George Loukas
TitleCited byYear
A self-aware approach to denial of service defence
E Gelenbe, G Loukas
Computer Networks 51 (5), 1299-1314, 2007
1422007
Protection against denial of service attacks: A survey
G Loukas, G Öke
The Computer Journal 53 (7), 1020-1037, 2010
1262010
A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing
G Sakellari, G Loukas
Simulation Modelling Practice and Theory 39, 92-103, 2013
1152013
Cyber-Physical Attacks: A Growing Invisible Threat
G Loukas
Butterworth-Heinemann, 2015
912015
Emergency response simulation using wireless sensor networks
A Filippoupolitis, L Hey, G Loukas, E Gelenbe, S Timotheou
Proceedings of the 1st international conference on Ambient media and systems, 21, 2008
912008
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
R Heartfield, G Loukas
ACM Computing Surveys (CSUR) 48 (3), 37, 2016
862016
Detecting denial of service attacks with bayesian classifiers and the random neural network
G Oke, G Loukas, E Gelenbe
2007 IEEE International Fuzzy Systems Conference, 1-6, 2007
572007
A denial of service detector based on maximum likelihood detection and the random neural network
G Öke, G Loukas
The Computer Journal 50 (6), 717-727, 2007
552007
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios
S Timotheou, G Loukas
Proceedings of the 2009 ACM symposium on Applied Computing, 1171-1175, 2009
532009
An autonomic approach to denial of service defence
E Gelenbe, M Gellman, G Loukas
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
382005
Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning
G Loukas, T Vuong, R Heartfield, G Sakellari, Y Yoon, D Gan
IEEE Access 6 (1), 3491-3508, 2017
352017
Decision Tree-based Detection of Denial of Service and Command Injection attacks on Robotic Vehicles
T Vuong, G Loukas, D Gan, A Bezemskij
7th International Workshop on Information Forensics and Security (IEEE WIFS …, 2015
342015
You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks
R Heartfield, G Loukas, D Gan
IEEE Access, 2016
302016
A review of cyber threats and defence approaches in emergency management
G Loukas, D Gan, T Vuong
Future Internet 5 (2), 205-236, 2013
272013
Emergency response systems for disaster management in buildings
A Filippoupolitis, G Loukas, S Timotheou, N Dimakis, E Gelenbe
North Atlantic Treaty Organization (NATO), Research and Technology …, 2009
272009
Performance evaluation of cyber-physical intrusion detection on a robotic vehicle
T Vuong, G Loukas, D Gan
13th International Conference on Pervasive Intelligence and Computing (IEEE …, 2015
262015
Robotic wireless network connection of civilians for emergency response operations
G Loukas, S Timotheou, E Gelenbe
2008 23rd International Symposium on Computer and Information Sciences, 1-6, 2008
242008
Defending networks against denial-of-service attacks
E Gelenbe, M Gellman, G Loukas
Unmanned/Unattended Sensors and Sensor Networks 5611, 233-243, 2004
232004
Bluetooth Low Energy based Occupancy Detection for Emergency Management
A Filippoupolitis, W Oliff, G Loukas
15th International Conference on Ubiquitous Computing and Communications (IUCC), 2016
222016
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
R Heartfield, G Loukas
Computers & Security, 2018
192018
The system can't perform the operation now. Try again later.
Articles 1–20