Follow
Ryan Heartfield
Ryan Heartfield
CTO / Chief scientist at Exalens, Research Fellow in Cyber Security, University of Greenwich
Verified email at gre.ac.uk - Homepage
Title
Cited by
Cited by
Year
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
R Heartfield, G Loukas
ACM Computing Surveys (CSUR) 48 (3), 1-39, 2015
1852015
Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning
G Loukas, T Vuong, R Heartfield, G Sakellari, Y Yoon, D Gan
IEEE Access 6 (1), 3491-3508, 2017
1592017
A taxonomy of cyber-physical threats and impact in the smart home
R Heartfield, G Loukas, S Budimir, A Bezemskij, JRJ Fontaine, ...
Computers & Security 78, 398-428, 2018
782018
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
R Heartfield, G Loukas
Computers & Security 76 (101-127), 2018
652018
You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks
R Heartfield, G Loukas, D Gan
IEEE Access 4, 6910-6928, 2016
582016
Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance
G Loukas, Y Yoon, G Sakellari, T Vuong, R Heartfield
Simulation Modelling Practice and Theory 73, 83-94, 2017
282017
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks
R Heartfield, G Loukas, D Gan
2017 IEEE 15th international conference on software engineering research …, 2017
202017
Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning
R Heartfield, G Loukas, A Bezemskij, E Panaousis
IEEE Transactions on Information Forensics and Security 16, 1720-1735, 2020
152020
Social Engineering in the Internet of Everything
R Heartfield, D Gan
Cutter IT Journal 26 (7), 20-29, 2016
15*2016
Toward a blockchain-enabled crowdsourcing platform
DG Kogias, HC Leligou, M Xevgenis, M Polychronaki, E Katsadouros, ...
IT Professional 21 (5), 18-25, 2019
132019
Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices
SS Rahman, R Heartfield, W Oliff, G Loukas, A Filippoupolitis
IEEE SERA, 2017
112017
Evaluating the reliability of users as human sensors of social media security threats
R Heartfield, G Loukas
2016 International Conference On Cyber Situational Awareness, Data Analytics …, 2016
92016
On the feasibility of automated semantic attacks in the cloud
R Heartfield, G Loukas
Computer and Information Sciences III, 343-351, 2013
92013
A prototype framework for assessing information provenance in decentralised social media: The eunomia concept
L Toumanidis, R Heartfield, P Kasnesis, G Loukas, C Patrikakis
International Conference on e-Democracy, 196-208, 2019
62019
Transformer-based identification of stochastic information cascades in social networks using text and image similarity
P Kasnesis, R Heartfield, X Liang, L Toumanidis, G Sakellari, C Patrikakis, ...
Applied Soft Computing, 2021
52021
A prototype deep learning paraphrase identification service for discovering information cascades in social networks
P Kasnesis, R Heartfield, L Toumanidis, X Liang, G Loukas, C Patrikakis
2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), 1-4, 2020
32020
Protection against semantic social engineering attacks
R Heartfield, G Loukas
Versatile Cybersecurity, 99-140, 2018
32018
Detecting framerate-oriented cyber attacks on user experience in virtual reality
B Odeleye, G Loukas, R Heartfield, F Spyridonis
VR4Sec: 1st International Workshop on Security for XR and XR for Security, 2021
22021
Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT&CK
R Pell, S Moschoyiannis, E Panaousis, R Heartfield
arXiv:2108.11206, 2021
12021
Utilising the concept of Human-as-a-Security-Sensor for detecting semantic social engineering attacks
R Heartfield
University of Greenwich, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20