A supervised intrusion detection system for smart home IoT devices E Anthi, L Williams, M Słowińska, G Theodorakopoulos, P Burnap IEEE Internet of Things Journal 6 (5), 9042-9053, 2019 | 418 | 2019 |
Pulse: an adaptive intrusion detection for the internet of things E Anthi, L Williams, P Burnap IET Digital Library, 2018 | 113 | 2018 |
Adversarial attacks on machine learning cybersecurity defences in industrial control systems E Anthi, L Williams, M Rhode, P Burnap, A Wedgbury Journal of Information Security and Applications 58, 102717, 2021 | 111 | 2021 |
Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge P Radanliev, D De Roure, R Walton, M Van Kleek, RM Montalvo, ... SN Applied Sciences 2, 1-8, 2020 | 53 | 2020 |
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks E Anthi, L Williams, A Javed, P Burnap computers & security 108, 102352, 2021 | 49 | 2021 |
EclipseIoT: A secure and adaptive hub for the Internet of Things E Anthi, S Ahmad, O Rana, G Theodorakopoulos, P Burnap Computers & Security 78, 477-490, 2018 | 42 | 2018 |
Definition of cyber strategy transformation roadmap for standardisation of IoT risk impact assessment with a goal-oriented approach and the internet of things micro Mart P Radanliev, DC De Roure, JRC Nurse, P Burnap, E Anthi, U Ani, ... University of Oxford combined working papers and project reports prepared …, 2019 | 31 | 2019 |
Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics in extreme … P Radanliev, D De Roure, K Page, M Van Kleek, O Santos, LT Maddox, ... Safety in Extreme Environments 2, 219-230, 2020 | 30 | 2020 |
Definition of Internet of Things (IoT) Cyber Risk–Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact Assessment P Radanliev, D De Roure, JRC Nurse, P Burnap, E Anthi, U Ani, O Santos, ... Preprints, 2019 | 27 | 2019 |
Cyber risk from IoT technologies in the supply chain–discussion on supply chains decision support system for the digital economy P Radanliev, DC De Roure, JR Nurse, P Burnap, E Anthi, U Ani, ... no. March, 2019 | 24 | 2019 |
A three-tiered intrusion detection system for industrial control systems E Anthi, L Williams, P Burnap, K Jones Journal of Cybersecurity 7 (1), tyab006, 2021 | 18 | 2021 |
Secure data sharing and analysis in cloud-based energy management systems E Anthi, A Javed, O Rana, G Theodorakopoulos Cloud Infrastructures, Services, and IoT Systems for Smart Cities: Second …, 2018 | 17 | 2018 |
Cyber risk management for the internet of things P Radanliev, D Charles De Roure, P Burnap, E Anthi, A Uchenna, ... | 16 | 2019 |
Cyber risk from IoT technologies in the supply chain–decision support system for the Industry 4.0 P Radanliev, DCD Roure, JRC Nurse, P Burnap, E Anthi, U Ani, ... University of Oxford, 2019 | 12 | 2019 |
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge P Radanliev, D De Roure, M Van Kleek, U Ani, P Burnap, E Anthi, ... Environment Systems and Decisions 41, 236-247, 2021 | 10 | 2021 |
Cybersecurity challenges in the offshore oil and gas industry: an Industrial Cyber-Physical Systems (ICPS) perspective AS Mohammed, P Reinecke, P Burnap, O Rana, E Anthi ACM Transactions on Cyber-Physical Systems (TCPS) 6 (3), 1-27, 2022 | 9 | 2022 |
G. eodorakopoulos, and P E Anthi, L Williams, M Slowinska Burnap,“A supervised intrusion detection system for smart home iot devices …, 2019 | 9 | 2019 |
Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication AS Mohammed, E Anthi, O Rana, N Saxena, P Burnap Computers & Security 124, 103007, 2023 | 8 | 2023 |
Definition of Internet of Things (IoT) Cyber Risk–Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact … P Radanliev, DCD Roure, JRC Nurse, P Burnap, E Anthi, U Ani, ... Oxford: Preprints. doi, 2019 | 6 | 2019 |
Sensitive data in smartphone applications: Where does it go? can it be intercepted? E Anthi, G Theodorakopoulos Security and Privacy in Communication Networks: SecureComm 2017 …, 2018 | 6 | 2018 |