Gregory Epiphaniou

Gregory Epiphaniou
University of Bedfordshire · Department of Computer Science and Technology

Dr

About

82
Publications
34,687
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
900
Citations

Publications

Publications (82)
Article
Full-text available
A growing number of adversaries are targeting space missions, and as such, there have been increasing academic and industrial efforts in identifying threats and risks through modelling techniques. In parallel, the research communities are collaborating to lower the entry barriers for space activities to deliver more innovative and cost-effective sp...
Preprint
p>A number of research in Information and Communication Technology (ICT) have shown that usability is an important goal for software-based interactive systems and products for a wider acceptance by their end-users. To evaluate the usability of a system under design, usability evaluation methods predominantly rely on subject matter experts or tester...
Preprint
p>A number of research in Information and Communication Technology (ICT) have shown that usability is an important goal for software-based interactive systems and products for a wider acceptance by their end-users. To evaluate the usability of a system under design, usability evaluation methods predominantly rely on subject matter experts or tester...
Conference Paper
Full-text available
Autonomous Debris Removal allows debris in space to be collected and removed safely from the orbit. However, it relies on the integrity of the sensor data such as LiDAR to estimate the pose of the target (debris). If the sensor data is manipulated, the service vehicle may fail to grasp the target or in worse case damage the vehicle itself or nearby...
Conference Paper
Full-text available
The space industry is rapidly growing at present and is not limited to the traditional players like The National Aeronautics and Space Administration (NASA) and European Space Agency (ESA), and it has spread to medium and small commercial organisations as well. The advancement in both hardware and software technologies is leading to the industry pl...
Article
Industrial Control Systems (ICS) are integral parts of smart cities and critical to modern societies. Despite indisputable opportunities introduced by disruptor technologies, they proliferate the cybersecurity threat landscape, which is increasingly more hostile. The quantum of sensors utilised by ICS aided by Artificial Intelligence (AI) enables d...
Article
Advanced cyber attackers often 'pivot' through several devices in such complex infrastructure to obfuscate their footprints and overcome connectivity restrictions. However, prior pivot attack detection strategies present concerning limitations. This paper addresses an improvement of cyber defence with APIVADS, a novel adaptive pivoting detection sc...
Chapter
The systematic integration of the Internet of Things (IoT) into the supply chain creates opportunities for automation in smart homes from concept to practice. Our research shows that residential burglary remains a problem. Despite the paradigm shift in ubiquitous computing, the maturity of the physical security controls integrating IoT in residenti...
Article
Full-text available
The rise of NewSpace provides a platform for small and medium businesses to commercially launch and operate satellites in space. In contrast to traditional satellites, NewSpace provides the opportunity for delivering computing platforms in space. However, computational resources within space are usually expensive and satellites may not be able to c...
Preprint
Full-text available
The rise of NewSpace provides a platform for small and medium businesses to commercially launch and operate satellites in space. In contrast to traditional satellites, NewSpace provides the opportunity for delivering computing platforms in space. However, computational resources within space are usually expensive and satellites may not be able to c...
Article
Internet of the Things (IoT) is being integrated into applications that are continuing to reshape many elements of our daily life. One of the major application areas is the Internet of Vehicles which can enhance existing capabilities, such as efficient vehicle route planning. Such systems usually rely on real-time traffic information that includes...
Article
Full-text available
Wireless, sensor and actuator technologies are often central to sensing or communication critical systems [...]
Article
Modern network infrastructures host converged applications that demand rapid elasticity of services, increased security, and ultra-fast reaction times. The Tactile Internet promises to facilitate the delivery of these services while enabling new economies of scale for high fidelity of machine-to-machine and human-to-machine interactions. Unavoidabl...
Article
Drones, also known as Unmanned Aerial Vehicles (UAVs), are one of the highly emerging technologies of the modern day. Due to their small size, flying capabilities, and complex machinery, drones can be deployed in diverse fields, including agriculture, sports, entertainment, parcel delivery, disaster management, search and rescue, emergency medicine...
Article
Big data enables the optimization of complex supply chains through Machine Learning (ML)-based data analytics. However, data analytics comes with challenges such as the loss of control and privacy leading to increased risk of data breaches. Federated Learning (FL) is an approach in the ML arena that promises privacy-preserving and distributed model...
Article
Privacy and security have long been perceived as competing objectives, but they both exist in a state of tension within systems. Engineers may be tempted to consider security as essential, while privacy is a nice-to-have. Prof Carsten Maple, Dr Gregory Epiphaniou and Mirko Bottarelli of the University of Warwick and the Alan Turing Institute explai...
Article
Full-text available
Connected cars have a massive impact on the automotive sector, and whilst this catalyst and disruptor technology introduce threats, it brings opportunities to address existing vehicle-related crimes such as carjacking. Connected cars are fitted with sensors, and capable of sophisticated computational processing which can be used to model and differ...
Article
The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique c...
Article
Full-text available
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicle (V2V) communications are of greatest importance to facilitate autonomous driving. The current state-of-the-art for secure data exchange in V2V communications relies on public-key cryptography (PKC) consuming significant computational and energy res...
Article
Full-text available
By law, schools are required to protect the well-being of students against problems such as on-campus bullying and physical abuse. In the UK, a report by the Office for Education (OfE) showed 17% of young people had been bullied during 2017–2018. This problem continues to prevail with consequences including depression, anxiety, suicidal thoughts, a...
Chapter
Full-text available
Cybercrime has evolved rapidly in recent years since societies are becoming more reliant on digital communications with e-services inevitably replacing legacy systems. This has redefined our ecosystem to a highly interconnected Cyber-Physical-Natural (CPN) world where various aspects of our daily life including cybercrime are being realized online...
Article
As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Users cannot be expected to tackle this threat alone, and many current solutions available for network monitoring are simply not accessible or can be difficult to implement f...
Article
Internet of Vehicles have attracted a lot of attention in the automotive industry and academia recently. We are witnessing rapid advances in vehicular technologies which comprise many components such as On-Board Units (OBUs) and sensors. These sensors generate a large amount of data, which can be used to inform and facilitate decision making (for e...
Article
Full-text available
The world is experiencing a rapid growth of smart cities accelerated by Industry 4.0, including the Internet of Things (IoT), and enhanced by the application of emerging innovative technologies which in turn create highly fragile and complex cyber–physical–natural ecosystems. This paper systematically identifies peer-reviewed literature and explici...
Preprint
Full-text available
The COVID-19 pandemic was a remarkable unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique cy...
Chapter
Precision healthcare is an emerging concept that will see technology-driven digital transformation of the health service. It enables customised patient outcomes via the development of novel, targeted medical approaches with a focus on intelligent, data-centric smart healthcare models. Currently, precision healthcare is seen as a challenging model t...
Chapter
The rise of new digital economies and data-driven supply-chains seeks to revolutionalise the ways information is transferred, processed and analysed across different industry segments in the value-creation. This data-driven manufacturing revolution promises to increase productivity, democratise data sharing capabilities and foster industrial growth...
Chapter
Forensic age estimation is usually requested by courts, but applications can go beyond the legal requirement to enforce policies or offer age-sensitive services. Various biological features such as the face, bones, skeletal and dental structures can be utilised to estimate age. This article will cover how modern technology has developed to provide...
Article
This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT platforms and support service-oriented modelling at high levels of abstraction where fundamental SOA theories and techniques are ful...
Article
Traditional centralized data storage and processing solutions manifest limitations with regards to overall operational cost and the security and auditability of data. One of the biggest issues with existing solutions is the difficulty of keeping track of who has had access to the data and how the data may have changed over its lifetime; while provi...
Article
Current authentication protocols seek to establish authenticated sessions over insecure channels while maintaining a small footprint considering the energy consumption and computational overheads. Traditional authentication schemes must store a form of authentication data on the devices, putting this data at risk. Approaches based on purely public/...
Chapter
Distributed Ledger Technologies are promised to be genuinely disruptive in a variety of industries and sectors, from the food supply, pharmaceutical, real estate, financial services, academia and healthcare. Blockchain technologies vastly improve the flow of data within and among companies and people and transform the way that the Internet is used...
Chapter
Blockchain technology can be incorporated into new systems to facilitate modern Digital Forensics and Incident Response (DFIR). For example, it is widely acknowledged that the Internet-of-Things (IoT) has introduced complexity to the cyberspace, however, incident responders should also realise the advantages presented by these new “Digital Witnesse...
Chapter
Big Data has fast become one of the most adopted computer paradigms within computer science and is considered an equally challenging paradigm for forensics investigators. The Hadoop Distributed File System (HDFS) is one of the most favourable big data platforms within the market, providing an unparalleled service with regards to parallel processing...
Chapter
Security in online gaming is a growing target for hackers due to the amount of money involved in online gaming. Components are used in the security measures implemented for these games, but no single security component is 100% effective. Our research aims to investigate methods of game security and the components used in them, as well as the hacks...
Article
Full-text available
Industrial Control Systems (ICSs) are responsible for the automation of different processes and the overall control of systems that include highly sensitive potential targets such as nuclear facilities, energy-distribution, water-supply, and mass-transit systems. Given the increased complexity and rapid evolvement of their threat landscape, and the...
Chapter
The rise of interconnected “intelligent” objects that move their capabilities from sensing and data processing to decision making will be a disruptive phenomenon that further widens the gaps between legal, regulatory and technological approaches. This research sets out to establish a guided road map through the maze of regulation by incorporating t...
Chapter
Full-text available
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorporating the most important features of the wireless channel in vehicle-to-vehicle (V2V) communication. The proposed model includes surrounding scatterers’ mobility by considering other vehicles; it also includes three-dimensional (3D) multipath propaga...
Chapter
Full-text available
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorporating the most important features of the wireless channel in vehicle-to-vehicle (V2V) communication. Non-reciprocity compensation is combined with turbo codes (TCs) for error reconciliation purposes. For fair comparisons, the indexing technique is ap...
Book
This book aims to highlight the gaps and the transparency issues in the clinical research and trials processes and how there is a lack of information flowing back to researchers and patients involved in those trials. Lack of data transparency is an underlying theme within the clinical research world and causes issues of corruption, fraud, errors a...
Chapter
Research shows that people with long term conditions and disabilities are frequently labelled as vulnerable, and commonly victimised online. They require instrumental support to understand their conditions and empower them to manage their own treatment in everyday life. However, additional short and long term consequences related to cyber-victimisa...
Chapter
Full-text available
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it giv...
Article
Physical layer security protocols have recently been deployed in the context of Wireless communications. These are derived from the intrinsic characteristics of the communication media for key generation, sharing and randomness extraction. These protocols always seek to exhibit both low computational complexity and energy efficiency, whilst also ma...
Chapter
Various researchers have shown that the Common Vulnerability Scoring System (CVSS) has many drawbacks and may not provide a precise view of the risks related to software vulnerabilities. However, many threat intelligence platforms and industry-wide standards are relying on CVSS score to evaluate cyber security compliance. This paper suggests severa...
Conference Paper
Abstract—Vehicular Ad Hoc Networks (VANETs) has emerged as a unique implementation of Mobile Ad Hoc Networks (MANETs). These networks promise to increase road safety and improve the driving experience by exploiting recent advances in wireless technologies for both intra-vehicle and inter-vehicle communications. Physical layer security is a promisin...
Article
Full-text available
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber-threats against such systems. In this paper, we introduce proactive anomaly detection to a use-case of...
Conference Paper
The Internet of Things (IoT) introduces a unique dimension to our relationships with smart Things as objects that belong to us and/or fulfil a direct or indirect objective for us. This relationship can be expected to gradually become one of reliance and maybe eventually one of complete trust. This paper argues that although human agents may increas...
Conference Paper
Abstract. We present an algorithm that allows two users to establish a symmetric cryptographic key by incorporating the most important features of the wireless channel in vehicle-to-vehicle (V2V) communication. Non-reciprocity compensa-tion is combined with turbo codes (TCs) for error reconciliation purposes. For fair comparisons, the indexing tech...
Article
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised for the generation of highly random and symmetric cryptographic keys. However, in a physical-layer key agreement scheme, non-reciprocity due to inherent channel noise and hardware impairments can propagate bit disagreements. This has to be addressed...
Article
Full-text available
Context: Online harassment and stalking have been identified with growing accordance as anti-social behaviours, potentially with extreme consequences including indirect or direct physical injury, emotional distress and/or financial loss. Objective: As part of our ongoing work to research and establish better understanding of cyberstalking, this stu...
Article
Full-text available
This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how mobile users respond to social engineering attacks conducted via mobile devices. The results of this experiment outline a guided mobile phone forensics investigation method which could facilitate the work of digital forensics investigators while analy...
Conference Paper
With the wide spread of Internet applications in both the surface net (Internet) and Darknet, the necessity to safeguard privacy and anonymity has become more prominent than ever. In an attempt to assure untraceability and undetectability between entities, as part of the communication process, traditional confidentiality mechanisms have proved insu...
Article
It is well known that government agencies have had the capability to eavesdrop on public switched telephone networks for many decades.1 However, with the growing use of the Internet and the increasing technical capabilities of agencies to conduct mass surveillance, an individual's right to privacy is of far greater concern in recent years. The ethi...
Article
Full-text available
Service Oriented Computing (SOC) provides a framework for the realization of loosely coupled service oriented applications. Web services are central to the concept of SOC. Currently, research into how web services can be composed to yield QoS optimal composite service has gathered significant attention. However, the number and spread of web service...
Article
Full-text available
With the virtual world becoming part of the social lives of adults and minors alike, new attack vectors emerged to increase the severity of human-related attacks to a level the community have not experience before. This article investigates and shares an outline on how technology could emerge further to counteract and mitigate the damage caused by...
Chapter
Our submission offers a partial articulation of the threats and opportunities posed by the so-called “Dark Web” (DW); namely, the nature of risk(s) posed by criminal DW usage to a civil-society. We propose a DW Forensic route-map wherein there is a need to differentiate as early as possible in the investigative process between those suspected offen...
Article
Full-text available
Several Big data services have been developed on the cloud to meet increasingly complex needs of users. Most times a single Big data service may not be capable in satisfying user requests. As a result, it has become necessary to aggregate services from different Big data providers together in order to execute the user's request. This in turn has po...
Article
To enhance the adoption of Internet of Things (IoT) philosophy for the internet, research into IoT service composition has gathered momentum. In a distributed IoT environment, identifying IoT service among a set of similar service offerings that meets both functional and performance requirements of an IoT application has become important. However,...
Conference Paper
Cognitive radio networks are intelligent networks that can sense the environment and adapt the communication parameters accordingly. These networks find their applications in co-existence of different wireless networks, interference mitigation, and dynamic spectrum access. Unlike traditional wireless networks, cognitive radio networks additionally...
Article
Full-text available
process of aggregating services with disparate functionalities into a new composite service in order to meet increasingly complex needs of users. Service composition process has been accurate on dealing with services having disparate functionalities, however, over the years the number of web services in particular that exhibit similar functionaliti...
Article
Full-text available
We offer a partial articulation of the threats and opportunities posed by the so-called Dark Web (DW). We go on to propose a novel DW attack detection and prediction model. Signalling aspects are considered wherein the DW is seen to comprise a low cost signaling environment. This holds inherent dangers as well as rewards for investigators as well a...
Article
Virtual machine technology has emerged with powerful features, offering several benefits and promising revolutionary outcomes. It is one technology that combines into one package several computing concepts like resource management, emulation, time-sharing, isolation and partitioning. These features have made evidence acquisition and preservation di...