George Loukas
George Loukas
Other namesGeorgios Loukas
Head, Centre for Sustainable Cyber Security (CS2), University of Greenwich
Verified email at - Homepage
Cited by
Cited by
Likelihood ratios and recurrent random neural networks in detection of denial of service attacks
G Loukas, G Oke
The Society for Modeling and Simulation International, 2007
Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning
G Loukas, T Vuong, R Heartfield, G Sakellari, Y Yoon, D Gan
IEEE Access 6 (1), 3491-3508, 2017
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
R Heartfield, G Loukas
ACM Computing Surveys (CSUR) 48 (3), 37, 2016
A Taxonomy and Survey of Attacks Against Machine Learning
N Pitropakis, E Panaousis, T Giannetsos, E Anastasiadis, G Loukas
Computer Science Review, 2019
Cyber-Physical Attacks: A Growing Invisible Threat
G Loukas
Butterworth-Heinemann, 2015
Blockchain-based mobile edge computing framework for secure therapy applications
MDA Rahman, MS Hossain, G Loukas, E Hassanain, SS Rahman, ...
IEEE access 6, 72469-72478, 2018
Protection against denial of service attacks: A survey
G Loukas, G Öke
The Computer Journal 53 (7), 1020-1037, 2010
A self-aware approach to denial of service defence
E Gelenbe, G Loukas
Computer Networks 51 (5), 1299-1314, 2007
A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing
G Sakellari, G Loukas
Simulation Modelling Practice and Theory 39, 92-103, 2013
A taxonomy of cyber-physical threats and impact in the smart home
R Heartfield, G Loukas, S Budimir, A Bezemskij, JRJ Fontaine, ...
Computers & Security 78, 398-428, 2018
A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles
G Loukas, E Karapistoli, E Panaousis, P Sarigiannidis, A Bezemskij, ...
Ad Hoc Networks 84, 124-147, 2019
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
R Heartfield, G Loukas
Computers & Security, 2018
Emergency response simulation using wireless sensor networks
A Filippoupolitis, L Hey, G Loukas, E Gelenbe, S Timotheou
1st International ICST Conference on Ambient Media and Systems, 2010
Bluetooth Low Energy based Occupancy Detection for Emergency Management
A Filippoupolitis, W Oliff, G Loukas
15th International Conference on Ubiquitous Computing and Communications (IUCC), 2016
Decision Tree-based Detection of Denial of Service and Command Injection attacks on Robotic Vehicles
T Vuong, G Loukas, D Gan, A Bezemskij
7th International Workshop on Information Forensics and Security (IEEE WIFS …, 2015
You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks
R Heartfield, G Loukas, D Gan
IEEE Access, 2016
Detecting denial of service attacks with bayesian classifiers and the random neural network
G Oke, G Loukas, E Gelenbe
2007 IEEE International Fuzzy Systems Conference, 1-6, 2007
Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning
R Heartfield, G Loukas, A Bezemskij, E Panaousis
IEEE Transactions on Information Forensics and Security 16, 1720-1735, 2020
Occupancy Detection for Building Emergency Management using BLE Beacons
A Filippoupolitis, W Oliff, G Loukas
31st International Symposium on Computer and Information Sciences, 2016
A denial of service detector based on maximum likelihood detection and the random neural network
G Öke, G Loukas
The Computer Journal 50 (6), 717-727, 2007
The system can't perform the operation now. Try again later.
Articles 1–20