Skip to main content

Publications

Image
Nieves Matheu García S, Skarmeta A. 2025. One Passport to Govern Them All: Bringing Order to IoT Security and Compliance. SECON2025 Publications

Nieves Matheu García S, Skarmeta A. 2025. One Passport to Govern Them All: Bringing Order to IoT Security and Compliance. SECON2025

Conference: 2nd MobiSec Special Session on Secure and Cognitive Continuum (SECON 2025) co-located with the 9th International Conference on Mobile Internet Security (MobiSec 2025), 16-18. December 2025, Sapporo, JP Authors: Nieves Matheu García S, Skarmeta A. Abstract: The increasing complexity of the Internet of Things ecosystems has exposed critical gaps…
Image
Gelenbe E, Abdelrahman O. 2025. Signalling Storms and Taylor’s Law. Way to 6G Workshop @ MASCOTS 2025. Publications

Gelenbe E, Abdelrahman O. 2025. Signalling Storms and Taylor’s Law. Way to 6G Workshop @ MASCOTS 2025.

Conference: Way to 6G Workshop co-located with the IEEE Computer Society 33rd International Symposium on the Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2025), 21-23. October 2025, Sorbonne University, Paris, FR Authors: Gelenbe E, Abdelrahman O. Abstract: Signalling storms have occurred in several generations of mobile networks…
Image
Bergquist J, Gelenbe E, Nasereddin M, Sigman K. 2025. Mitigating massive access with Quasi-Deterministic Transmission: Experiments and stationary analysis. Performance Evaluation. Publications

Bergquist J, Gelenbe E, Nasereddin M, Sigman K. 2025. Mitigating massive access with Quasi-Deterministic Transmission: Experiments and stationary analysis. Performance Evaluation.

Journal: Performance Evaluation, Volume 170,  November 2025, 102512 Authors: Bergquist J, Gelenbe E, Nasereddin M, Sigman K. Abstract: The Massive Access Problem arises due to devices that forward packets simultaneously to servers in rapid succession, or by malevolent software in devices that flood network nodes with high-intensity traffic. To protect…
Image
Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. LocVul: Line-Level Vulnerability Localization based on a Sequence-to-Sequence Approach. Information and Software Technology 2025 Publications

Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. 2025. LocVul: Line-Level Vulnerability Localization based on a Sequence-to-Sequence Approach. Information and Software Technology 2025

Journal: Information and Software Technology, Volume 19, January 2026 Authors: Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A. Abstract: Context: The development of secure software systems depends on early and accurate vulnerability identification. Manual inspection is a time-consuming process that requires specialized knowledge. Therefore, as software complexity grows,…
Image
Gelenbe E, Ren Q, Yan Z. 2025. A Probabilistic Dynamic Network Trust Model for IoT Systems with Lost Messages and Cyberattacks. MASCOTS 2025. Publications

Gelenbe E, Ren Q, Yan Z. 2025. A Probabilistic Dynamic Network Trust Model for IoT Systems with Lost Messages and Cyberattacks. MASCOTS 2025.

Conference: 33rd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2025), 21-23. October 2025, Sorbonne University, Paris, FR Authors: Gelenbe E, Ren Q, Yan Z. Abstract: This paper introduces a new dynamic networked trust model, the Random Neural Network Trust Model (RNNTM), which incorporates the…