Ryan Heartfield
TitleCited byYear
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
R Heartfield, G Loukas
ACM Computing Surveys (CSUR) 48 (3), 37, 2016
Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning
G Loukas, T Vuong, R Heartfield, G Sakellari, Y Yoon, D Gan
IEEE Access 6 (1), 3491-3508, 2017
You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks
R Heartfield, G Loukas, D Gan
IEEE Access 4, 6910-6928, 2016
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
R Heartfield, G Loukas
Computers & Security 76 (101-127), 2018
A taxonomy of cyber-physical threats and impact in the smart home
R Heartfield, G Loukas, S Budimir, A Bezemskij, JRJ Fontaine, ...
Computers & Security 78, 398-428, 2018
Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance
G Loukas, Y Yoon, G Sakellari, T Vuong, R Heartfield
Simulation Modelling Practice and Theory 73, 83-94, 2017
On the feasibility of automated semantic attacks in the cloud
R Heartfield, G Loukas
Computer and Information Sciences III, 343-351, 2013
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks
R Heartfield, G Loukas, D Gan
2017 IEEE 15th International Conference on Software Engineering Research†…, 2017
Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices
SS Rahman, R Heartfield, W Oliff, G Loukas, A Filippoupolitis
Evaluating the reliability of users as human sensors of social media security threats
R Heartfield, G Loukas
2016 International Conference On Cyber Situational Awareness, Data Analytics†…, 2016
Social Engineering in the Internet of Everything
R Heartfield, D Gan
Cutter IT Journal 26 (7), 20-29, 2016
Protection Against Semantic Social Engineering Attacks
R Heartfield, G Loukas
Versatile Cybersecurity, 99-140, 2018
Toward a Blockchain-Enabled Crowdsourcing Platform
DG Kogias, HC Leligou, M Xevgenis, M Polychronaki, E Katsadouros, ...
IT Professional 21 (5), 18-25, 2019
Utilising the concept of Human-as-a-Security-Sensor for detecting semantic social engineering attacks
R Heartfield
University of Greenwich, 2017
Predicting the performance of users as human sensors of security threats in social media
R Heartfield, G Loukas
International Journal on Cyber Situational Awareness (IJCSA) 1 (1), 2016
MASCOTS 2016 Reviewers
JT Acquaviva, O Akinwande, F Alagoz, A Amer, E Anarim, S Bahtiyar, ...
Basu, Anirban, 85 Ben-Abdallah, HanÍne, 289 Benzarti, Faouzi, 157 Bie, Rongfang, 47, 123
S Bradai, C Chatzigeorgiou, A Cha‚bane, Q Chen, H Dong, CJ Downie, ...
The system can't perform the operation now. Try again later.
Articles 1–17