expertise

  • Cyber Security
  • Privacy Preservation
  • Risk Management
  • Routing protocols
  • Vehicular networks
  • Social Network Analysis
  • Power electronics

Qualifications

Ph.D. - Department of Informatics, School of Computing and Engineering, University of Huddersfield, 2018

Thesis: "Intrusion Detection in SCADA systems using machine learning techniques", supervised by Prof. Andrew Crampton

Postdoc - Department of Computing

University of Surrey, U.k. 2014

Cyber security of critical infrastructures (CIs), with Professor Jianmin Jiang

Phd - Department of Electrical and Computer Engineering

University of Thessaly, Greece 2014

Thesis "Message dissemination in Vehicular Ad Hoc Networks", supervised by Prof. L. Tassiulas and Ass. Prof. Dimitrios Katsaros

MSc in Computer Science (9.06/10 - second best overall degree)

University of Thessaly, Greece  2008 

MSc in Industrial Production and Management (9.36/10 - best overall degree)

University of Thessaly, Greece 2004

Thesis: “Approximation Method for the estimation of throughput of Fork/Join Stations", supervised by Prof. G. Liberopoulos

MSc, BSEE in Electrical and Computer engineering (7.07/10)

University of Thessaloniki, Greece 1998

Thesis “Network topology, analysis reliability calculation”, supervised by Prof. I.M. Kontoleon

Courses taught

A. De Montfort University

A1. PostGraduate

2015 - 2021 Advanced Research Topics in Cyber Technology / Advanced Topics in Forensics & Security (Module Leader)

2019 - 2021 Emerging Topics in Cyber Security (Module Leader)

2020/2022 Cyber Threat Intelligence & Incident Response

2019/2020 Agile Methods and Development

2018/2019 Communications Engineering (Module Leader)

2018/2019 Embedded Systems (Module Leader)

2015/2016 Host And Network Security

2015/2016 Cyber Engineering

A2. Undergraduate

2015/2016 Advanced Topics in Security (Module Leader)

 

B. University of West of Attika

B.1 PostGraduate

2019/2020 Network Security

B.2 Undergraduate

2019/2021 Cryptography (Module Leader)

2019/2020 Information Security

 

C. University of Thessaly

C1. PostGraduate

2019/2020 Computer Security Fundamentals (Module Leader)

2020/2021 Cryptography (Module Leader)

C2. Undergraduate

2001-2005 Circuit Analysis and Design

2002-2007 Programming with Visual Basic (Module Leader)

2002-2003 Electromechanical Installations

 

D. Aristotle University of Thessaloniki

D1. Undergraduate

1999-2000 Systems Reliability

 

E. International Hellenic University

E1. Undergraduate

2000-2001 Computer Graphics

2000-2001 Computer programming II (Module Leader)

2000-2001 Programming methodologies

Membership of professional associations and societies

Institute of Electrical and Electronics Engineers - IEEE
Senior Member  -

The Institution of Engineering and Technology - The IET
Member -  

European Alliance of Innovation (EAI)
Member - May 2012

Technical Chamber of Greece (TEE)
– Present

The Science and Information Organization (SAI)
Member - April 2013 

Projects

 [Add Projects here] 

Conference attendance

Talks- Media

[T. 54] Invited Speaker, "Cybersecurity & Sustainability", Global Sustainability Forum, Athens, 8 October 2021

[T.53] Invited Speaker, "Security and Privacy Challenges in Emerging Fog Computing applications", IEEE World Forum on Internet of Things (WF-IoT 2021)

[T.52] Tutorial, "Novel Two Factor Authentication Mechanisms", WiCON, 10 August 2021

[T.51] Distinguished Speaker, "Novel Two Factor Authentication Mechanisms", IEEE Information Theory Society, Bangalore Chapter, 8 March 2021

[T.50] Safer wireless charging for connected electric vehicles, CORDIS scientific advances, January 2021

[T.49] A novel Cybersecurity Assessment Framework (CMAF), CONCORDIA blog, January 2021

[T.48] "Security and Privacy Issues in Fog Computing", 2nd IEEE Comsoc winter school on Fog/Edge Computing 2020, 29-30 December 2020

[T.47] "Blockchain Technology: Security and Privacy Issues", International Webinar on Blockchain Technology and Innovation in Business Process, 21 November 2020, IRNet

[T.46] Cybersecurity and Digital Transformation, FOSSCOMM (Free and Open Source Software Communities Meeting) 2020, 21 – 22 Νοεμβρίου 2020

[T.45] Interview (Elsevier), Securing a dynamic wireless charging system for electric vehicles , June 2020

[T.44] M. Papathanasaki, L. Maglaras, “The Current Posture of Cyber Warfare and Cyber Terrorism”, Global Foundation for Cyber Studies and Research, June 2020

[T.43] Session on Cybersecurity, eProfEng, “Computer Engineering Training Seminar @NTUA”, 20-24 January 2020

[T.42] Policy Paper, "Cyber Peacekeeping from Concept To Implementation", M Robinson, K Jones, H Janicke, L Maglaras, Global Foundation for Cyber Studies and Research, September 2019

[T.41] Tutorial, "Cyber security of critical infrastructures", 15th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, August 19-22, 2019, London, UK

[T.40] Keynote Speaker, "Protection of Critical National Infrastructures", 18th European Conference on Cyber Warfare and Security, July 4-5 2019, Coimbra

[T.39] "The Greek NIS Law: Implementation steps and the way ahead", OWASP workshop, Athens, 10 June 2019

[C.38] "National Cyber Security Strategy", 5th Risk and Business Continuity ForumRESILIENCE DAYS, Athens, 29 May, 2019

[T.37] "Risks, threats and challenges of Cyberspace", 7th Exposec-Defenseworld Conference, 7 May 2019, Hellenic Armed Forces Officers' Club (LAED), Athens

[Τ.36] "Cybersecurity posture of Greece and the NIS directive", Secure Digital Government, 19 April 2019, Innovation and Best Practices Unit

[T.35] "Critical Infrastructure Protection and the NIS Directive", 6th High-level Greek Conference on Modern Technologies and New Forms of War, 27 March 2019, Institute of International Relations (IDIS), Panteion University, Athens

[T.34] "Cyber Security Strategy of Greece: the way ahead", 2nd SAINT workshop, 22 March 2019, NCSR Demokritos, Institute of Informatics & Telecommunications

[T.33] "Protection of Critical Infrastructures - NIS directive", Cyber security workshop, 20 March 2019, EKDAA

[T.32] "Paving the way to the future: government - building a national policy", Taking Cybersphere to the next level, the economist events, 18 March 2019, Frand Hyatt, Athens

[T.31] Keynote talk, "Dynamic Wireless Charging of Electric Vehicles on the Fly", International Conference on Innovative Applied Energy (IAPE’19), 14-15 March, 2019, University of Oxford, United Kingdom

[T.30] "Intrusion Detection in Industrial Control Systems", conference in Cybersecurity in Industry, Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS), 28 February 2018, Leicester, UK

[T.29] "National cyber/ICT security updates, threats to inter-state relations stemming from the use of ICTs and good practices for regional co-operation", OSCE sub-regional training, Athens, 7-8 February 2019 [Poster CONCORDIA]

[T.28] "Cyber Security and Ethics", Hellenic Society of International Law Annual meeting, December 22 2018, Panteion University, Athens

[T.27] "European Landscape in Cybersecurity", conference on Surveillance Society - From Cyber-Security to Fake News: Media, Messages, Strategies, University of Piraeus, Athens, 27 November 2018

[T.26] "Threats, Protection and Attribution of Cyber Attacks on National Critical Infrastructures", Seminar on the new security environment and the protection of information, Ministry of Foreign Affairs, Athens, 5 November 2018

[Τ.25] "Horizontal issues in CSDP missions and operations: Cyber Security", European Security & Defence College Common Security and Defence Policy (CSDP) Orientation Course, Athens, 15-19 October 2018.

[T.24] "A Review of the Current Cyber Security Posture of Europe’s Critical Infrastructure", 5th CS4CA Europe Summit, London, 2-3 October 2018

[T.23] "Cyber sSecurity: From regulations\policies to practice", EKDAA Workshop on Cyber Security and Public Administration, Athens, 24/9/2018

[T.22] Keynote Speaker, "Cyber security: From regulations\policies to practice", ENISA NIS Summer School, Heraklion, 24/9/2018

[T.21] "Cyber Security: From Regulations\Policies to Practice", Workshop ATEITHE, Thessaloniki, 2 July 2018

[T.20] "Cyber Security: From Regulations\Policies to Practice", OSCE sub-regional training, Bucharest, 27-28 June 2018

{T.19] "GDPR in Greece", radio 24/7, 25 May, 2018

[T.18] "Cyber Security in Greece - current situation, challenges and the way ahead", ESDF 2018, Athens, 12 May 2018

[T.17] "Cyber Security in Greece", ADAE workshop, Athens, 08 May 2018

[T.16] "Cyber Security in Greece", OWASP workshop, Athens, 24 April 2018

[T.15] "Cyber Security in Greece", E-government forum, Athens, 22 March 2018

[T.14] "Connecting Europe Facility in Greece: current and future challenges", ELRC workshop, Athens, 18 October 2017

[T.13] "Smart Cities and digital transformation", Workshop on Standards for Sustainable and Smart Cities, Athens, 13 October 2017

[T.12] ”How To Charge Your Electric Car ‘On The Fly", Brinknews, 07 April, 2017

[T.11] "Security in Cyber Physical Systems", CN Group seminar,TU WIEN, 09 January 2017

[T.10] "Message Dissemination and Security issues in Vanets", STRL group seminar, De Montfort University, 10/2016

[T.09] "Low cost architecture with M2M Communication will be the future", EAI Blog, April 2016

[T.08] "Dynamic Wireless Charging of Vehicles En Route", IEEE Transportation Electrification Community March 2016 eNewsletter

[T.07] "Message Dissemination and Security issues in Vanets", MSF group seminar, University of Surrey, 04/2015

[T.06] "Integrated detection mechanism", Electronics Letters, 2014, 50, (25), p 1890-1890, DOI: 10.149/el.2014.4062

[T.05] "Integrated detection mechanism", Efficiency of electric grids under cyber-attacks on their SCADA workshop, Rome 16 December 2014

[T.04] "Integrated detection mechanism", SCADA Cybersecurity workshop, Bucharest 16 September 2014

[T.03] "Intrusion Detection in SCADA systems - CockPitCi project", WASET international Conference on Artificial Intelligence and Data Mining (ICAIDM), London, 26-27 May 2014 (Keynote speaker)

[T.02] "Message dissemination in vehicular ad-hoc networks", MSF group seminar, University of Surrey, 05/2014

[T.01] "Attributes extracted from network traces", 3rd CockpitCI workshop, Luxembourg, 03/2014

Current research students

Ph.D. Students ongoing supervision

Ioannis Vourgidis, "Looking Around Corners: Making Roads Safer for the Vulnerable" (1st Supervisor)

Eyotor Ihama "An Autonomous Deep Learning Predictive System for the Network Attack Detection of an IoT Enabled System" (2nd Supervisor)

Eirini Kalaitzopoulou, "Digital Transformation in Higher Education: The use and effects of Learning Analytics on assessment and feedback" (2nd Supervisor)

Chandrima Rodrigo, "Human Factors in Cybersecurity" (2nd Supervisor)

Giddeon Angafor, "A Framework for Conducting Collaborative Tabletop Incident Response Exercises" (2nd Supervisor)

Ilias Spyridon Efthymiopoulos, "Miter attack and def3nd model for apt" (2nd Supervisor)

Vasilis Papaspirou, "Two Factor HoneyToken Authentication" (2nd Supervisor)

Nestoras Houliaras, "Design and development of an ideal educational cyber range" (2nd supervisor)

Participated in Ph.D. dissertation supervision

Mark Evans, "Methodologies for information assurance used in the public sector"

Shaimaa Nafea, "Adaptive learning management System using Ontology"

Allan Cook, "Industrial Control System Risk management"

Raphael Riebl, "Performance tests for Vehicular Ad Hoc Networks"

Sadir Fadhil, "Context-aware overtaking assistant system"

Dennis Bohmlander " Innovative crash-sensing architectures"

Adebamigbe (Alex) Fasanmade, "Autonomous Agent Security in mobile and Wireless Network"

Participation in Ph.D. committees

HAN Xiao, "Mining User Similarity in Online Social Networks:Analysis, Modeling and Applications", Telecom SudParis, 05/2015

Reza Farahbakhsh, "Profiling professional and regular users on popular Internet services based on Implementation of large scale Internet measurement tools", Telecom SudParis, 05/2015

M.Sc. Theses supervised

Lakshmi Sai Tejaswini Sarnala, "SQL injection attacks and countermeasures" (ongoing)

Santhosh Sundara Moorthy, "Cyber Security in the Banking Sector" (06/2020)

Najmudin Saqib, "The Interplay Between the NIS Directive and the GDPR", (03/2020)

Pooja Patoliya, "CIS and Cyber Security", (01/2020)

Devanshu Patel, "Social Media and other people's privacy", (06/2019)

Charnmongkol Somsup, "A study of concerned perspective towards automated cars", (06/2019)

Yash Soni, "Blockchain based voting system", (06/2019)

Muhammad Ahmed, "Cyber Threats in Healthcare sector", (06/2019)

Virendra Vyas, "Effectiveness of Security measures on Cloud Computing", (06/2019)

Robert Alexander, "Security analysis of smart home entry systems", (07/2016)

Jacqui Cope, "A framework for minimizing Data Leakage from non Production systems", (08/2016)

Steve Harisson, "Security Testing Framework for an HMG Agile Software Development Project", (01/2016)

Rajan Kumar, "Challenges to Cyber Security", (10/2015)

Nickolas Ayres,"The mimetic virus : A vector for Cyber terrorism", (09/2015)

Nasreen Iqbal, "Advancing HRMS with Cloud Cmputing", (08/2015)

Najlaa Almajed, "Prevention of crime in B2C E-Commerce", (06/2015)

 

Externally funded research grants information

[2021-2022] Resilient Communications for autonomous transport [BA UK- PI] The project will focus on securing autonomous transport. The main focus will be to adapt the SecurityOperation Center (SOC) concept for detecting, understanding, and responding to attacks on vehicles, airplanes, and vessels and connected mobility infrastructure (e.g. WiFi, 5G, etc). The project will define measurable aspects of a SOC that can be optimized during a SOC’s development, exercised, and reevaluated regularly to ensure ongoing effectiveness. This will be important for manufacturers to report to authorities about their operational capabilities. Finally, the project will build more resilient communications within the automated nodes themselves, recognizing that the SOC model might be too slow to detect and react to safety-related incidents before it is too late.

[2020-2021] Security Maturity Assessment Framework for Saudi Organizations [PSU SA - CoI]. This project aims at designing a security maturity assessment framework for organizations in Saudi Arabia. The framework can be used as a self-assessment tool by the organization in order to establish the security level and highlight the weaknesses and mitigation plans that need to be implemented. The framework will be mapping and codification tool for organizations against all regulations that the Saudi organizations must comply to (e.g. CITC’s CRF or NCA’s ECC).

[2020] MAF for HEIs [NCSC UK- PI] The project aims at designing a cyber security maturity assessment framework for all HEIs in the UK. The framework can be used as a self-assessment tool by the HEI organization in order to establishthe security level and highlight the weaknesses and mitigation plans that need to be implemented. The framework will be mapping and codification tool for HEIs against all regulations that the HEIs must comply to (GDPR, PCI DSS, DSPT etc).The framework will use 6 different levels of maturity against which the cyber security performance of each organization can be measured. The framework can also be adapted in order to be applied to other sectors, e.g. energy. The framework will be validated through 3 pilot implementations. HEIs, by using this framework will be able to assess the security level of their organization, conduct a gap analysis and create a mitigation plan.

[2019-2022] CONCORDIA[H2020 -PI] positions the CONCORDIA ecosystem, a Cybersecurity Competence Network with leading research, technology, industrial and public competences to build the European Secure, Resilient and Trusted Ecosystem, with the CODE research institute in Munich to act as the coordinating center, and ENISA as secretary. CONCORDIA will strongly liaise with ENISA to leverage its expertise and knowledge with ENISA being the interface to other cybersecurity actors and networks within the EU institutional framework and with established industry networks in the private sector, and playing the role of a secretariat(in a similar fashion to the way it offers secretariat functions to the CSIRT Network). Munich, as decided by the EC to be Europe’s top technology hub, gives the perfect ICT environment for CODE to be central hub of the network.

[2017-2019] By adopting a user-centred approach, FLOURISH[Innovate UK -CoI] achieved a better understanding of consumer demands and expectations, including the implications and challenges of an ageing society. FLOURISH addressed vulnerabilities in the technology powering CAVs, with a focus on the critical areas of cyber security and wireless communications. The project was trialled in the Bristol and South Gloucestershire region and was part funded from the Government’s £100 million Intelligent Mobility Fund, which is administered by the Centre for Connected and Autonomous Vehicles (CCAV) and delivered by the UK’s Innovation Agency, Innovate UK. DMU was a subcontractor for the task of identification of security breaches in the network through anomaly detection and pattern recognition methods.

(2013-2017) FastPass[FP7 -CoI] established and demonstrated a harmonized, modular approach for Automated Border Control (ABC) gates. FastPass brings together key players of the entire ABC value chain - system and component producers, research institutions, governmental authorities and end-users.

(2012-2014) CockpitCI[FP7 -CoIaimed to improve the resilience and dependability of Critical Infrastructures (CIs) by the automatic detection of cyber-threats and the sharing of real-time information about attacks among CI owners. CockpitCI aimed to identify, in real time, the CI functionalities impacted by cyber-attacks and assess the degradation of CI delivered services. CockpitCI aimed to classify the associated risk level, broadcast an alert at different security levels and activate a strategy of containment of the possible consequences of cyber-attacks. CockpitCI aimed to leverage the ability of field equipment to counteract cyber-attacks by deploying preservation and shielding strategies able to guarantee the required safety

(2012) Optithesi's basic scopes were to investigate the optimization and the prediction of the dielectric behavior of especially air gaps, based on the effects of Ground, Corona Current, and Barrier, and the use of theoretical and simulation analysis. To reform the Corona Current Rule, concerning the Corona Current Effect and the effort to advance it in to a theorem after it is mathematically proven.

(2011-2014) Reduction[FP7-CoI] followed an interdisciplinary approach bringing together expertise from several communities, such as: Data collection and management, which develop the mechanisms for handling the large volumes of streaming data; Data Mining/Machine Learning, which are responsible for developing decentralized algorithms for predictive analytics; Wireless Networks, for developing protocols for effective vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications; Vehicle electronics, which develop the on board computing and sensor devices; Transportation engineering, which are involved in the evaluation of the system and the data generated during the field-trials.

C4C[FP6-CoI] aimed at developing control for coordination of distributed systems for five case studies with respect to control theory, communication networks and computation. Impacts were envisioned on environmental quality, transportation, and on the markets of new technology in the EU countries.

ISLE-PACT was committed to developing Local Sustainable Energy Action Plans and a pipeline of bankable projects with the aim of meeting or exceeding the EU sustainability target of reducing CO2 emissions by at least 20% by the year 2020. The project's duration is 34 months, 1 February 2010 – 30 November 2012.

Smilegov was built on the idea that cooperation between different levels of governance of islands (i.e. National, regional, local) can have a key role to play towards reaching the 20-20-20 EU goals in the area of energy and climate change. SMILEGOV, based on success stories and close European cooperation will strengthen local capacity and work towards theimprovement of multilevel cooperation in European islands aiming to facilitate the implementation of their Sustainable Energy Action Plans towards the EU 20-20-20 goals.

 

Professional esteem indicators

Books

[B.01] Leandros Maglaras, Ioanna Kantzavelou, "Cybersecurity Issues in Emerging Technologies", CRC Press, 2021

Editorials

[E.07] Kevin Jones, Helge Janicke, Leandros Maglaras, Christos Xenakis ”Introduction to the Special Issue on Industrial Control Systems Cyber Security”, Journal of Information Security and Applications (Elsevier), 2020, DOI: 10.1016/j.jisa.2020.102542

[E.06] Leandros Maglaras, Lei Shu, Athanasios Maglaras, Jianmin Jiang, Helge Janicke, Dimitrios Katsaros, Tiago J. Cruz, “Introduction to the Special Issue on ”Industrial Internet of Things (I2oT)”, Journal of ACM/Springer Mobile Networks & Applications (MONET), Vol.23, Issue 4, August 2018, DOI 10.1007/s11036-017-0937-3

[E.05] Leandros Maglaras, Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Artemios Voyiotzis, Athanasios Maglaras, Haewoon Nam, Pavlina Fragkou, Tiago Cruz, "SI: CI & Smart Grid Cyber Security", ICT Express (Elsevier), Volume 4, Issue 1, Pages 1-54, march 2018

[E.04] Sencun Zhu, Kevin Jones, Leandros Maglaras, "Defense Mechanisms for Public Systems", EAI Transactions on Security and Safety, January 2018, DOI: 10.4108/eai-4-12018.153524

[E.03] Sencun Zhu, Kevin Jones, Leandros Maglaras, "Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems", EAI Transactions on Security and Safety, December 2017, DOI:10.4108/eai.28-12.2017-153514

[E.02] Kevin Jones, Helge Janicke, Christian Facchi, Leandros Maglaras, ”Introduction to the Special Issue on ICS & SCADA Cyber Security”, Journal of Information Security and Applications (Elsevier), July 2017, DOI: 10.1016/j.jisa.2017.05.009

[E.01] Helge Janicke, Kevin Jones, Leandros Maglaras, “Security, Privacy and Trust in Cyber Physical Systems”, EAI Transactions on Security and Safety, Volume 3, Issue 7, December 2016, DOI: 10.4108/eai.8-12-2016.151724

Edited Proceedings

[P.02] Jones, K., Janicke, H., Brandstetter, T., & Maglaras, L. A. (2019). 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR 2019), BCS Learning & Development, DOI: 10.14236/ewic/ICSCSR2019.0

[P.01] Leandros A. Maglaras, Helge Janicke, and Kevin Jones, eds. Industrial Networks and Intelligent Systems: Second International Conference, INISCOM 2016, Leicester, UK, October 31–November 1, 2016, Revised Selected Papers. Vol. 188. Springer, 2017, DOI: 10.1007/978-3-319-52569-3

Member of the Editorial Board

IEEE Access

Elsevier Array

Elsevier ICT Express

Emerald Continuity & Resilience Review

Inderscience International Journal of Internet Technology and Secured Transactions

Journal of Information Processing Systems (JIPS)

Hindawi -WILEY Security and Communication Networks

IGI International Journal of Smart Security Technologies (IJSST)

IGI International Journal of Cyber Warfare and Terrorism (International Advisory Board)

MDPI Conputers

MDPI IoT

EAI Transactions on Security and Safety - Co-Editor in Chief (2016-2019)

EAI Transactions on Industrial Networks and Intelligent Systems

EAI Transactions on e-Learning (2017-2020)

IGI International Journal of Vehicular Telematics and Infotainment Systems

IGI International Journal of Smart Vehicles and Smart Transportation

IGI International Journal of Information Security and Privacy

 

Editor (Guest Editorials, Proceedings, Book....)

Lead Guest Editor, "Smart Electric Vehicles: Optimization, Security and Privacy Issues", MDPI Energies, 2020

Lead Guest Editor, "Cyber Security of Critical Infrastructures", MDPI Applied Sciences, 2020

Guest Editor, "Intelligent Transportation and Vehicular Ad Hoc Networks", MDPI Electronics, 2021

Guest Editor, "Selected Papers from the International Conference on Internet of Things and Intelligent Applications (ITIA2020)", MDPI Sensors 2021

Lead Guest Editor, "ICS & SCADA cyber security", Journal of Information Security and Applications (Elsevier), 2019

Lead Guest Editor, "Cyber Security of Critical Infrastructures", EAI Transactions on Security and Safety, 2018

Lead Guest Editor, “CI & Smart Grid Cyber Security”, Elsevier ICT Express, 2018

Guest Editor, ”Recent and advanced intrusion detection systems for current and modern networks and systems” International Journal of Information Security and Privacy (IJISP), IGI-Global, 2017

Guest Editor, “CI & Smart Grid Cyber Security”, Transactions on Industrial Networks and Intelligent Systems (EAI), 2016

Guest Editor, "ICS & SCADA cyber security", Journal of Information Security and Applications (Elsevier), 2016

Lead Guest Editor, "Industrial Internet of Things (I2oT)", ACM/Springer Mobile Networks & Applications (MONET), 2016

 

Conference Organization

Conference General Co-Chair: 6th International Symposium for ICS & SCADA Cyber Security, Athens, September 2019

Conference General Chair: 2nd International Conference on Industrial Networks and Intelligent Systems (INISCOM 2016)

Track Co-chair," Security issues on Internet of things and intelligence", International Conference on Internet of Things and Intelligent Applications, 27-29 November, 2020 // Zhenjiang, China

Track Co-Chair, "Security", First International Conference of Smart Systems and Emerging Technologies (SmartTech’20), Riyadh-Saudi Arabia, November 3-5, 2020

Track Chair: Automotive CE Applications (CEA), IEEE ICCE, January, 11-13, 2019, Las Vegas, USA.

Session Co-chair: Automation Systems and Critical Infrastructures, 16th IEEE International Conference on Factory Communication Systems, 27-29/04/2020, Porto, Portugal

Session Co-Chair: Cyber Security of Critical Infrastructures, ICSIMAT 2018, 17-20 October 2018, Athens, Greece

Symposium Co-Chair: Advances in Industrial Networks and Intelligent Systems (AINIS) Symposium - 13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017)

Track Co-Chair: Security and Trustworthy Track- 13th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom 2017)

Track Co-Chair: Ad hoc and Pervasive Networks track - 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2017)

Publicity co-chair: 22nd Conference on Innovation in Clouds, Internet and Networks (ICIN 2019)

Leandros