Skip to main content

Research Repository

Advanced Search

All Outputs (5)

TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection (2024)
Conference Proceeding
Lo, C., Christie, J., Win, T. Y., Rezaeifar, Z., Khan, Z., & Legg, P. (in press). TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection. In Springer Proceedings in Complexity book series

Cyber-attacks on Industrial Control Systems (ICS), as exemplified by the incidents at the Maroochy water treatment plant and the Ukraine's electric power grid, have demonstrated that cyber threats can inflict significant physical impacts. These incid... Read More about TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection.

Digital twins in industry 4.0 cyber security (2024)
Conference Proceeding
Lo, C., Win, T. Y., Rezaeifar, Z., Khan, Z., & Legg, P. (2024). Digital twins in industry 4.0 cyber security. In Proceedings of the IEEE Smart World Congress 2023. https://doi.org/10.1109/swc57546.2023.10449147

The increased adoption of sophisticated Cyber Physical Systems (CPS) in critical infrastructure and various aspects of Industry 4.0 has exposed vulnerabilities stemming from legacy CPS and Industrial Internet of Things (IIoT) devices. The interconnec... Read More about Digital twins in industry 4.0 cyber security.

An assessment of Wi-Fi 5 and 6 and its effects on location tracking (2023)
Conference Proceeding
AlMusalam, S., & Rezaeifar, Z. (2023). An assessment of Wi-Fi 5 and 6 and its effects on location tracking. . https://doi.org/10.20533/icitst.2023.0002

Location tracking is a privacy attack within the Wi-Fi protocol that recently gained the attention of researchers. Wi-Fi-enabled devices, such as smartphones and watches, constantly broadcast probe requests to connect to an Access Point. These reques... Read More about An assessment of Wi-Fi 5 and 6 and its effects on location tracking.

Triangle area based multivariate correlation analysis for detecting and mitigating cache pollution attacks in named data networking (2021)
Conference Proceeding
Sohail, M., Zheng, Q., Rezaiefar, Z., Khan, M. A., Ullah, R., Tan, X., …Yuan, L. (2021). Triangle area based multivariate correlation analysis for detecting and mitigating cache pollution attacks in named data networking. In 2020 3rd International Conference on Hot Information-Centric Networking (HotICN) (114-121). https://doi.org/10.1109/HotICN50779.2020.9350746

The key feature of NDN is in-network caching that every router has its cache to store data for future use, thus improve the usage of the network bandwidth and reduce the network latency. However, in-network caching increases the security risks - cach... Read More about Triangle area based multivariate correlation analysis for detecting and mitigating cache pollution attacks in named data networking.

On secure, privacy-aware, and efficient beacon broadcasting among one-hop neighbors in VANETs (2014)
Conference Proceeding
Hussain, R., Rezaeifar, Z., Kim, D., Tokuta, A. O., & Oh, H. (2014). On secure, privacy-aware, and efficient beacon broadcasting among one-hop neighbors in VANETs. In 2014 IEEE Military Communications Conference (1427-1434). https://doi.org/10.1109/MILCOM.2014.236

Many Vehicular Ad Hoc Network (VANET) applications achieve a decent packet delivery ratio using mobility information in the beacon messages broadcasted to the single hop neighbours. Recently it has been found that if two VANET nodes are not within a... Read More about On secure, privacy-aware, and efficient beacon broadcasting among one-hop neighbors in VANETs.