Name
Affiliation
Papers
GREGORY EPIPHANIOU
Univ Bedfordshire, Inst Res Applicable Comp, Pk St, Luton, Beds, England
25
Collaborators
Citations 
PageRank 
60
54
10.12
Referers 
Referees 
References 
197
637
216
Search Limit
100637
Title
Citations
PageRank
Year
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition00.342022
Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems00.342022
Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks00.342022
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks00.342021
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things00.342021
A privacy-preserving route planning scheme for the Internet of Vehicles00.342021
Cyber Security In The Age Of Covid-19: A Timeline And Analysis Of Cyber-Crime And Cyber-Attacks During The Pandemic40.452021
Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives90.432020
Corrections to “Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security”00.342020
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.20.382019
Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems.00.342019
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace00.342019
AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms00.342019
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.40.392018
Quantisation feasibility and performance of RSS-based secret key extraction in VANETs00.342018
Physical characteristics of wireless communication channels for secret key establishment: A survey of the research.10.362018
Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility.10.382017
Anonymity networks and the fragile cyber ecosystem.20.402016
Internet of Things Forensics: Challenges and approaches.171.132013
Guidelines for Internet of Things Deployment Approaches - The Thing Commandments.60.512013
Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls00.342012
A Theoretical Framework For Addressing Trust In Open Pervasive Networks00.342011
Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss80.612010
The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729.00.342010
An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes00.342010