G. Iosifidis
28 records found
1
In practical situations, computer vision technique is applied to solve various tasks, including image classification, object detection, image segmentation, and so on. The commonly used supervised learning training paradigm for the network models used to solve these tasks requires
...
WALL-EYE: Taking a look at CubeSat security
Security analysis of CubeSats on a physical testbed
With the rise of new space, space missions are becoming increasingly more accessible. This is caused by the increased use of commercial-off-the-shelf components as well as the possibility of having multiple parties operating on a single satellite platform. This development combin
...
Classifying and identifying slow scanners based on their behavior and attributes
How can clustering techniques be applied to classify and identify slow scanners based on their behavior and attributes
In this research, we propose a new method for detecting slow, distributed port scanners by utilizing clustering techniques based on the behavioral characteristics of scan sources. Traditional methods often rely on identifying sources within the same subnet and using frequency-bas
...
Amplification Detection: Determining DDoS Abuse Potential of Your Network
A Quantitative Study of the Amplification Potential of Three Popular Protocols
Amplification Distributed Denial of Service attacks require networks that do not drop packets with spoofed IP addresses and servers open to the Internet running UDP protocols with amplification potential. These attacks have the potential to overwhelm large network links and disru
...
Estimating the Amplification Factor of Three Common Protocols in DRDoS Attacks
A Quantitative Analysis on the Weaponisation of Hosts Located in Greece
Distributed reflection denial-of-service (DRDoS) attacks are a type of cyberattack where a malicious actor sends requests to public and open servers on behalf of the victim by spoofing their IP address. The traffic generated by the corresponding responses is directed towards the
...
Estimating the Amplification Factors in the Network Infrastructure of France
Defining factors that affect amplification DoS attacks
Amplification Denial of Service (DoS) attacks have been a persistent challenge in network security, with the consequences ranging from causing minor disruptions to substantial financial losses and irreparable damage to reputation.
In today's network environment, many inf ...
In today's network environment, many inf ...
This paper explores Distributed Reflective Denial-of-Service (DRDoS) attacks, a variant of Distributed Denial-of-Service (DDoS) attacks that leverage publicly accessible UDP servers to amplify traffic towards a target. These attacks, accounting for over half of all DDoS cases in
...
Investigating the Amplification Potential of Common UDP-Based Protocols in DDoS Attacks
A measurement study conducted across the networking infrastructure in Belgium and Luxembourg
Distributed Reflection Denial-of-Service (DRDoS) attacks remain among the most damaging cyber threats, leveraging vulnerable UDP-based protocols to amplify traffic and overwhelm targets. Our measurement study investigates the amplification potential of three commonly exploited pr
...
Forecasting in Online Caching
Exploration of the effects of forecaster methods on an online learning caching policy
This paper explores the effect of forecasting methods on the Optimistic Follow The Regularized Leader (OFTRL) caching policy. It has been theoretically proven that the performance of OFTRL improves with accurate forecasters. However, the forecasters were portrayed as black boxes.
...
An Exploration of Participation in Student Software Teams
How Programming Experience Affects Participation in Student Software Teams and Leveraging Repository Insights for Monitoring Participation
Group work is an integral part of Computing Education, but introduces problems when students either fail to participate enough or dominate, not allowing their team members to contribute. This research focuses on identifying the participation level of the students, allowing the te
...
Comparative Analysis of LSTM, ARIMA, and Facebook’s Prophet for Traffic Forecasting
Advancements, Challenges, and Limitations
Accurate short-term traffic forecasting plays a crucial role in Intelligent Transportation Systems for effective traffic management and planning. In this study, the performances of three popular forecasting models are explored: Long Short-Term Memory (LSTM), Autoregressive Integr
...
Accurate traffic forecasts are a key element in improving the traffic flow of urban cities. An efficient approach to this problem is to use a deep learning Long Short Term Memory (LSTM) model. Including weather data in the model can improve prediction accuracy because traffic vol
...
Long term predictions for traffic forecasting
How does the accuracy degrade with time?
Traffic prediction plays a big role in efficient transport planning capabilities and can reduce traffic congestion. In this study the application of Long Short-Term Memory (LSTM) models for predicting traffic volumes across varying prediction horizons is investigated. The data us
...
Due to the increasing popularity of various types of sensors in traffic management, it has become significantly easier to collect data on traffic flow. However, the integrity of these data sets is often compromised due to missing values resulting from sensor failures, communicati
...
Deep learning approaches to short term traffic forecasting
Capturing the spatial temporal relation in historic traffic data
The amount of cars on the roads is increasing at a rapid pace, causing traffic jams to become commonplace. One way to decrease the amount of traffic congestion is by building an Intelligent Transportation System (ITS) which helps traffic flow optimally. An important tool for an I
...
Control of Thermal Management Systems for Electric Vehicles
Energy Efficiency Optimization for the Lightyear 0
Improving the energy efficiency of electric vehicles has various significant benefits, such as increasing the driving range. The Thermal Management System (TMS) plays a large role in optimizing the vehicle energy consumption and battery lifetime. In this thesis, a nonlinear Model
...
Scaling Up, Staying Secure
Assessing the Cyber Risks of Distributed Energy Resources in the Smart Grid
Distributed Energy Resources (DER), like solar panels, are projected to take over power generation responsibilities. This will happen during the transition of the current power grid to the Smart Grid. Due to the importance of this power to society, it is crucial that the grid sta
...
Since the introduction of networking protocols for Low-power and Lossy Networks (LLN), many implementations have been created in the form of (real-time) Operating Systems (OS), simplifying their usage and making the technology more widely available. The low cost and low complexit
...
Securing BGP Communities
Design of a new RPKI object to mitigate BGP Community Attacks
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploits the community attribute. These community attacks can influence BGP routing in unintended ways. Currently, there are no effective mitigations against these attacks which do not li
...
Time is Money
A similar repository recommender system that saves development time using tag hierarchies
Developers do not want to reinvent the wheel when developing software systems. Open-source software repositories are packed with resources that may assist developers with their work. Since Github enabled repository tagging, a new opportunity arose to help developers find the need
...