Top of page

Student/Staff Portal
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Professor Helge Janicke

Professor of Cybersecurity

Staff Member Details
Email: h.janicke@ecu.edu.au
ORCID iD: https://orcid.org/0000-0002-1345-2829

Professor of Cyber Security

Helge Janicke, Professor of Cyber Security in ECU School of Science, is also Deputy CEO and Research Director of the Cyber Security Cooperative Research Centre, Australia. He holds a visiting Professorship in Cyber Security at De Montfort University, UK. Prof. Janicke’s research interests are in the area of cyber security, in particular with applications in critical infrastructures using cyber-physical systems, SCADA and Industrial Control Systems. Prof. Janicke’s current research investigates the application of Agile Techniques to Cyber Incident Response in Critical Infrastructure, Managing Human Errors that lead to Cyber Incidents, and research on Cyber warfare & Cyber peacekeeping. Prof. Janicke established DMU’s Cyber Technology Institute and its Airbus Centre of Excellence in SCADA Cyber Security and Forensics Research. He has been the Head of School of Computer Science at De Montfort University UK, before taking up his current position as Research Director for the Cyber Security Cooperative Research Centre. Prof. Janicke founded the International Symposium on Industrial Control System Cyber Security Research (ICS-CSR) and contributed over 150 peer reviewed articles and conference papers to the field that resulted from his collaborative research with industry partners such as Airbus, BT, Deloitte, Rolls-Royce, QinetiQ, and General-Dynamics.

Professional Memberships

  • 2005 – Member of the IEEE

Awards and Recognition

University and National Teaching Awards

  • 2019 – Senior Fellow  of the Higher Education Agency

National and International Research Positions

  • 2019 – Visiting Professor of Cyber Security De Montfort University, Leicester UK
  • 2013 – General Chair of the International Symposium on Industrial Control System Cyber Security Research

Research Areas and Interests

  • Computer Science
  • Cyber Security
  • Security of Industrial Control Systems/ SCADA
  • Digital Forensics
  • Cyber Physical Systems
  • Access Control
  • Policy Based Management

Qualifications

  • Doctor of Philosphy in Computer Science, England, 2007.

Research Outputs

Journal Articles

  • Sarker, MI., Janicke, H., Ferrag, MA., Abuadbba, A. (2024). Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures. Internet of Things, 25(2024), article number 101110. https://doi.org/10.1016/j.iot.2024.101110.
  • Hasan, M., Rahman, MS., Janicke, H., Sarker, MI. (2024). Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis. Blockchain: Research and Applications, 5(3), article number 100207. https://doi.org/10.1016/j.bcra.2024.100207.
  • Hossain, GM., Deb, K., Janicke, H., Sarker, MI. (2024). PDF Malware Detection: Toward Machine Learning Modeling With Explainability Analysis. IEEE Access, 12(2024), 13833-13859. https://doi.org/10.1109/ACCESS.2024.3357620.
  • Zubair, M., Janicke, H., Mohsin, A., Maglaras, L., Sarker, MI. (2024). Automated Sensor Node Malicious Activity Detection with Explainability Analysis. Sensors, 24(12), Article number 3712. https://doi.org/https://doi.org/10.3390/s24123712.
  • Gaber, M., Ahmed, M., Janicke, H. (2024). Malware Detection with Artificial Intelligence: A Systematic Literature Review. ACM Computing Surveys, 56(6), 1-33. https://doi.org/10.1145/3638552.
  • Sarker, MI., Janicke, H., Mohsin, A., Gill, A., Maglaras, L. (2024). Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects. ICT Express, 2024(Article in Press), 24 pages. https://doi.org/https://doi.org/10.1016/j.icte.2024.05.007.
  • Gaber, M., Ahmed, M., Janicke, H. (2024). Zero day ransomware detection with Pulse: Function classification with Transformer models and assembly language. Computers & Security, 148(Article in press), Article number 104167. https://doi.org/10.1016/j.cose.2024.104167.

Conference Publications

  • Sarker, MI., Janicke, H., Maglaras, L., Camtepe, S. (2024). Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper. Communications in Computer and Information Science (302-316). Springer. https://doi.org/10.1007/978-3-031-48855-9_23.
  • Yigit, Y., Kioskli, K., Bishop, L., Chouliaras, N., Maglaras, L., Janicke, H. (2024). Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins. 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (24-32). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/WoWMoM60985.2024.00016.

Journal Articles

  • Eckhart, M., Ekelhart, A., Allison, D., Almgren, M., Ceesay-Seitz, K., Janicke, H., Nadjm-Tehrani, S., Rashid, A., Yampolskiy, M. (2023). Security-Enhancing Digital Twins: Characteristics, Indicators, And Future Perspectives. IEEE Security and Privacy Magazine, 2023(Article in Press), TBD. https://doi.org/10.1109/MSEC.2023.3271225.
  • Gaber, M., Ahmed, M., Janicke, H. (2023). Malware Detection with Artificial Intelligence: A Systematic Literature Review. ACM Computing Surveys, 2023(Article in press), 33 pages. https://doi.org/10.1145/3638552.
  • Papaspirou, V., Papathanasaki, M., Maglaras, L., Kantzavelou, I., Douligeris, C., Ferrag, M., Janicke, H. (2023). A Novel Authentication Method That Combines Honeytokens and Google Authenticator. Information (Basel), 14(7), article number 386. https://doi.org/10.3390/info14070386.

Conference Publications

  • Mohsin, A., Janicke, H., Nepal, S., Holmes, D. (2023). Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity Operations. IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (277-286). IEEE. https://doi.org/10.1109/TPS-ISA58951.2023.00042.

Journal Articles

  • Ferrag, M., Friha, O., Hamouda, D., Maglaras, L., Janicke, H. (2022). Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access, 10(2022), 40281-40306. https://doi.org/10.1109/ACCESS.2022.3165809.
  • Maglaras, LA., Ferrag, MA., Janicke, H., Ayres, N., Tassiulas, L. (2022). Reliability, Security, And Privacy In Power Grids. Computer, 55(9), 85-88. https://doi.org/10.1109/MC.2022.3184425.

Conference Publications

  • Papaspirou, V., Papathanasaki, M., Maglaras, L., Kantzavelou, I., Douligeris, C., Ferrag, M., Janicke, H. (2022). Security Revisited: Honeytokens meet Google Authenticator. 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (8). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932907.

Journal Articles

  • Smith, R., Janicke, H., He, Y., Ferra, F., Albakri, A. (2021). The Agile Incident Response for Industrial Control Systems (AIR4ICS) Framework. Computers and Security, 109(October 2021), Article number 102398. https://doi.org/10.1016/j.cose.2021.102398.
  • Ferrag, M., Friha, O., Maglaras, L., Janicke, H., Shu, L. (2021). Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access, 9(6 October 2021), 138509-138542. https://doi.org/10.1109/ACCESS.2021.3118642.
  • Babaghayou, M., Labraoui, N., Abba Ari, AA., Ferrag, MA., Maglaras, L., Janicke, H. (2021). WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors, 21(7), Article number 2443. https://doi.org/10.3390/s21072443.
  • Bashir, R., Janicke, H., Zeng, W. (2021). Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation. EAI Endorsed Transactions on Security and Safety, 7(25), e2. https://doi.org/10.4108/eai.8-4-2021.169179.
  • Loft, P., He, Y., Janicke, H., Wagner, I. (2021). Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis. Enterprise Information Systems, 15(4), 448-473. https://doi.org/10.1080/17517575.2019.1605000.

Conference Publications

  • Holmes, D., Papathanasaki, M., Maglaras, L., Ferrag, M., Nepal, S., Janicke, H. (2021). Digital Twins and Cyber Security - solution or challenge?. 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, SEEDA-CECNSM 2021 (p.1-8). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566277.
  • Papaspirou, V., Maglaras, L., Ferrag, M., Kantzavelou, I., Janicke, H., Douligeris, C. (2021). A novel Two-Factor HoneyToken Authentication Mechanism. Proceedings - International Conference on Computer Communications and Networks, ICCCN (1-Jul). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICCCN52240.2021.9522319.

Journal Articles

  • Ahmed, N., Michelin, R., Xue, W., Ruj, S., Malaney, R., Kanhere, S., Seneviratne, A., Hu, W., Janicke, H., Jha, S. (2020). A Survey of COVID-19 Contact Tracing Apps. IEEE Access, 8(20-Jul-20), 134577-134601. https://doi.org/10.1109/ACCESS.2020.3010226.
  • Ferrag, M., Maglaras, L., Ahmim, A., Derdour, M., Janicke, H. (2020). RDTIDS: Rules and decision tree-based intrusion detection system for internet-of-things networks. Future Internet, 12(3), Article number 44. https://doi.org/10.3390/fi12030044.
  • Ferrag, M., Maglaras, L., Derhab, A., Janicke, H. (2020). Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues. Telecommunication Systems, 73(2), 317-348. https://doi.org/10.1007/s11235-019-00612-5.
  • Kosmanos, D., Pappas, A., Maglaras, L., Moschoyinnais, S., Aparicio-Navarro, F., Argyriou, A., Janicke, H. (2020). A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles. Array, 5(March 2020), Article number 100013. https://doi.org/10.1016/j.array.2019.100013.
  • Luh, R., Temper, M., Tjoa, S., Schrittwieser, S., Janicke, H. (2020). PenQuest: a gamified attacker/defender meta model for cyber security assessment and education. Journal of Computer Virology and Hacking Techniques, 16(1), 19-61. https://doi.org/10.1007/s11416-019-00342-x.
  • Zeng, W., Bashir, R., Wood, T., Siewe, F., Janicke, H., Wagner, I. (2020). How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems. EAI Endorsed Transactions on Cloud Systems, 6(18), 11p.. https://doi.org/10.4108/eai.13-7-2018.165236.
  • Ferrag, M., Maglaras, L., Moschoyiannis, S., Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50(February 2020), article number 102419. https://doi.org/10.1016/j.jisa.2019.102419.
  • Koroniotis, N., Moustafa, N., Schiliro, F., Gauravaram, P., Janicke, H. (2020). A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports. IEEE Access, 8(2020), 209802-209834. https://doi.org/10.1109/ACCESS.2020.3036728.
  • Aliyu, A., Maglaras, L., He, Y., Yevseyeva, I., Boiten, E., Cook, A., Janicke, H. (2020). A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom. Applied Sciences, 10(10), article number 3660. https://doi.org/10.3390/app10103660.
  • Mothi, D., Janicke, H., Wagner, I. (2020). A novel principle to validate digital forensic models. Forensic Science International: Digital Investigation, 33(June 2020), article number 200904. https://doi.org/10.1016/j.fsidi.2020.200904.

Conference Publications

  • Ahmim, A., Ferrag, M., Maglaras, L., Derdour, M., Janicke, H., Drivas, G. (2020). Taxonomy of Supervised Machine Learning for Intrusion Detection Systems. Springer Proceedings in Business and Economics (619-628). Springer. https://doi.org/10.1007/978-3-030-36126-6_69.
  • Zheng, Y., Pal, A., Abuadbba, S., Pokhrel, SR., Nepal, S., Janicke, H. (2020). Towards IoT Security Automation and Orchestration. Proceedings 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications TPS-ISA 2020 (55-63). IEEE. https://doi.org/10.1109/TPS-ISA50397.2020.00018.
  • Ahmim, A., Ferrag, M., Maglaras, L., Derdour, M., Janicke, H. (2020). A Detailed Analysis of Using Supervised Machine Learning for Intrusion Detection. Springer Proceedings in Business and Economics (629-639). Springer. https://doi.org/10.1007/978-3-030-36126-6_70.
  • Janicke, H., Abuadbba, S., Nepal, S. (2020). Security and Privacy for a Sustainable Internet of Things. Proceedings 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications TPS-ISA 2020 (12-19). Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/TPS-ISA50397.2020.00013.
  • Papathanasaki, M., Dimitriou, G., Maglaras, L., Vasileiou, I., Janicke, H. (2020). From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?. ACM International Conference Proceeding Series (334-339). Association for Computing Machinery. https://doi.org/10.1145/3437120.3437335.
  • Moustafa, N., Keshk, M., Debie, E., Janicke, H. (2020). Federated TON_IoT windows datasets for evaluating AI-based security applications. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 (848-855). IEEE. https://doi.org/10.1109/TrustCom50675.2020.00114.
  • Drivas, G., Chatzopoulou, A., Maglaras, L., Lambrinoudakis, C., Cook, A., Janicke, H. (2020). A NIS Directive Compliant Cybersecurity Maturity Assessment Framework. Proceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020 (1641-1646). IEEE. https://doi.org/10.1109/COMPSAC48688.2020.00-20.

Journal Articles

  • Vitunskaite, M., He, Y., Brandstetter, T., Janicke, H. (2019). Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. Computers and Security, 83(Jun-19), 313-331. https://doi.org/10.1016/j.cose.2019.02.009.
  • Evans, M., He, Y., Luo, C., Yevseyeva, I., Janicke, H., Zamani, E., Maglaras, L. (2019). Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique. IEEE Access, 7(30-Sep-19), 142147-142175. https://doi.org/10.1109/ACCESS.2019.2944615.
  • Evans, M., He, Y., Yevseyeva, I., Janicke, H. (2019). Published incidents and their proportions of human error. Information and Computer Security, 27(3), 343-357. https://doi.org/10.1108/ICS-12-2018-0147.
  • Evans, M., He, Y., Maglaras, L., Janicke, H. (2019). HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers and Security, 80(January 2019), 74-89. https://doi.org/10.1016/j.cose.2018.09.002.
  • Hadlington, L., Popovac, M., Janicke, H., Yevseyeva, I., Jones, K. (2019). Exploring the role of work identity and work locus of control in information security awareness. Computers and Security, 81(March 2019), 41-48. https://doi.org/10.1016/j.cose.2018.10.006.
  • Evans, M., He, Y., Maglaras, L., Yevseyeva, I., Janicke, H. (2019). Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. International Journal of Medical Informatics, 127(Jul-19), 109-119. https://doi.org/10.1016/j.ijmedinf.2019.04.019.
  • Al-Barnawi, A., He, Y., Maglaras, L., Janicke, H. (2019). Electronic medical records and risk management in hospitals of Saudi Arabia. Informatics for Health and Social Care, 44(2), 189-203. https://doi.org/10.1080/17538157.2018.1434181.
  • Evans, M., He, Y., Luo, C., Yevseyeva, I., Janicke, H., Maglaras, L. (2019). Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form. IEEE Access, 7(5-Jul-19), 102087-102101. https://doi.org/10.1109/ACCESS.2019.2927195.
  • Ferrag, M., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., Janicke, H. (2019). Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet of Things Journal, 6(2), 2188-2204. https://doi.org/10.1109/JIOT.2018.2882794.
  • Robinson, M., Jones, K., Janicke, H., Maglaras, L. (2019). Developing cyber peacekeeping: Observation, monitoring and reporting. Government Information Quarterly: an international journal of information technology management, policies, and practices, 36(2), 276-293. https://doi.org/10.1016/j.giq.2018.12.001.
  • Cruz, B., Gómez-Meire, S., Ruano-Ordás, D., Janicke, H., Yevseyeva, I., Méndez, J. (2019). A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets. Journal of Scientific Programming, 2019(29 July 2019), article number 9067512. https://doi.org/10.1155/2019/9067512.
  • Luh, R., Janicke, H., Schrittwieser, S. (2019). AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes. Computers and Security, 84(July 2019), 120-147. https://doi.org/10.1016/j.cose.2019.03.015.

Conference Publications

  • Drivas, G., Maglaras, L., Janicke, H., Ioannidis, S. (2019). Cybersecurity assessment of the public sector in Greece. European Conference on Information Warfare and Security, ECCWS (162-171). Academic Conferences and Publishing International Limited. https://ro.ecu.edu.au/ecuworkspost2013/11875.
  • Ahmim, A., Maglaras, L., Ferrag, M., Derdour, M., Janicke, H. (2019). A novel hierarchical intrusion detection system based on decision tree and rules-based models. Proceedings - 15th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2019 (228-233). IEEE. https://doi.org/10.1109/DCOSS.2019.00059.
  • Maglaras, L., Ferrag, M., Derhab, A., Mukherjee, M., Janicke, H. (2019). Cyber Security: From Regulations and Policies to Practice. Springer Proceedings in Business and Economics (763-770). Springer Science and Business Media B.V.. https://doi.org/10.1007/978-3-030-12453-3_88.
  • Ferrag, M., Maglaras, L., Janicke, H. (2019). Blockchain and Its Role in the Internet of Things. Springer Proceedings in Business and Economics (1029-1038). Springer Science and Business Media B.V.. https://doi.org/10.1007/978-3-030-12453-3_119.
  • Luo, C., Soygazi, H., Janicke, H., He, Y. (2019). Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS). Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS (3454-3457). IEEE. https://doi.org/10.1109/EMBC.2019.8857166.
  • Kosmanos, D., Pappas, A., Aparicio-Navarro, F., Maglaras, L., Janicke, H., Boiten, E., Argyriou, A. (2019). Intrusion detection system for platooning connected autonomous vehicles. 2019 4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, SEEDA-CECNSM 2019 (article number 8908528). IEEE. https://doi.org/10.1109/SEEDA-CECNSM.2019.8908528.

Book Chapters

  • Cook, A., Smith, R., Maglaras, L., Janicke, H. (2018). SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (1168-1183). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch057.
  • Cope, J., Maglaras, L., Siewe, F., Chen, F., Janicke, H. (2018). A Framework for Minimizing Data Leakage from Nonproduction Systems. Big Data Analytics: Tools and Technology for Effective Planning (167-194). CRC Press. https://doi.org/10.1201/b21822.
  • Vourgidis, I., Carter, J., Maglaras, L., Janicke, H., Folia, Z., Fragkou, P. (2018). A Novel Method for Calculating Customer Reviews Ratings. Handbook of Research on Contemporary Perspectives on Web-Based Systems (460-478). IGI Global. https://doi.org/10.4018/978-1-5225-5384-7.ch020.

Journal Articles

  • Cook, A., Maglaras, L., Smith, R., Janicke, H. (2018). Managing incident response in the industrial internet of things. International Journal of Internet Technology and Secured Transactions, 8(2), 251-276. https://doi.org/10.1504/IJITST.2018.093336.
  • Ferrag, M., Maglaras, L., Janicke, H., Jiang, J., Shu, L. (2018). A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustainable Cities and Society, 38(April 2018), 806-835. https://doi.org/10.1016/j.scs.2017.12.041.
  • Kosmanos, D., Maglaras, L., Mavrovouniotis, M., Moschoyiannis, S., Argyriou, A., Maglaras, A., Janicke, H. (2018). Route Optimization of Electric Vehicles Based on Dynamic Wireless Charging. IEEE Access, 6(3-Jul-18), 42551-42565. https://doi.org/10.1109/ACCESS.2018.2847765.
  • Robinson, M., Jones, K., Janicke, H., Maglaras, L. (2018). An introduction to cyber peacekeeping. Journal of Network and Computer Applications, 114(15 July 2018), 70-87. https://doi.org/10.1016/j.jnca.2018.04.010.
  • Ferrag, M., Maglaras, L., Argyriou, A., Kosmanos, D., Janicke, H. (2018). Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. Journal of Network and Computer Applications, 101(1-Jan-18), 55-82. https://doi.org/10.1016/j.jnca.2017.10.017.
  • Luh, R., Schramm, G., Wagner, M., Janicke, H., Schrittwieser, S. (2018). SEQUIN: a grammar inference framework for analyzing malicious system behavior. Journal of Computer Virology and Hacking Techniques, 14(4), 291-311. https://doi.org/10.1007/s11416-018-0318-x.
  • Maglaras, L., Kim, K., Janicke, H., Ferrag, M., Rallis, S., Fragkou, P., Maglaras, A., Cruz, T. (2018). Cyber security of critical infrastructures. ICT Express, 4(1), 42-45. https://doi.org/10.1016/j.icte.2018.02.001.
  • Coffey, K., Smith, R., Maglaras, L., Janicke, H. (2018). Vulnerability Analysis of Network Scanning on SCADA Systems. Security and Communication Networks, 2018(13-Mar-18), article number 3794603. https://doi.org/10.1155/2018/3794603.

Conference Publications

  • Ferrag, M., Derhab, A., Maglaras, L., Mukherjee, M., Janicke, H. (2018). Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges. 2018 International Conference on Smart Communications in Network Technologies, SaCoNeT 2018 (37-42). IEEE. https://doi.org/10.1109/SaCoNeT.2018.8585538.
  • Alothman, B., Janicke, H., Yerima, S. (2018). Class Balanced Similarity-Based Instance Transfer Learning for Botnet Family Classification. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (99-113). Springer. https://doi.org/10.1007/978-3-030-01771-2_7.

Book Chapters

  • Maglaras, L., Janicke, H., Jiang, J., Crampton, A. (2017). Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems. Security Solutions and Applied Cryptography in Smart Grid Communications (160-178). IGI Global. https://doi.org/10.4018/978-1-5225-1829-7.ch009.
  • Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Janicke, H., Jones, K. (2017). CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems. Security Solutions and Applied Cryptography in Smart Grid Communications (226-241). IGI Global. https://doi.org/10.4018/978-1-5225-1829-7.ch012.

Journal Articles

  • Cope, J., Siewe, F., Chen, F., Maglaras, L., Janicke, H. (2017). On data leakage from non-production systems. Information and Computer Security, 25(4), 454-474. https://doi.org/10.1108/ICS-02-2017-0004.
  • Luh, R., Marschalek, S., Kaiser, M., Janicke, H., Schrittwieser, S. (2017). Semantics-aware detection of targeted attacks: a survey. Journal of Computer Virology and Hacking Techniques, 13(1), 47-85. https://doi.org/10.1007/s11416-016-0273-3.
  • Ferrag, M., Maglaras, L., Janicke, H., Jiang, J., Shu, L. (2017). Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks, 2017(6-Nov-17), article number 6562953. https://doi.org/10.1155/2017/6562953.
  • Cook, A., Janicke, H., Smith, R., Maglaras, L. (2017). The industrial control system cyber defence triage process. Computers and Security, 70(7/24/2017), 467-481. https://doi.org/10.1016/j.cose.2017.07.009.
  • Chapman, S., Smith, R., Maglaras, L., Janicke, H. (2017). Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?. Journal of Sensor and Actuator Networks, 6(3), article number 16. https://doi.org/10.3390/jsan6030016.
  • Wood, A., He, Y., Maglaras, L., Janicke, H. (2017). A security architectural pattern for risk management of industry control systems within critical national infrastructure. International Journal of Critical Infrastructures, 13(2-3), 113-132. https://doi.org/10.1504/IJCIS.2017.088229.
  • Cook, A., Janicke, H., Maglaras, L., Smith, R. (2017). An assessment of the application of IT security mechanisms to industrial control systems. International Journal of Internet Technology and Secured Transactions, 7(2), 144-174. https://doi.org/10.1504/IJITST.2017.087163.

Conference Publications

  • Jones, A., Angelopoulou, O., Vidalis, S., Janicke, H. (2017). The 2016 Hard Disk Study on Information Available on the Second Hand Market in the UK. Proceedings of the 16th European Conference on Cyber Warfare and Security (193-199). Academic Conferences and Publishing International Limited.
  • Nicholson, A., Janicke, H., Jones, A., Alnajaar, A. (2017). Deceptive security based on authentication profiling. Proceedings of the 15th Australian Information Security Management Conference, AISM 2017 (140-148). Edith Cowan University.
  • Abwnawar, N., Janicke, H., Smith, R. (2017). Towards location-aware access control and data privacy in inter-cloud communications. 17th IEEE International Conference on Smart Technologies, EUROCON 2017 - Conference Proceedings (739-744). IEEE. https://doi.org/10.1109/EUROCON.2017.8011209.
  • Stewart, B., Rosa, L., Maglaras, L., Cruz, T., Simões, P., Janicke, H. (2017). Effect of network architecture changes on OCSVM based intrusion detection system. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (90-100). Springer. https://doi.org/10.1007/978-3-319-52569-3_8.
  • Hawthorne, G., He, Y., Maglaras, L., Janicke, H. (2017). Security visualization: Detecting denial of service. Industrial Networks and Intelligent Systems: Second International Conference, INISCOM 2016 Proceedings (39-49). Springer. https://doi.org/10.1007/978-3-319-52569-3_4.
  • Luh, R., Schrittwieser, S., Marschalek, S., Janicke, H. (2017). Design of an anomaly-based threat detection & explication system. ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy (397-402). Scitpress. https://doi.org/10.5220/0006205203970402.
  • Abwnawar, N., Janicke, H., Smith, R., Lasebae, A. (2017). Towards data privacy in heterogeneous cloud environments: An extension to the SANTA policy language. 2017 2nd International Conference on Fog and Mobile Edge Computing, FMEC 2017 (14-19). IEEE. https://doi.org/10.1109/FMEC.2017.7946401.

Book Chapters

  • Ayres, N., Maglaras, L., Janicke, H. (2016). OSNs as Cyberterrorist Weapons against the General Public. Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities (179-197). IGI Global. https://doi.org/10.4018/978-1-5225-1938-6.ch008.

Journal Articles

  • Ayres, N., Maglaras, L., Janicke, H., Smith, R., He, Y. (2016). The mimetic virus: A vector for cyberterrorism. International Journal of Business Continuity and Risk Management, 6(4), 259-271.
  • Maglaras, L., Al-Bayatti, A., He, Y., Wagner, I., Janicke, H. (2016). Social internet of vehicles for smart cities. Journal of Sensor and Actuator Networks, 5(1), article number 3. https://doi.org/10.3390/jsan5010003.
  • Evans, M., Maglaras, L., He, Y., Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667-4679. https://doi.org/10.1002/sec.1657.
  • Kosmanos, D., Prodromou, N., Argyriou, A., Maglaras, L., Janicke, H. (2016). MIMO Techniques for Jamming Threat Suppression in Vehicular Networks. Mobile Information Systems, 2016(27-Oct-16), article number 8141204. https://doi.org/10.1155/2016/8141204.

Conference Publications

  • Riebl, R., Monz, M., Varga, S., Maglaras, L., Janicke, H., Al-Bayatti, A., Facchi, C. (2016). Improved Security Performance for VANET Simulations. IFAC-PapersOnLine (233-238). Elsevier. https://doi.org/10.1016/j.ifacol.2016.11.173.
  • Wagner, I., He, Y., Rosenberg, D., Janicke, H. (2016). User interface design for privacy awareness in eHealth technologies. 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016 (38-43). IEEE. https://doi.org/10.1109/CCNC.2016.7444728.
  • Basaras, P., Maglaras, L., Katsaros, D., Janicke, H. (2016). A Robust Eco-Routing Protocol against Malicious Data in Vehicular Networks. Proceedings - 2015 8th IFIP Wireless and Mobile Networking Conference, WMNC 2015 (184-191). IEEE. https://doi.org/10.1109/WMNC.2015.27.
  • Abubakar, A., Zadeh, P., Janicke, H., Howley, R. (2016). Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft. 2016 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2016 (article number 7502349). IEEE. https://doi.org/10.1109/CyberSecPODS.2016.7502349.
  • Yevseyeva, I., Fernandes, V., Van Moorsel, A., Janicke, H., Emmerich, M. (2016). Two-stage Security Controls Selection. Procedia Computer Science (971-978). Elsevier. https://doi.org/10.1016/j.procs.2016.09.261.

Research Projects

  • Semantic modelling of Digital Twins for Cyber Security Defence Automation, Commonwealth Scientific and Industrial Research Organisation (CSIRO), CSIRO - Scholarship, 2021 ‑ 2024, $168,500.
  • Cyber Strategy for Boards, Cyber Security Research Centre Ltd, Grant, 2022 ‑ 2024, $152,500.
  • CAESAR - Cyber Assurance in Energy Systems for Security and Resilience, Cyber Security Research Centre Ltd, Grant, 2023 ‑ 2024, $204,200.
  • Executive gamification for cyber security – Game board production (Phase 2), Cyber Security Research Centre Ltd, Grant, 2022 ‑ 2024, $175,000.
  • Cyber BUDDY, Cyber Security Research Centre Ltd, Project Grant, 2023 ‑ 2024, $237,500.
  • Table top executive gamification for cyber security, Cyber Security Research Centre Ltd, Project Grant, 2021, $33,587.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy, Semantic Modelling of Digital Twins for Cybersecurity Defence Automation

Associate Supervisor

  • Doctor of Philosophy, An Integrated Approach to Deep Learning for Sophisticated Malware Detection
No data available
Skip to top of page