Follow
Dr Eirini Anthi
Title
Cited by
Cited by
Year
A supervised intrusion detection system for smart home IoT devices
E Anthi, L Williams, M Słowińska, G Theodorakopoulos, P Burnap
IEEE Internet of Things Journal 6 (5), 9042-9053, 2019
4732019
Adversarial attacks on machine learning cybersecurity defences in industrial control systems
E Anthi, L Williams, M Rhode, P Burnap, A Wedgbury
Journal of Information Security and Applications 58, 102717, 2021
1292021
Pulse: an adaptive intrusion detection for the internet of things
E Anthi, L Williams, P Burnap
IET Digital Library, 2018
1202018
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks
E Anthi, L Williams, A Javed, P Burnap
computers & security 108, 102352, 2021
662021
Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge
P Radanliev, D De Roure, R Walton, M Van Kleek, RM Montalvo, ...
SN Applied Sciences 2, 1-8, 2020
602020
EclipseIoT: A secure and adaptive hub for the Internet of Things
E Anthi, S Ahmad, O Rana, G Theodorakopoulos, P Burnap
Computers & Security 78, 477-490, 2018
432018
Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics in extreme …
P Radanliev, D De Roure, K Page, M Van Kleek, O Santos, LT Maddox, ...
Safety in Extreme Environments 2, 219-230, 2020
342020
Definition of cyber strategy transformation roadmap for standardisation of IoT risk impact assessment with a goal-oriented approach and the internet of things micro Mart
P Radanliev, DC De Roure, JRC Nurse, P Burnap, E Anthi, U Ani, ...
University of Oxford combined working papers and project reports prepared …, 2019
312019
Definition of Internet of Things (IoT) Cyber Risk–Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact Assessment
P Radanliev, D De Roure, JRC Nurse, P Burnap, E Anthi, U Ani, O Santos, ...
Preprints, 2019
272019
Cyber risk from IoT technologies in the supply chain–discussion on supply chains decision support system for the digital economy
P Radanliev, DC De Roure, JR Nurse, P Burnap, E Anthi, U Ani, ...
no. March, 2019
242019
A three-tiered intrusion detection system for industrial control systems
E Anthi, L Williams, P Burnap, K Jones
Journal of Cybersecurity 7 (1), tyab006, 2021
212021
Secure data sharing and analysis in cloud-based energy management systems
E Anthi, A Javed, O Rana, G Theodorakopoulos
Cloud Infrastructures, Services, and IoT Systems for Smart Cities: Second …, 2018
172018
Cyber risk management for the internet of things
P Radanliev, DC De Roure, JRC Nurse, P Burnap, E Anthi, A Uchenna, ...
Preprints, 2019
162019
Cybersecurity challenges in the offshore oil and gas industry: an Industrial Cyber-Physical Systems (ICPS) perspective
AS Mohammed, P Reinecke, P Burnap, O Rana, E Anthi
ACM Transactions on Cyber-Physical Systems (TCPS) 6 (3), 1-27, 2022
142022
Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication
AS Mohammed, E Anthi, O Rana, N Saxena, P Burnap
Computers & Security 124, 103007, 2023
122023
Cyber risk from IoT technologies in the supply chain–decision support system for the Industry 4.0
P Radanliev, DCD Roure, JRC Nurse, P Burnap, E Anthi, U Ani, ...
University of Oxford, 2019
122019
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge
P Radanliev, D De Roure, M Van Kleek, U Ani, P Burnap, E Anthi, ...
Environment Systems and Decisions 41, 236-247, 2021
112021
G. eodorakopoulos, and P
E Anthi, L Williams, M Slowinska
Burnap,“A supervised intrusion detection system for smart home iot devices …, 2019
92019
Definition of Internet of Things (IoT) Cyber Risk–Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact …
P Radanliev, DCD Roure, JRC Nurse, P Burnap, E Anthi, U Ani, ...
Oxford: Preprints. doi, 2019
62019
Sensitive data in smartphone applications: Where does it go? can it be intercepted?
E Anthi, G Theodorakopoulos
Security and Privacy in Communication Networks: SecureComm 2017 …, 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20