Skip to main content

Research Repository

Advanced Search

Outputs (22)

Generative AI cybersecurity and resilience (2025)
Journal Article
Radanliev, P., Santos, O., & Ani, U. D. (2025). Generative AI cybersecurity and resilience. Frontiers in Artificial Intelligence and Applications, 8, Article 1568360. https://doi.org/10.3389/frai.2025.1568360

Generative Artificial Intelligence marks a critical inflection point in the evolution of machine learning systems, enabling the autonomous synthesis of content across text, image, audio, and biomedical domains. While these capabilities are advancing... Read More about Generative AI cybersecurity and resilience.

Socio‐Technical Security Modelling and Simulations in Cyber‐Physical Systems: Outlook on Knowledge, Perceptions, Practices, Enablers, and Barriers (2025)
Journal Article
Ani, U. D., Al‐Mhiqani, M., Tuptuk, N., Hailes, S., & McKendrick Watson, J. D. (2025). Socio‐Technical Security Modelling and Simulations in Cyber‐Physical Systems: Outlook on Knowledge, Perceptions, Practices, Enablers, and Barriers. IET Cyber-Physical Systems: Theory & Applications, 10(1), 1-26. https://doi.org/10.1049/cps2.70017

Socio‐Technical Security Modelling and Simulation (STSec‐M&S) is a technique used for reasoning and representing security viewpoints that include both the social and technical aspects of a system. It has shown great potential for improving the cybers... Read More about Socio‐Technical Security Modelling and Simulations in Cyber‐Physical Systems: Outlook on Knowledge, Perceptions, Practices, Enablers, and Barriers.

Impact of detection accuracy rates on phishing email spikes: Towards more effective mitigation (2025)
Journal Article
Adewumi, S. E., & Ani, U. D. (in press). Impact of detection accuracy rates on phishing email spikes: Towards more effective mitigation. Information Security Journal: A Global Perspective, 1-38. https://doi.org/10.1080/19393555.2025.2469519

Phishing is a common cyber-attack technique where a criminal pretending to be a trusted entity sends a message either soliciting assistance, or requesting bank or credit card details with promises that usually turn out to be a hoax. This may include... Read More about Impact of detection accuracy rates on phishing email spikes: Towards more effective mitigation.

An Ensemble Modelling of Feature Engineering and Predictions for Enhanced Fake News Detection (2024)
Presentation / Conference Contribution
Asowo, P., Lal, S., & Ani, U. (2024, December). An Ensemble Modelling of Feature Engineering and Predictions for Enhanced Fake News Detection. Presented at AI-2024 Forty-fourth SGAI International Conference on Artificial Intelligence, CAMBRIDGE, ENGLAND

The threat of fake news jeopardizing the credibility of online
news platforms, particularly on social media, underscores the need for innovative solutions. This paper proposes a creative engine for detecting fake news, leveraging advanced machine le... Read More about An Ensemble Modelling of Feature Engineering and Predictions for Enhanced Fake News Detection.

Minimising cybersecurity risk exposures in industrial control system environments: a techno-human vulnerability analysis approach (2024)
Journal Article
Ani, U. D., Watson, J., He, H., Radanliev, P., & Epiphaniou, G. (in press). Minimising cybersecurity risk exposures in industrial control system environments: a techno-human vulnerability analysis approach. Journal of Cyber Security Technology, 1-40. https://doi.org/10.1080/23742917.2024.2421589

Organisations operating IoT-enabled industrial control systems (ICSs) are concerned about growing cybersecurity risks and impacts to their systems. Cyber-attacks on ICSs demonstrate that technology alone is neither a problem nor a solution to the gro... Read More about Minimising cybersecurity risk exposures in industrial control system environments: a techno-human vulnerability analysis approach.

AI security and cyber risk in IoT systems (2024)
Journal Article
Radanliev, P., De Roure, D., Maple, C., Nurse, J. R. C., Nicolescu, R., & Ani, U. (in press). AI security and cyber risk in IoT systems. Frontiers in Big Data, 7, Article 1402745. https://doi.org/10.3389/fdata.2024.1402745

Internet-of-Things (IoT) refers to low-memory connected devices used in various new technologies, including drones, autonomous machines, and robotics. The article aims to understand better cyber risks in low-memory devices and the challenges in IoT r... Read More about AI security and cyber risk in IoT systems.

Taxonomy of Emerging Security Risks in Digital Railway (2024)
Presentation / Conference Contribution
Al-Mhiqani, M., Ani, U., Watson, J., & He, H. (2023, July). Taxonomy of Emerging Security Risks in Digital Railway. Presented at CYBER SCIENCE 2023, University of Aalborg, Copenhagen, Denmark

The railway industry has embraced digitisation and interconnectivity by introducing Information and Communication Technologies into traditional operational technology infrastructure. This convergence has brought numerous advantages, including improve... Read More about Taxonomy of Emerging Security Risks in Digital Railway.

Exploring the Security Culture of Operational Technology (OT) Organisations: The Role of External Consultancy in Overcoming Organisational Barriers (2023)
Presentation / Conference
Evripidou, S., Ani, U. D., Hailes, S., & McK. Watson, J. D. (2023, August). Exploring the Security Culture of Operational Technology (OT) Organisations: The Role of External Consultancy in Overcoming Organisational Barriers. Presented at Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), Anaheim, California, USA

Operational Technology (OT) refers to systems that control and monitor industrial processes. Organisations that use OT can be found in many sectors, including water and energy, and often operate a nation's critical infrastructure. These organisations... Read More about Exploring the Security Culture of Operational Technology (OT) Organisations: The Role of External Consultancy in Overcoming Organisational Barriers.

Digital twins in cyber effects modelling of IoT/CPS points of low resilience (2023)
Journal Article
Ani, U. (2023). Digital twins in cyber effects modelling of IoT/CPS points of low resilience. Simulation Modelling Practice and Theory, 125, Article 102744. https://doi.org/10.1016/j.simpat.2023.102744

The exponential increase of data volume and velocity have necessitated a tighter linkage of physical and cyber components in modern Cyber–physical systems (CPS) to achieve faster response times and autonomous component reconfiguration. To attain this... Read More about Digital twins in cyber effects modelling of IoT/CPS points of low resilience.

Industrial Internet of Things Security Modelling using Ontological Methods (2023)
Presentation / Conference Contribution
Aslam Jarwar, M., Watson, J., Ani, U., & Chalmers, S. (2022, November). Industrial Internet of Things Security Modelling using Ontological Methods. Presented at IoT 2022: The 12th International Conference on the Internet of Things, Delft Netherlands

The Industrial Internet of Things (IIoT) trend presents many significant benefits for improving industrial operations. However, its emergence from the convergence of legacy Industrial Control Systems (ICS) and Information and Communication Technologi... Read More about Industrial Internet of Things Security Modelling using Ontological Methods.