default search action
Eirini Anthi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan, Eirini Anthi, Lowri Williams:
Severity-Oriented Multiclass Drone Flight Logs Anomaly Detection. IEEE Access 12: 64252-64266 (2024) - [j13]Lowri Williams, Eirini Anthi, Pete Burnap:
Comparing Hierarchical Approaches to Enhance Supervised Emotive Text Classification. Big Data Cogn. Comput. 8(4): 38 (2024) - [j12]Lowri Williams, Eirini Anthi, Laura Arman, Pete Burnap:
Topic Modelling: Going beyond Token Outputs. Big Data Cogn. Comput. 8(5): 44 (2024) - [j11]Lowri Williams, Eirini Anthi, Pete Burnap:
A Scalable and Automated Framework for Tracking the Likely Adoption of Emerging Technologies. Inf. 15(4): 237 (2024) - [j10]Pete Burnap, Eirini Anthi, Philipp Reinecke, Lowri Williams, Fengnian Cao, Rakan Aldmour, Kevin Jones:
Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals. J. Cybersecur. Priv. 4(2): 340-356 (2024) - [i9]Lowri Williams, Eirini Anthi, Laura Arman, Pete Burnap:
Topic Modelling: Going Beyond Token Outputs. CoRR abs/2401.12990 (2024) - [i8]Lowri Williams, Eirini Anthi, Pete Burnap:
A Scalable and Automated Framework for Tracking the likely Adoption of Emerging Technologies. CoRR abs/2402.01670 (2024) - [i7]Vasilis Ieropoulos, Eirini Anthi:
Using Harmonics for Low-Cost Jamming. CoRR abs/2402.14869 (2024) - 2023
- [j9]Abubakar Sadiq Mohammed, Eirini Anthi, Omer F. Rana, Neetesh Saxena, Pete Burnap:
Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Comput. Secur. 124: 103007 (2023) - [j8]Turki Al lelah, George Theodorakopoulos, Philipp Reinecke, Amir Javed, Eirini Anthi:
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review. J. Cybersecur. Priv. 3(3): 558-590 (2023) - [j7]Turki Al lelah, George Theodorakopoulos, Amir Javed, Eirini Anthi:
Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure. J. Cybersecur. Priv. 3(4): 858-881 (2023) - [c3]Othmane Belarbi, Theodoros Spyridopoulos, Eirini Anthi, Ioannis Mavromatis, Pietro Edoardo Carnelli, Aftab Khan:
Federated Deep Learning for Intrusion Detection in IoT Networks. GLOBECOM 2023: 237-242 - [i6]Othmane Belarbi, Theodoros Spyridopoulos, Eirini Anthi, Ioannis Mavromatis, Pietro Edoardo Carnelli, Aftab Khan:
Federated Deep Learning for Intrusion Detection in IoT Networks. CoRR abs/2306.02715 (2023) - [i5]Baskoro Adi Pratomo, Toby Jackson, Pete Burnap, Andrew Hood, Eirini Anthi:
Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection. CoRR abs/2310.18165 (2023) - 2022
- [b1]Eirini Anthi:
Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem. Cardiff University, UK, 2022 - [j6]Abubakar Sadiq Mohammed, Philipp Reinecke, Pete Burnap, Omer F. Rana, Eirini Anthi:
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective. ACM Trans. Cyber Phys. Syst. 6(3): 28:1-28:27 (2022) - [i4]Abubakar Sadiq Mohammed, Philipp Reinecke, Pete Burnap, Omer F. Rana, Eirini Anthi:
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective. CoRR abs/2202.12179 (2022) - 2021
- [j5]Eirini Anthi, Lowri Williams, Amir Javed, Pete Burnap:
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks. Comput. Secur. 108: 102352 (2021) - [j4]Eirini Anthi, Lowri Williams, Pete Burnap, Kevin Jones:
A three-tiered intrusion detection system for industrial control systems. J. Cybersecur. 7(1) (2021) - [j3]Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury:
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems. J. Inf. Secur. Appl. 58: 102717 (2021) - 2020
- [i3]Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury:
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems. CoRR abs/2004.05005 (2020) - [i2]Petar Radanliev, David De Roure, Kevin R. Page, Max Van Kleek, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Stacy Cannady, Pete Burnap, Eirini Anthi, Carsten Maple:
Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics. CoRR abs/2005.12150 (2020)
2010 – 2019
- 2019
- [j2]Eirini Anthi, Lowri Williams, Malgorzata Slowinska, George Theodorakopoulos, Pete Burnap:
A Supervised Intrusion Detection System for Smart Home IoT Devices. IEEE Internet Things J. 6(5): 9042-9053 (2019) - [i1]Petar Radanliev, David Charles De Roure, Jason R. C. Nurse, Pete Burnap, Eirini Anthi, Uchenna Ani, La Treall Maddox, Omar Santos, Rafael Mantilla Montalvo:
Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment. CoRR abs/1903.12084 (2019) - 2018
- [j1]Eirini Anthi, Shazaib Ahmad, Omer F. Rana, George Theodorakopoulos, Pete Burnap:
EclipseIoT: A secure and adaptive hub for the Internet of Things. Comput. Secur. 78: 477-490 (2018) - 2017
- [c2]Eirini Anthi, Amir Javed, Omer F. Rana, George Theodorakopoulos:
Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems. IISSC/CN4IoT 2017: 228-242 - [c1]Eirini Anthi, George Theodorakopoulos:
Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted? ATCS/SePrIoT@SecureComm 2017: 301-319
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint