Helge Janicke

ORCID: 0000-0002-1345-2829
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Smart Grid Security and Resilience
  • Cybersecurity and Cyber Warfare Studies
  • Access Control and Trust
  • User Authentication and Security Systems
  • Anomaly Detection Techniques and Applications
  • Vehicular Ad Hoc Networks (VANETs)
  • Digital and Cyber Forensics
  • Security and Verification in Computing
  • Software Engineering Research
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • Opportunistic and Delay-Tolerant Networks
  • Distributed systems and fault tolerance
  • Digital Transformation in Industry
  • IoT and Edge/Fog Computing
  • Risk and Safety Analysis
  • Peer-to-Peer Network Technologies
  • Privacy, Security, and Data Protection
  • Advanced Authentication Protocols Security
  • Adversarial Robustness in Machine Learning

Edith Cowan University
2019-2025

De Montfort University
2012-2022

University of Guelma
2022

Badji Moktar-Annaba University
2022

ACT Government
2022

ORCID
2020

The King's College
2018

King Saud University
2018

Guangdong University of Petrochemical Technology
2018

Technische Hochschule Ingolstadt
2015

The recent outbreak of COVID-19 has taken the world by surprise, forcing lockdowns and straining public health care systems. is known to be a highly infectious virus, infected individuals do not initially exhibit symptoms, while some remain asymptomatic. Thus, non-negligible fraction population can, at any given time, hidden source transmissions. In response, many governments have shown great interest in smartphone contact tracing apps that help automate difficult task all contacts newly...

10.1109/access.2020.3010226 article EN cc-by IEEE Access 2020-01-01

In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized federated learning. Specifically, the has been generated using purpose-built IoT/IIoT testbed with large representative set devices, sensors, protocols cloud/edge configurations. The data are from various devices (more than 10 types) such as Low-cost...

10.1109/access.2022.3165809 article EN cc-by IEEE Access 2022-01-01

This paper presents a comprehensive survey of the existing blockchain protocols for Internet Things (IoT) networks. We start by describing blockchains and summarizing surveys that deal with technologies. Then, we provide an overview application domains technologies in IoT, e.g, Vehicles, Energy, Cloud, Fog computing, etc. Moreover, classification threat models, which are considered IoT networks, into five main categories, namely, identity-based attacks, manipulation-based cryptanalytic...

10.1109/jiot.2018.2882794 article EN IEEE Internet of Things Journal 2018-11-22

In this paper, a comprehensive survey of authentication protocols for Internet Things (IoT) is presented. Specifically more than forty developed or applied in the context IoT are selected and examined detail. These categorized based on target environment: (1) Machine to Communications (M2M), (2) Vehicles (IoV), (3) Energy (IoE), (4) Sensors (IoS). Threat models, countermeasures, formal security verification techniques used addition taxonomy comparison that terms network model, specific...

10.1155/2017/6562953 article EN cc-by Security and Communication Networks 2017-01-01

This paper proposes a novel intrusion detection system (IDS) that combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm Forest PA. Specifically, the first second method take as inputs features of data set, classify network traffic Attack/Benign. The third uses initial set in addition to outputs inputs. experimental results obtained by analyzing proposed IDS using CICIDS2017 dataset, attest their superiority terms...

10.1109/dcoss.2019.00059 article EN 2019-05-01

This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm Forest PA. Specifically, the first second method take as inputs features of data set, classify network traffic Attack/Benign. third uses initial set in addition to outputs inputs. experimental results obtained by analyzing proposed IDS...

10.3390/fi12030044 article EN cc-by Future Internet 2020-03-02

In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet Things (IoT) applications. Specifically, first provide review learning-based and privacy systems several types IoT applications, including, Industrial IoT, Edge Computing, Drones, Healthcare Things, Vehicles, etc. Second, use blockchain malware/intrusion detection applications is discussed. Then, vulnerabilities systems. Finally, three...

10.1109/access.2021.3118642 article EN cc-by IEEE Access 2021-01-01

Digital twins (DTs) are an emerging digitalization technology with a huge impact on today's innovations in both industry and research. DTs can significantly enhance our society quality of life through the virtualization real-world physical system, providing greater insights about their operations assets, as well enhancing resilience real-time monitoring proactive maintenance. also pose significant security risks, intellectual property is encoded more accessible, continued synchronization to...

10.1016/j.icte.2024.05.007 article EN cc-by ICT Express 2024-05-21

Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets, services that are vital for functioning well-being of a society, economy, or nation. However, rapid proliferation dynamism today's cyber threats in digital environments may disrupt CI functionalities, which would have debilitating impact on public safety, economic stability, national security. This has led much interest effective cybersecurity solutions regarding automation intelligent...

10.1016/j.iot.2024.101110 article EN cc-by Internet of Things 2024-02-05

Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring managing electric power generation, transmission distribution. In the age of Internet Things, SCADA has evolved into big, complex distributed that prone to be conventional in addition new threats. Many security methods can applied such systems, having mind both high efficiency, real time intrusion identification low overhead required.

10.1016/j.icte.2018.02.001 article EN cc-by-nc-nd ICT Express 2018-02-21

Digital devices are becoming increasingly ubiquitous and interconnected. Their evolution to intelligent parts of a digital ecosystem creates novel applications with so far unresolved security issues. A particular example is vehicle. As vehicles evolve from simple means transportation smart entities new sensing communication capabilities, they become active members city. The Internet Vehicles (IoV) consists that communicate each other public networks through V2V (vehicle-to-vehicle), V2I...

10.3390/jsan5010003 article EN cc-by Journal of Sensor and Actuator Networks 2016-02-06

One of the barriers for adoption electric vehicles (EVs) is anxiety around limited driving range. Recent proposals have explored charging EVs on move, using dynamic wireless which enables power exchange between vehicle and grid while moving. In this paper, we focus intelligent routing in need so that they can make most efficient use so-called mobile energy disseminators (MEDs) operate as stations. We present a method MEDs road network, based constraint logic programming optimization...

10.1109/access.2018.2847765 article EN cc-by IEEE Access 2018-01-01

Abstract There continue to be numerous breaches publicised pertaining cybersecurity despite security practices being applied within industry for many years. This paper is intended the first in a number of papers as research into assurance processes. compiled based on current related and impact human element it. The objective this work identify elements that would benefit from further development literature review findings. results outlined present need field look established areas effective...

10.1002/sec.1657 article EN Security and Communication Networks 2016-10-20

10.1016/j.cose.2014.11.007 article EN Computers & Security 2014-11-30

The Electric Vehicles (EVs) market has seen rapid growth recently despite the anxiety about driving range. Recent proposals have explored charging EVs on move, using dynamic wireless that enables power exchange between vehicle and grid while is moving. Specifically, part of literature focuses intelligent routing in need charging. Inter-Vehicle communications (IVC) play an integral role around a static station or road network. However, IVC vulnerable to variety cyber attacks such as spoofing....

10.1016/j.array.2019.100013 article EN cc-by Array 2019-12-02

Existing cyber security solutions have been basically developed using knowledge-based models that often cannot trigger new cyber-attack families. With the boom of Artificial Intelligence (AI), especially Deep Learning (DL) algorithms, those plugged-in with AI to discover, trace, mitigate or respond incidents events. The algorithms demand a large number heterogeneous data sources train and validate systems. This paper presents description datasets, so-called ToN_IoT, which involve federated...

10.1109/trustcom50675.2020.00114 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020-12-01

Digital twin technology today is diverse and emerging its full potential not yet widely understood. The concept of a digital allows for the analysis, design, optimisation evolution systems to take place fully digital, or in conjunction with cyber-physical system improve speed, accuracy efficiency when compared traditional engineering approaches. twins continue be that enables new paradigms, such as Industry 4.0 Factories Future well generating improved efficiencies within existing systems....

10.1109/seeda-cecnsm53056.2021.9566277 article EN 2021-09-24
Coming Soon ...