Skip to main content

Research Repository

Advanced Search

All Outputs (4)

Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification (2022)
Journal Article
McCarthy, A., Ghadafi, E., Andriotis, P., & Legg, P. (2023). Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification. Journal of Information Security and Applications, 72, Article 103398. https://doi.org/10.1016/j.jisa.2022.103398

Machine learning is key for automated detection of malicious network activity to ensure that computer networks and organizations are protected against cyber security attacks. Recently, there has been growing interest in the domain of adversarial mach... Read More about Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification.

Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey (2022)
Journal Article
McCarthy, A., Ghadafi, E., Andriotis, P., & Legg, P. (2022). Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey. Journal of Cybersecurity and Privacy, 2(1), 154-190. https://doi.org/10.3390/jcp2010010

Machine learning has become widely adopted as a strategy for dealing with a variety of cybersecurity issues, ranging from insider threat detection to intrusion and malware detection. However, by their very nature, machine learning systems can introdu... Read More about Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey.

Foundations of fully dynamic group signatures (2020)
Journal Article
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., & Groth, J. (2020). Foundations of fully dynamic group signatures. Journal of Cryptology, 33(4), 1822-1870. https://doi.org/10.1007/s00145-020-09357-w

Group signatures allow members of a group to anonymously sign on behalf of the group. Membership is administered by a designated group manager. The group manager can also reveal the identity of a signer if and when needed to enforce accountability an... Read More about Foundations of fully dynamic group signatures.

Anonymous attestation with user-controlled linkability (2013)
Journal Article
Bernhard, D., Fuchsbauer, G., Ghadafi, E., Smart, N. P., & Warinschi, B. (2013). Anonymous attestation with user-controlled linkability. International Journal of Information Security, 12(3), 219-249. https://doi.org/10.1007/s10207-013-0191-z

This paper is motivated by the observation that existing security models for direct anonymous attestation (DAA) have problems to the extent that insecure protocols may be deemed secure when analysed under these models. This is particularly disturbing... Read More about Anonymous attestation with user-controlled linkability.