Ryan Heartfield
Cited by
Cited by
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
R Heartfield, G Loukas
ACM Computing Surveys (CSUR) 48 (3), 1-39, 2015
Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning
G Loukas, T Vuong, R Heartfield, G Sakellari, Y Yoon, D Gan
IEEE Access 6 (1), 3491-3508, 2017
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
R Heartfield, G Loukas
Computers & Security 76 (101-127), 2018
You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks
R Heartfield, G Loukas, D Gan
IEEE Access 4, 6910-6928, 2016
A taxonomy of cyber-physical threats and impact in the smart home
R Heartfield, G Loukas, S Budimir, A Bezemskij, JRJ Fontaine, ...
Computers & Security 78, 398-428, 2018
Computation offloading of a vehicle’s continuous intrusion detection workload for energy efficiency and performance
G Loukas, Y Yoon, G Sakellari, T Vuong, R Heartfield
Simulation Modelling Practice and Theory 73, 83-94, 2017
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks
R Heartfield, G Loukas, D Gan
2017 IEEE 15th international conference on software engineering research†…, 2017
On the feasibility of automated semantic attacks in the cloud
R Heartfield, G Loukas
Computer and Information Sciences III, 343-351, 2013
Social Engineering in the Internet of Everything
R Heartfield, D Gan
Cutter IT Journal 26 (7), 20-29, 2016
Evaluating the reliability of users as human sensors of social media security threats
R Heartfield, G Loukas
2016 International Conference On Cyber Situational Awareness, Data Analytics†…, 2016
Toward a blockchain-enabled crowdsourcing platform
DG Kogias, HC Leligou, M Xevgenis, M Polychronaki, E Katsadouros, ...
IT Professional 21 (5), 18-25, 2019
Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices
SS Rahman, R Heartfield, W Oliff, G Loukas, A Filippoupolitis
A prototype framework for assessing information provenance in decentralised social media: The eunomia concept
L Toumanidis, R Heartfield, P Kasnesis, G Loukas, C Patrikakis
International Conference on e-Democracy, 196-208, 2019
Protection against semantic social engineering attacks
R Heartfield, G Loukas
Versatile Cybersecurity, 99-140, 2018
Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning
R Heartfield, G Loukas, A Bezemskij, E Panaousis
IEEE Transactions on Information Forensics and Security 16, 1720-1735, 2020
A prototype deep learning paraphrase identification service for discovering information cascades in social networks
P Kasnesis, R Heartfield, L Toumanidis, X Liang, G Loukas, C Patrikakis
2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), 1-4, 2020
Utilising the concept of Human-as-a-Security-Sensor for detecting semantic social engineering attacks
R Heartfield
University of Greenwich, 2017
Predicting the performance of users as human sensors of security threats in social media
R Heartfield, G Loukas
International Journal on Cyber Situational Awareness (IJCSA) 1 (1), 2016
MASCOTS 2016 Reviewers
JT Acquaviva, O Akinwande, F Alagoz, A Amer, E Anarim, S Bahtiyar, ...
Basu, Anirban, 85 Ben-Abdallah, HanÍne, 289 Benzarti, Faouzi, 157 Bie, Rongfang, 47, 123
S Bradai, C Chatzigeorgiou, A Cha‚bane, Q Chen, H Dong, CJ Downie, ...
The system can't perform the operation now. Try again later.
Articles 1–20