Automated behavioral analysis of malware: A case study of wannacry ransomware

Q Chen, RA Bridges - 2017 16th IEEE International Conference …, 2017 - ieeexplore.ieee.org
Ransomware, a class of self-propagating malware that uses encryption to hold the victims'
data ransom, has emerged in recent years as one of the most dangerous cyber threats, with …

Gryphon: a semi-supervised anomaly detection system based on one-class evolving spiking neural network

K Demertzis, L Iliadis, I Bougoudis - Neural Computing and Applications, 2020 - Springer
The backbone of the economy, security and sustainability of a state is inseparably linked to
the security of its critical infrastructure. Critical infrastructures define goods, systems or …

A spiking one-class anomaly detection framework for cyber-security on industrial control systems

K Demertzis, L Iliadis, S Spartalis - … 2017, Athens, Greece, August 25–27 …, 2017 - Springer
Developments and upgrades in the field of industrial information technology, particularly
those relating to information systems' technologies for the collection and processing of real …

An internal intrusion detection and protection system by using data mining and forensic techniques

FY Leu, KL Tsai, YT Hsiao, CT Yang - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
Currently, most computer systems use user IDs and passwords as the login patterns to
authenticate users. However, many people share their login patterns with coworkers and …

Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA

AS Desai, DP Gaikwad - 2016 IEEE international conference on …, 2016 - ieeexplore.ieee.org
In Internet-based communication, different types of networks are used to provide services to
users. Due to exploration of different types of vulnerabilities, day by day threat of attacks in …

A computational intelligence system identifying cyber-attacks on smart energy grids

K Demertzis, L Iliadis - Modern discrete mathematics and analysis: with …, 2018 - Springer
According to the latest projections of the International Energy Agency, smart grid
technologies have become essential to handling the radical changes expected in …

DDoS attack volume forecasting using a statistical approach

D Kwon, H Kim, D An, H Ju - 2017 IFIP/IEEE Symposium on …, 2017 - ieeexplore.ieee.org
In this paper, we propose a proactive security method that estimates distributed denial of
service (DDoS) attack volume in order to overcome the limitation of the response time of …

[PDF][PDF] Cognitive web application firewall to critical infrastructures protection from phishing attacks

K Demertzis, L Iliadis - Journal of Computations & Modelling, 2019 - scienpress.com
Phishing scams and attacks attempt to trick people into providing sensitive personal
information such as account login credentials, credit card numbers, banking details and …

Towards autonomic security management of healthcare information systems

Q Chen, J Lambright… - 2016 IEEE First …, 2016 - ieeexplore.ieee.org
With the fast development of information and communication technologies over the past
decade, Healthcare Information Technology (HIT) has been widely implemented for health …

Toward realizing self-protecting healthcare information systems: Design and security challenges

Q Chen - Advances in Computers, 2019 - Elsevier
This book chapter reviews the history of Healthcare Information Systems (HISs), discusses
recent cyber security threats affecting HISs, and then introduces the autonomic computing …