Cloud-based cyber-physical intrusion detection for vehicles using deep learning G Loukas, T Vuong, R Heartfield, G Sakellari, Y Yoon, D Gan Ieee Access 6, 3491-3508, 2017 | 309 | 2017 |
Decision tree-based detection of denial of service and command injection attacks on robotic vehicles TP Vuong, G Loukas, D Gan, A Bezemskij 2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015 | 104 | 2015 |
You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks R Heartfield, G Loukas, D Gan IEEE Access 4, 6910-6928, 2016 | 97 | 2016 |
Performance evaluation of cyber-physical intrusion detection on a robotic vehicle TP Vuong, G Loukas, D Gan 2015 IEEE International Conference on Computer and Information Technology …, 2015 | 72 | 2015 |
Wireless LAN security threats & vulnerabilities M Waliullah, D Gan International Journal of Advanced Computer Science and Applications 5 (1), 2014 | 63 | 2014 |
A review of cyber threats and defence approaches in emergency management G Loukas, D Gan, T Vuong Future Internet 5 (2), 205-236, 2013 | 59 | 2013 |
Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian networks A Bezemskij, G Loukas, D Gan, RJ Anthony 2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017 | 56 | 2017 |
Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle A Bezemskij, G Loukas, RJ Anthony, D Gan 2016 15th international conference on ubiquitous computing and …, 2016 | 53 | 2016 |
Physical indicators of cyber attacks against a rescue robot T Vuong, A Filippoupolitis, G Loukas, D Gan 2014 IEEE International Conference on Pervasive Computing and Communication …, 2014 | 52 | 2014 |
Social networking privacy—Who’s stalking you? D Gan, LR Jenkins Future Internet 7 (1), 67-93, 2015 | 33 | 2015 |
A taxonomy of cyber attack and defence mechanisms for emergency management networks G Loukas, D Gan, T Vuong 2013 IEEE International Conference on Pervasive Computing and Communications …, 2013 | 30 | 2013 |
Cyber security countermeasures to combat cyber terrorism L MacKinnon, L Bacon, D Gan, G Loukas, D Chadwick, D Frangiskatos Strategic intelligence management, 234-257, 2013 | 25 | 2013 |
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks R Heartfield, G Loukas, D Gan 2017 IEEE 15th international conference on software engineering research …, 2017 | 24 | 2017 |
Social engineering in the internet of everything D Gan, R Heartfield Cutter IT Journal 29 (7), 20-29, 2016 | 22 | 2016 |
Traffic policing in ATM networks with multimedia traffic: the super leaky bucket D Gan, S McKenzie Computer Communications 22 (5), 439-450, 1999 | 15 | 1999 |
The V-network: a testbed for malware analysis MA Ahmad Science World Journal 14 (3), 70-76, 2019 | 11 | 2019 |
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history DW Gresty, D Gan, G Loukas, C Ierotheou Digital Investigation 16, S124-S133, 2016 | 11 | 2016 |
Threat evaluation based on automatic sensor signal characterisation and anomaly detection A Bezemskij, RJ Anthony, G Loukas, D Gan IARIA, 2016 | 9 | 2016 |
An investigation to detect banking malware network communication traffic using machine learning techniques MA Kazi, S Woodhead, D Gan Journal of Cybersecurity and Privacy 3 (1), 1-23, 2022 | 7 | 2022 |
Analysis of attacks using a honeypot G Kelly, D Gan International cybercrime, security and digital forensics conference, 2011 | 7 | 2011 |