User profiles for Eirini Anthi
Dr Eirini AnthiCybersecurity Lecturer, Cardiff University Verified email at cardiff.ac.uk Cited by 1414 |
A supervised intrusion detection system for smart home IoT devices
E Anthi, L Williams, M Słowińska… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The proliferation in Internet of Things (IoT) devices, which routinely collect sensitive information,
is demonstrated by their prominence in our daily lives. Although such devices simplify …
is demonstrated by their prominence in our daily lives. Although such devices simplify …
[HTML][HTML] Adversarial attacks on machine learning cybersecurity defences in industrial control systems
The proliferation and application of machine learning-based Intrusion Detection Systems (IDS)
have allowed for more flexibility and efficiency in the automated detection of cyber attacks …
have allowed for more flexibility and efficiency in the automated detection of cyber attacks …
Pulse: an adaptive intrusion detection for the internet of things
The number of diverse interconnected Internet of Things (IoT) devices keeps increasing
exponentially, introducing new security and privacy challenges. These devices tend to become …
exponentially, introducing new security and privacy challenges. These devices tend to become …
EclipseIoT: A secure and adaptive hub for the Internet of Things
With the proliferation in the quantity and types of devices that may be included in an Internet
of Things (IoT) ecosystem, particularly in the context of a smart home, it is essential to …
of Things (IoT) ecosystem, particularly in the context of a smart home, it is essential to …
Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics in …
Multiple governmental agencies and private organisations have made commitments for the
colonisation of Mars. Such colonisation requires complex systems and infrastructure that …
colonisation of Mars. Such colonisation requires complex systems and infrastructure that …
[HTML][HTML] Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks
Abstract Machine learning based Intrusion Detection Systems (IDS) allow flexible and efficient
automated detection of cyberattacks in Internet of Things (IoT) networks. However, this …
automated detection of cyberattacks in Internet of Things (IoT) networks. However, this …
Definition of Internet of Things (IoT) Cyber Risk–Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and …
The Internet-of-Things (IoT) enables enterprises to obtain profits from data but triggers data
protection questions and new types of cyber risk. Cyber risk regulations for the IoT however …
protection questions and new types of cyber risk. Cyber risk regulations for the IoT however …
Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review
The widespread adoption of cloud-based and public legitimate services (CPLS) has inadvertently
opened up new avenues for cyber attackers to establish covert and resilient command-…
opened up new avenues for cyber attackers to establish covert and resilient command-…
Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge
We explore the potential and practical challenges in the use of artificial intelligence (AI) in
cyber risk analytics, for improving organisational resilience and understanding cyber risk. The …
cyber risk analytics, for improving organisational resilience and understanding cyber risk. The …
[HTML][HTML] Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication
Industrial Cyber-Physical Systems (ICPS) are highly dependent on Supervisory Control and
Data Acquisition (SCADA) for process monitoring and control. Such SCADA systems are …
Data Acquisition (SCADA) for process monitoring and control. Such SCADA systems are …