{"id":2199,"date":"2025-10-21T13:05:14","date_gmt":"2025-10-21T11:05:14","guid":{"rendered":"https:\/\/ai4cyber.eu\/?page_id=2199"},"modified":"2025-10-21T14:57:39","modified_gmt":"2025-10-21T12:57:39","slug":"research-papers2","status":"publish","type":"page","link":"https:\/\/ai4cyber.eu\/?page_id=2199","title":{"rendered":"Research Papers"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d51156&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;30px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>RESEARCH PAPERS<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_code _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;5px|5px|5px|5px|false|false&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]\u00a0<!-- [et_pb_line_break_holder] --><pee><strong><\/p>\n<h1>Journal Publications<\/p>\n<h1><\/strong><\/pee>\n<table><!-- [et_pb_line_break_holder] --><\/p>\n<tbody><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>Date of Publication<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>Title of Publication<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>Author(s)<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>Partner(s)<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>Journal Title<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>PID (Publisher version of record) (DOI)<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>PID of deposited publication (Zenodo link)<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>September\u00a0 2023<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM Communication<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Stylianos Karagiannis, Emmanouil Magkos, Christoforos Ntantogian, Ricardo Cabecinha, Theofanis Fotis<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>PDMFC, HES<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Applied Sciences (Appl. Sci.), an international, peer-reviewed open-access journal published by MDPI, Volume 13 (2023), Article 10072,<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.3390\/app131810072\">https:\/\/doi.org\/10.3390\/app131810072<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11161187\">https:\/\/zenodo.org\/records\/11161187<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>May 2024<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Methodology for Code Synthesis Evaluation of LLMs Presented by a Case Study of ChatGPT and Copilot<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Zolt\u00e1n S\u00e1godi, Istv\u00e1n Siket, Rudolf Ferec<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>FEA<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>IEEE Access<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/ACCESS.2024.3403858\">https:\/\/doi.org\/10.1109\/ACCESS.2024.3403858<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>September 2024<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Towards explainable fake news detection and automated content credibility assessment: Polish internet and digital media use-case<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Rafa\u0142 Kozik, Gracjan K\u0105tek, Marta Gackowska, Sebastian Kula, Joanna Komorniczak, Pawe\u0142 Ksieniewicz, Aleksandra Pawlicka, Marek Pawlicki, Micha\u0142 Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Neurocomputing (Elsevier)<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1016\/j.neucom.2024.128450\">https:\/\/doi.org\/10.1016\/j.neucom.2024.128450<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>September 2024<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>ARIA, HaRIA and GeRIA: Novel Metrics for Pre-Model Interpretability<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Marek Pawlicki<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>IEEE Access<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/ACCESS.2024.3454084\">https:\/\/doi.org\/10.1109\/ACCESS.2024.3454084<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>September 2024<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Federated Learning: Challenges, SoTA, Performance Improvements and Application Domains<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Ioannis Schoinas, Anna Triantafyllou, Dimosthenis Ioannidis, Dimitrios Tzovaras, Anastasios Drosou, Konstantinos Votis, Thomas Lagkas, Vasileios Argyriou, Panagiotis Sarigiannidis<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>UOWM<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>IEEE Open Journal of the Communications Society (Volume 5, 2024)<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/OJCOMS.2024.3458088\">https:\/\/doi.org\/10.1109\/OJCOMS.2024.3458088<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/13856210\">https:\/\/zenodo.org\/records\/13856210<\/a><\/td<!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>October 2024<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>The survey on the dual nature of xAI challenges in intrusion detection and their potential for AI innovation<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Marek Pawlicki, Aleksandra Pawlicka, Rafa\u0142 Kozik, Micha\u0142 Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Artificial Intelligence Review<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1007\/s10462-024-10972-3\">https:\/\/doi.org\/10.1007\/s10462-024-10972-3<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>October 2024<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Evaluating the necessity of the multiple metrics for assessing explainable AI: a critical examination<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Marek Pawlicki, Aleksandra Pawlicka, Federica Uccello, Sebastian Szelest, Salvatore D\u2019Antonio, Rafal Kozik, Michal Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Neurocomputing (Elsevier)<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1016\/j.neucom.2024.128282\">https:\/\/doi.org\/10.1016\/j.neucom.2024.128282<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>December 2024<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutions<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Ioannis Makris, Aikaterini Karampasi, Panagiotis Radoglou-Grammatikis, Nikolaos Episkopos, Eider Iturbe, Erkuden Rios, Nikos Piperigkos, Aris Lalos, Christos Xenakis, Thomas Lagkas, Vasileios Argyriou, Panagiotis Sarigiannidis<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>MINDS, UOWM<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Computer Science Review<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1016\/j.cosrev.2024.100717\">https:\/\/doi.org\/10.1016\/j.cosrev.2024.100717<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/14592398\">https:\/\/zenodo.org\/records\/14592398<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>December 2024<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Unleashing offensive artificial intelligence: Automated attack technique code generation.<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Eider Iturbe, Oscar Llorente-Vazquez, Angel Rego, Erkuden Rios, and Nerea Toledo.<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>TECNALIA<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Computers &#038; Security<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1016\/j.cose.2024.104077\">https:\/\/doi.org\/10.1016\/j.cose.2024.104077<\/a><\/td>\n<p> <!-- [et_pb_line_break_holder] --><\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>April 2025<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Pavlos S. Bouzinis, Panagiotis Radoglou-Grammatikis, Ioannis Makris, Thomas Lagkas, Vasileios Argyriou, Georgios Th. Papadopoulos, Panagiotis Sarigiannidis, George K. Karagiannidis<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>MINDS, UOWM<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>IEEE Transactions on Emerging Topics in Computing<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/TNSM.2025.3564387\">https:\/\/doi.org\/10.1109\/TNSM.2025.3564387<\/a><\/td>\n<p> <!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/15296005\">https:\/\/zenodo.org\/records\/15296005<\/a><\/td>\n<p> <!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>April 2025<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>AI4FIDS: Multimodal Federated Intrusion Detection<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>\u00a0Panagiotis Radoglou-Grammatikis,Pavlos S. Bouzinis, Ioannis Makris, Thomas Lagkas, Vasileios Argyriou, Georgios Th. Papadopoulos, Panagiotis Fouliras, George Seritan, Panagiotis Sarigiannidis<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>MINDS, UOWM<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>IEEE Transactions on Emerging Topics in Computing<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/TETC.2025.3562346\">https:\/\/doi.org\/10.1109\/TETC.2025.3562346<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/15295900\">https:\/\/zenodo.org\/records\/15295900<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>July 2025<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Reinforcement Learning in action: Powering intelligent intrusion responses to advanced cyber threats in realistic scenarios<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Eider Iturbe, Angel Rego, Oscar Llorente-Vazquez, Erkuden Rios, Christos Dalamagkas, Dimitris Merkouris, Nerea Toledo.<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>TECNALIA<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Expert Systems with Applications<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1016\/j.eswa.2025.129168\">https:\/\/doi.org\/10.1016\/j.eswa.2025.129168<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<tr><!-- [et_pb_line_break_holder] --><\/p>\n<td>September 2025<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Enhancing Accountability, Resilience, and Privacy of Intelligent Networks with XAI<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>Thulitha Senevirathna, Chamara Sandeepa, Bartlomiej Siniarski, Manh-Dung Nguyen, Samuel Marchal, Michell Boerger, Madhusanka Liyanage, and Shen Wang<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>MI<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>IEEE Open Journal of the Communications Society<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/OJCOMS.2025.3608784\">https:\/\/doi.org\/10.1109\/OJCOMS.2025.3608784<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] --><\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/tbody>\n<p><!-- [et_pb_line_break_holder] --><\/table>\n<p><!-- [et_pb_line_break_holder] -->\u00a0\u00a0<!-- [et_pb_line_break_holder] --><pee><strong><\/p>\n<h1>Conference Papers<\/p>\n<h1><\/strong><\/pee>\u00a0<!-- [et_pb_line_break_holder] --><\/p>\n<table><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>Date of Publication<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>Title of Publication<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>Author(s)<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>Partner(s)<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>Conference Title<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>PID (Publisher version of record) (DOI)<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<td><center><strong>PID of deposited publication (Zenodo link)<\/strong><\/center><\/td>\n<p><!-- [et_pb_line_break_holder] -->\t\t<!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>July 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures &#8211; Application to Anomaly Detection.<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Anis Bouaziz, Manh-Dung Nguyen, Valeria Vald\u00e8s, Ana Rosa Cavalli and Wissam Mallouli<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>MI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Proceedings of the 18th International Conference on Software Technologies (ICSOFT) \u2013 Volume 1<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"http:\/\/dx.doi.org\/10.5220\/0012125100003538\">http:\/\/dx.doi.org\/10.5220\/0012125100003538<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11188048\">https:\/\/zenodo.org\/records\/11188048<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>July 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Explainable Artificial Intelligence 101: Techniques, Applications and Challenges<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Wiktor Kurek, Marek Pawlicki, Aleksandra Pawlicka, Rafa\u0142 Kozik &#038; Micha\u0142 Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Lecture Notes in Networks and Systems (LNNS), \u201cExplainable Artificial Intelligence 101\u201d<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1007\/978-981-99-4752-2_26\">https:\/\/doi.org\/10.1007\/978-981-99-4752-2_26<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11197232\">https:\/\/zenodo.org\/records\/11197232<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>August 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Detection of Physical Adversarial Attacks on Traffic Signs for Autonomous Vehicles<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Barbara Villarini, Panagiotis Radoglou-Grammatikis, Thomas Lagkas, Panagiotis Sarigiannidis and Vasileios Argyriou<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>UOWM<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>2023 IEEE International Conference on Artificial Intelligence for Industries (IAICT)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/IAICT59002.2023.10205591\">https:\/\/doi.org\/10.1109\/IAICT59002.2023.10205591<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11173483\">https:\/\/zenodo.org\/records\/11173483<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>August 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Iturbe, Eider; Rios, Erkuden; Rego, Angel; Toledo, Nerea\/ Proceedings of the 18th International Conference on Availability, Reliability and Security<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>TECNALIA<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>The 18th International Conference on Availability, Reliability and Security (ARES 2023)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3600160.3605051\">https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3600160.3605051<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11208855\">https:\/\/zenodo.org\/records\/11208855<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>August 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>A deep learning anomaly detection framework with explainability and robustness.<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Manh-Dung Nguyen, Anis Bouaziz, Valeria Vald\u00e9s, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>MI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>The 18th International Conference on Availability, Reliability and Security (ARES 2023)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1145\/3600160.3605052\">https:\/\/doi.org\/10.1145\/3600160.3605052<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>September 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Dimitrios Christos Asimopoulos, Panagiotis Radoglou-Grammatikis, Ioannis Makris, Valeri Mladenov, Konstantinos E. Psannis, Sotirios Goudos and Panagiotis Sarigiannidis<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>MINDS, UOWM<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>The 18th International Conference on Availability, Reliability and Security (ARES 2023)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1145\/3600160.3605163\">https:\/\/doi.org\/10.1145\/3600160.3605163<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11173313\">https:\/\/zenodo.org\/records\/11173313<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>November 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Towards Quality Measures for xAI algorithms: Explanation Stability<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Marek Pawlicki<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>2023 IEEE International Conference on Cyber Security and Resilience (CSR)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/DSAA60987.2023.10302535\">https:\/\/doi.org\/10.1109\/DSAA60987.2023.10302535<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11192435\">https:\/\/zenodo.org\/records\/11192435<\/a><\/td<!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>December 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>IP&#038;C 2023: Interpreting Intrusions &#8211; The Role of Explainability in AI-based Intrusion Detection Systems<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Marek Pawlicki, Aleksandra Pawlicka, M\u015bcis\u0142a\u1e83 \u015arutek, Rafal Kozik, Michal Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>International Conference on Information and Communications Security (IPC 2023) \u2013 Lecture Notes in Computer Science (LNCS)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1007\/978-3-031-41630-9_5\">https:\/\/doi.org\/10.1007\/978-3-031-41630-9_5<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11196682\">https:\/\/zenodo.org\/records\/11196682<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>December 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Aleksandra Pawlicka, Marek Pawlicki, Rafa\u0142 Kozik , Micha\u0142 Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>2023 IEEE International Conference on Big Data (BigData) \u2013 Workshop<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/ICDMW60847.2023.00038\">https:\/\/doi.org\/10.1109\/ICDMW60847.2023.00038<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11196610\">https:\/\/zenodo.org\/records\/11196610<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>December 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Towards trustworthy Artificial Intelligence: Security risk assessment methodology for Artificial Intelligence systems<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Iturbe, Eider; Rios, Erkuden; Toledo, Nerea \/ CloudCom 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>TECNALIA<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>2023 IEEE 15th International Conference on Cloud Computing Technology and Science (CloudCom)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/CloudCom59040.2023.00054\">https:\/\/doi.org\/10.1109\/CloudCom59040.2023.00054<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11209106\">https:\/\/zenodo.org\/records\/11209106<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>December 2023<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>The Rise of AI-Powered Writing: How ChatGPT is Revolutionizing Scientific Communication &#8211; For Better or For Worse<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Aleksandra Pawlicka, Marek Pawlicki, Rafa\u0142 Kozik, Micha\u0142 Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Communications in Computer and Information Science (CCIS), Springer<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1007\/978-981-97-0903-8_30\">https:\/\/doi.org\/10.1007\/978-981-97-0903-8_30<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11196855\">https:\/\/zenodo.org\/records\/11196855<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>March 2024<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Surveying Cyber Threat Intelligence: A Concise Analysis of Current Landscape and Trends<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis, Elisavet Kioseoglou, Dimitrios Christos Asimopoulos, Thomas Lagkas, Vasileios Argyriou, Ioannis Nanos, Konstantinos E. Psannis, Sotirios Goudos<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>UOWM, MINDS<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>2023 IEEE 15th International Conference on Cloud Computing Technology and Science (CloudCom)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/CloudCom59040.2023.00057\">https:\/\/doi.org\/10.1109\/CloudCom59040.2023.00057<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/11173801\">https:\/\/zenodo.org\/records\/11173801<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>April 2024<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>A novel approach to the use of explainability to mine network intrusion detection rules<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Federica Uccello, Marek Pawlicki, Salvatore D\u2019Antonio, Rafal Kozik, and Michal Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ACIIDS 2024 \u2013 Asian Conference on Intelligent Information and Database Systems<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1007\/978-981-97-4982-9_6\">https:\/\/doi.org\/10.1007\/978-981-97-4982-9_6<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/12911014\">https:\/\/zenodo.org\/records\/12911014<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>April 2024<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>VulnGPT: Enhancing Source Code Vulnerability Detection Using AutoGPT and Adaptive Supervision Strategies<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Gergely Eberhardt, \u00c1kos Mil\u00e1nkovich<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>SLAB<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/DCOSS-IoT61029.2024.00072\">https:\/\/doi.org\/10.1109\/DCOSS-IoT61029.2024.00072<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td> N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>June 2024<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Time Series Problems in the Energy Sector<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Christos Dalamagkas; Angelos Georgakis; Ioannis Papadopoulos; Kostas Hrissagis-Chrysagis; George Papadakis<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>PPC<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>2024 IEEE 40th International Conference on Data Engineering Workshops (ICDEW)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/ICDEW61823.2024.00021\">https:\/\/doi.org\/10.1109\/ICDEW61823.2024.00021<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/12207204\">https:\/\/zenodo.org\/records\/12207204<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>July 2024<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Introducing a Multi-Perspective xAI Tool for Better Model Explainability<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Marek Pawlicki, Damian Puchalski, Sebastian Szelest, Aleksandra Pawlicka, Rafa\u0142 Kozik, Micha\u0142 Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ARES 2024 \u2013 International Conference on Availability, Reliability and Security<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1145\/3664476.3670905\">https:\/\/doi.org\/10.1145\/3664476.3670905<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/12903812\">https:\/\/zenodo.org\/records\/12903812<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>September 2024<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>AI4COLLAB: An AI-based Threat Information Sharing Platform<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Christos Dalamagkas, Dimitrios Asimopoulos, Panagiotis Radoglou-Grammatikis, Nikolaos Maropoulos, Thomas Lagkas, Vasileios Argyriou, Gohar Sargsyan, Panagiotis Sarigiannidis<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>UOWM, MINDS, PPC<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>2024 IEEE International Conference on Cyber Security and Resilience (CSR)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/CSR61664.2024.10679429\">https:\/\/doi.org\/10.1109\/CSR61664.2024.10679429<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/13856191\">https:\/\/zenodo.org\/records\/13856191<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>December 2024<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>AAG: Adversarial Attack Generator for evaluating the robustness of Machine Learning Models against Adversarial Attacks<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Dimitrios Christos Asimopoulos, Panagiotis Radoglou-Grammatikis, Thomas Lagkas, Vasileios Argyriou\u2225, Ioannis Moscholios, Jorgen Cani, Georgios Th. Papadopoulos Evangelos K. Markakis , Panagiotis Sarigiannidis<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>MINDS, UOWM<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>IEEE International Conference on Big Data<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1016\/j.cosrev.2024.100717\">https:\/\/doi.org\/10.1016\/j.cosrev.2024.100717<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/14726141\">https:\/\/zenodo.org\/records\/14726141<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>December 2024<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Towards Transparent AI-Powered Cybersecurity in Financial Systems: The Deployment of Federated Learning and Explainable AI in the CaixaBank pilot<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Aikaterini Karampasi, Panagiotis Radoglou-Grammatikis, Marek Pawlicki, Ryszard Chora\u015b, Ramon Martin de Pozuelo, Panagiotis Sarigiannidis, Damian Puchalski, Aleksandra Pawlicka, Rafa\u0142 Kozik, Micha\u0142 Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Proceedings of the 2024 IEEE International Conference on Data Mining Workshops (ICDMW) \u2014 IEEE conference publication<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.ieeecomputersociety.org\/10.1109\/ICDMW65004.2024.00041\">https:\/\/doi.ieeecomputersociety.org\/10.1109\/ICDMW65004.2024.00041<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/15162906\">https:\/\/zenodo.org\/records\/15162906<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>February 2025<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>The Evaluation of Adversarial Attacks Against ML-Powered NIDS in a Realistic Scenario<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Federica Uccello, Marek Pawlicki, Aleksandra Pawlicka, Salvatore D\u2019Antonio, Rafal Kozik, and Michal Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Communications in Computer and Information Science (CCIS)<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1007\/978-981-96-1907-8_30\">https:\/\/doi.org\/10.1007\/978-981-96-1907-8_30<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/15163127\">https:\/\/zenodo.org\/records\/15163127<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>April 2025<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Proposition of a Novel Type of Attacks Targeting Explainable AI Algorithms in Cybersecurity<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Sebasian Szelest, Marek Pawlicki, Aleksandra Pawlicka, Rafa\u0142 Kozik, Micha\u0142 Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ESORICS: DiSA<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1007\/978-3-031-82362-6_18\">https:\/\/doi.org\/10.1007\/978-3-031-82362-6_18<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/15163183\">https:\/\/zenodo.org\/records\/15163183<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>June 2025<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Una revisi\u00f3n de &#8211; Desatando la Inteligencia Artificial ofensiva: Generaci\u00f3n autom\u00e1tica de c\u00f3digo de t\u00e9cnicas de ataque<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Eider Iturbe, Oscar Llorente-Vazquez, Angel Rego, Erkuden Rios, and Nerea Toledo.<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>TECNALIA<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>JNIC 2025<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.26754\/uz.978-84-10169-61-6\">https:\/\/doi.org\/10.26754\/uz.978-84-10169-61-6<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>August 2025<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Insights Into Domain Adaptation in Netflow-based Network Intrusion Detection powered by Deep Learning<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Marek Pawlicki, Sebastian Szelest, Rafa\u0142 Kozik, Micha\u0142 Chora\u015b<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>ITTI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Availability, Reliability and Security: ARES 2025 EU Projects<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1007\/978-3-032-00644-8_18\">https:\/\/doi.org\/10.1007\/978-3-032-00644-8_18<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/16919506\">https:\/\/zenodo.org\/records\/16919506<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>August 2025<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Surrogate-Guided Adversarial Attacks: Enabling White-Box Methods in Black-Box Scenarios<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Dimitrios Christos Asimopoulos, Panagiotis Radoglou-Grammatikis, Panagiotis Fouliras, Konstantinos Panitsidis, Georgios Efstathopoulos, Thomas Lagkas, Vasileios Argyriou, Igor Kotsiuba, Panagiotis Sarigiannidis<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>MINDS, UOWM<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>IEEE International Conference on Cyber Security and Resilience<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1109\/CSR64739.2025.11130067\">https:\/\/doi.org\/10.1109\/CSR64739.2025.11130067<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>N\/A<\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>August 2025<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>LLMs in Security Testing and Monitoring: An Initial Study<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Luong Nguyen, Manh-Dung Nguyen, Anh Hao Bui, Ana Rosa Cavalli, Edgardo Montes de Oca<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>MI<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Availability, Reliability and Security: ARES 2025 EU Projects<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1007\/978-3-032-00644-8_9\">https:\/\/doi.org\/10.1007\/978-3-032-00644-8_9<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/16810804\">https:\/\/zenodo.org\/records\/16810804<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<tr><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>August 2025<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>An Intelligent Network Fuzzer for Protocol Testing in Healthcare Systems<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Manh-Dung Nguyen, Huu Nghia Nguyen, Lethycia Maia de Souza, Stylianos Karagiannis, Ana Rosa Cavalli, Edgardo Montes de Oca<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>MI, PDMFC<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td>Availability, Reliability and Security: ARES 2025 EU Projects<\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/doi.org\/10.1007\/978-3-032-00644-8_13\">https:\/\/doi.org\/10.1007\/978-3-032-00644-8_13<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->        <\/p>\n<td><a href=\"https:\/\/zenodo.org\/records\/16811133\">https:\/\/zenodo.org\/records\/16811133<\/a><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/table>\n<p>[\/et_pb_fullwidth_code][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RESEARCH PAPERS\u00a0Journal PublicationsDate of PublicationTitle of PublicationAuthor(s)Partner(s)Journal TitlePID (Publisher version of record) (DOI)PID of deposited publication (Zenodo link)September\u00a0 2023Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM CommunicationStylianos Karagiannis, Emmanouil Magkos, Christoforos Ntantogian, Ricardo Cabecinha, Theofanis FotisPDMFC, HESApplied Sciences (Appl. Sci.), an international, peer-reviewed open-access journal published by MDPI, Volume 13 (2023), Article 10072,https:\/\/doi.org\/10.3390\/app131810072https:\/\/zenodo.org\/records\/11161187May 2024Methodology [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2199","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/pages\/2199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2199"}],"version-history":[{"count":6,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/pages\/2199\/revisions"}],"predecessor-version":[{"id":2208,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/pages\/2199\/revisions\/2208"}],"wp:attachment":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}