Leandros Maglaras
leandros maglaras

Prof Leandros Maglaras

Professor

Biography

Dr. Leandros A. Maglaras is a professor of cybersecurity in the School of Computing at 麻豆社区. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained a B.Sc. (M.Sc. equivalent) in Electrical and Computer Engineering from the Aristotle University of Thessaloniki, Greece in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004, and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from the University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield He is featured in Stanford University's list of the world鈥檚 Top 2% scientists. He is a Senior Member of the Institute of Electrical & Electronics Engineers (IEEE) and is an author of more than 200 papers in scientific magazines and conferences.

Esteem

Editorial Activity

  • Section Editor in Chief for MDPI Computers
  • Associate Editor for Journal of Information Processing Systems (JIPS)
  • Associate Editor for Journal of Surveillance, Security and Safety (JSSS)
  • Section Editor of Communications and Security for IntechOpen Journal for Computer science, Artificial intelligence and robotics
  • Associate Editor for IEEE Access
  • Executive Editor for Elsevier ICT Express

 

Media Activity

  • Interview - Meet the talent - 4i magazine

 

Visiting Positions

  • Visiting Professor at De Montfort University

 

Date


84 results

Machine Learning for Smart Healthcare Management Using IoT

Book Chapter
Yigit, Y., Duran, K., Moradpoor, N., Maglaras, L., Van Huynh, N., & Canberk, B. (in press)
Machine Learning for Smart Healthcare Management Using IoT. In IoT and ML for Information Management: A Smart Healthcare Perspective. Springer
The convergence of Machine Learning (ML) and the Internet of Things (IoT) has brought about a paradigm shift in healthcare, ushering in a new era of intelligent healthcare man...

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis

Conference Proceeding
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (in press)
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. In 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)

Hybrid Threats, Cyberterrorism and Cyberwarfare

Book
Ferrag, M. A., Kantzavelou, I., Maglaras, L., & Janicke, H. (Eds.)
(2024). Hybrid Threats, Cyberterrorism and Cyberwarfare. Boca Raton: CRC Press. https://doi.org/10.1201/9781003314721
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers fo...

The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System

Presentation / Conference Contribution
Moradpoor, N., Maglaras, L., Abah, E., & Robles-Durazno, A. (2023, June)
The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System. Presented at 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Pafos, Cyprus
The protection of Critical National Infrastructure is extremely important due to nations being dependent on their operation and steadiness. Any disturbance to this infrastruct...

A Blockchain-based two Factor Honeytoken Authentication System

Presentation / Conference Contribution
Papaspirou, V., Maglaras, L., Kantzavelou, I., Moradpoor, N., & Katsikas, S. (2023, September)
A Blockchain-based two Factor Honeytoken Authentication System. Poster presented at 28th European Symposium on Research in Computer Security (ESORICS), The Hague
This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the...

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise

Journal Article
Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2023)
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Information and Computer Security, 31(4), 404-426. https://doi.org/10.1108/ICS-05-2022-0085
Purpose This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business'...

IoT: Communication protocols and security threats

Journal Article
Gerodimos, A., Maglaras, L., Ferrag, M. A., Ayres, N., & Kantzavelou, I. (in press)
IoT: Communication protocols and security threats. Internet of Things and Cyber-Physical Systems, https://doi.org/10.1016/j.iotcps.2022.12.003
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. More...

A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing

Journal Article
Babaghayou, M., Chaib, N., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2023)
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing. Sensors, 23(1), Article 531. https://doi.org/10.3390/s23010531
By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), the Internet of Vehicles (IoV) paradigm has attracted the attention of different research and development bo...

An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks

Journal Article
Almomani, I., Ahmed, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (2022)
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks. IEEE Access, 10, 131640-131655. https://doi.org/10.1109/access.2022.3229623
Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets,...

An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad hoc Networks

Journal Article
Almomani, I., Ahmad, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (in press)
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad hoc Networks. IEEE Access,
Jamming is a terrifying attack that could harm the 802.11p-based vehicular communications by occupying the communication channels through overwhelming the network with jamming...

Current Post Grad projects