Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Efficient and interpretable real-time malware detection using random-forest (2019)
Conference Proceeding
Mills, A., Spyridopoulos, T., & Legg, P. (2019). Efficient and interpretable real-time malware detection using random-forest. . https://doi.org/10.1109/CyberSA.2019.8899533

© 2019 IEEE. Malicious software, often described as malware, is one of the greatest threats to modern computer systems, and attackers continue to develop more sophisticated methods to access and compromise data and resources. Machine learning methods... Read More about Efficient and interpretable real-time malware detection using random-forest.

Managing cyber security risks in industrial control systems with game theory and viable system modelling (2014)
Conference Proceeding
Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G., & Li, S. (2014). Managing cyber security risks in industrial control systems with game theory and viable system modelling. In 2014 9th International Conference on System of Systems Engineering (SOSE) (266-271). https://doi.org/10.1109/SYSOSE.2014.6892499

© 2014 IEEE. Cyber security risk management in Industrial Control Systems has been a challenging problem for both practitioners and the research community. Their proprietary nature along with the complexity of those systems renders traditional approa... Read More about Managing cyber security risks in industrial control systems with game theory and viable system modelling.

A holistic approach for cyber assurance of critical infrastructure with the viable system model (2014)
Conference Proceeding
Spyridopoulos, T., Topa, I. A., Tryfonas, T., & Karyda, M. (2014). A holistic approach for cyber assurance of critical infrastructure with the viable system model. In ICT Systems Security and Privacy Protection (438-445). https://doi.org/10.1007/978-3-642-55415-5_37

© IFIP International Federation for Information Processing 2014. Industrial Control Systems (ICSs) are of the most important components of National Critical Infrastructure. They can provide control capabilities in complex systems of critical importan... Read More about A holistic approach for cyber assurance of critical infrastructure with the viable system model.