WANT A PROFILE LIKE THIS?
Create my FREE Plan Or learn about other options
Leandros Maglaras
PeerJ Editor & Author
2,035 Points

Contributions by role

Author 200
Editor 1,835

Contributions by subject area

Computer Education
Security and Privacy
Computer Networks and Communications
Cryptography
Internet of Things
Artificial Intelligence
Mobile and Ubiquitous Computing
Neural Networks
Blockchain
Bioinformatics
Data Mining and Machine Learning
Algorithms and Analysis of Algorithms
Distributed and Parallel Computing
Human-Computer Interaction
Data Science
Adaptive and Self-Organizing Systems
Emerging Technologies
Software Engineering

Leandros Maglaras

PeerJ Editor & Author

Summary

Dr. Leandros A. Maglaras is a professor of cybersecurity in the School of Computing at Edinburgh Napier University. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained a B.Sc. (M.Sc. equivalent) in Electrical and Computer Engineering from the Aristotle University of Thessaloniki, Greece in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004, and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from the University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield He is featured in Stanford University's list of the world’s Top 2% scientists. He is a Senior Member of the Institute of Electrical & Electronics Engineers (IEEE) and is an author of more than 200 papers in scientific magazines and conferences

Cryptography Security & Privacy

Editorial Board Member

PeerJ Computer Science

Past or current institution affiliations

De Montfort University Leicester
Napier University

Work details

Professor in Cyber Security

Napier University
November 2022
School of Computer Science
Member of the Centre for Cybersystems and Cryptography.

Professor in Cyber Security

De Montfort University Leicester
February 2015 - September 2022
Cyber Technology Institute
Conducting research on Cyber Security, defense mechanisms for Vehicular Ad Hoc Networks and SCADA systems, Assessment frameworks, etc. Teaching Advanced Topics in Cybersecurity, Cyber Threat Intelligence, Penetration Testing, Incident Response, etc. Member of the Cyber Technology Institute Supervising Ph.D., M.Sc., and Final Year projects relevant to Cyber Security

Websites

  • Google Scholar

PeerJ Contributions

  • Articles 4
  • Edited 10
December 13, 2024
SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare
Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Hafida Saidi, Joel Herve Mboussam Emati, Leandros Maglaras
https://doi.org/10.7717/peerj-cs.2414
September 7, 2023
A novel autonomous container-based platform for cybersecurity training and research
Nestoras Chouliaras, Ioanna Kantzavelou, Leandros Maglaras, Grammati Pantziou, Mohamed Amine Ferrag
https://doi.org/10.7717/peerj-cs.1574
January 20, 2022
A multiplayer game model to detect insiders in wireless sensor networks
Ioanna Kantzavelou, Leandros Maglaras, Panagiotis F. Tzikopoulos, Sokratis Katsikas
https://doi.org/10.7717/peerj-cs.791
September 9, 2021
Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
Iman Almomani, Mohanned Ahmed, Leandros Maglaras
https://doi.org/10.7717/peerj-cs.703

Academic Editor on

November 20, 2024
Enhancing AppAuthentix recommender systems using advanced machine learning techniques to identify genuine and counterfeit android applications
Ramnath M., Yesubai Rubavathi C.
https://doi.org/10.7717/peerj-cs.2515
September 20, 2024
Harnessing AI and analytics to enhance cybersecurity and privacy for collective intelligence systems
Muhammad Rehan Naeem, Rashid Amin, Muhammad Farhan, Faiz Abdullah Alotaibi, Mrim M. Alnfiai, Gabriel Avelino Sampedro, Vincent Karovič
https://doi.org/10.7717/peerj-cs.2264
August 23, 2024
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander
Chai Wen Chuah, Nur Ziadah Harun, Isredza Rahmi A. Hamid
https://doi.org/10.7717/peerj-cs.2249
March 19, 2024
A secure fingerprint hiding technique based on DNA sequence and mathematical function
Wala’a Essa Al-Ahmadi, Asia Othman Aljahdali, Fursan Thabit, Asmaa Munshi
https://doi.org/10.7717/peerj-cs.1847
March 15, 2023
Improved angelization technique against background knowledge attack for 1:M microdata
Rabeeha Fazal, Razaullah Khan, Adeel Anjum, Madiha Haider Syed, Abid Khan, Semeen Rehman
https://doi.org/10.7717/peerj-cs.1255
June 13, 2022
Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing
Omaimah Bamasag, Alaa Alsaeedi, Asmaa Munshi, Daniyal Alghazzawi, Suhair Alshehri, Arwa Jamjoom
https://doi.org/10.7717/peerj-cs.814
January 6, 2022
LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix
Murat Hacimurtazaoglu, Kemal Tutuncu
https://doi.org/10.7717/peerj-cs.843
December 17, 2021
Enhanced Serpent algorithm using Lorenz 96 Chaos-based block key generation and parallel computing for RGB image encryption
Huwaida T. Elshoush, Banan M. Al-Tayeb, Khalil T. Obeid
https://doi.org/10.7717/peerj-cs.812
December 10, 2021
Detailed analysis of Ethereum network on transaction behavior, community structure and link prediction
Anwar Said, Muhammad Umar Janjua, Saeed-Ul Hassan, Zeeshan Muzammal, Tania Saleem, Tipajin Thaipisutikul, Suppawong Tuarob, Raheel Nawaz
https://doi.org/10.7717/peerj-cs.815
February 3, 2021
Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
Jinghua Yu, Stefan Wagner, Feng Luo
https://doi.org/10.7717/peerj-cs.362