Name Dr Gregory Epiphaniou
Job Title Reader in Cybersecurity and Commercial Director of WCRI
Faculty Faculty of Science and Engineering
School Mathematics and Computer Science
Subject(s) Computer Science
Tel 01902 321416
Email g.epiphaniou@wlv.ac.uk

Gregory Epiphaniou

Dr Gregory Epiphaniou

PhD FBCS FHEA CEH CISMP CSTA MIEEE IPTX MIISP

Dr Gregory has worked as cybersecurity consultant and trainer for QA Ltd with high engagement with several industry partners in Information security domains. He delivered a broad range of technical and bespoke certifications including but not limited to CISSP, CISMP, CEH and BCS. Gregory has also been a leading trainer and developer for bespoke Cyber Security programmes with a dedicated, strong team of experts and trainers in several technical domains in both offensive and defensive security. He has also contributed to a numerous public events and seminars around cybersecurity as a keynote speaker, course development and effective training both private and government bodies. He was holding a position as a senior lecturer in Cybersecurity at the University of Bedfordshire, and since Jan 2018, Gregory is an Associate Professor in Cybersecurity and Commercial director of the WCRI at the University of Wolverhampton.

Part of his current research activities are formalised around a research group in wireless communications with the main focus on crypto-key generation, exploiting the time-domain physical attributes of V-V channels. His main work revolves around models to be used in developing understanding, integration and identification of the key design parameters of the VANET communication system environment starting with the needs or requirements of the various stakeholders, including the End-User.

Gregory also has extensive academic experience in the embedding of the credible vocationally driven curriculum through creating continuous opportunities for outside speakers (derived from world-class centres of excellence) via a programme of MSc research seminars. He found this activity both personally enriching and suitably challenging. He has taught in many Universities both nationally and internationally a variety of areas related to Cybersecurity with over 50 international publications in journals, conference proceedings and author in several book chapters.

He holds several industry certifications around Information Security and worked with several government agencies including the MoD in Cybersecurity related projects. He currently holds a subject matter expert panel position in the Chartered Institute for Securities and Investments and acts as a technical committee member for several scientific conferences in Information and network security.

Network Security Protocols

Authentication Protocols and Key establishment

VoIP Security

Proactive network Defence

Security and Privacy

V2V Secure communications

Anonymity Networks

Trust and security issues in Cloud

IoT Security

FHEA Fellow of the Higher Education Academy, 2012 -currently

FBCS Fellow of the British Computer Society, 2016 -Ongoing

CSTA Certified Security Testing Associate, 7 Safe, 2007

CEH Certified Ethical Hacker, EC-Council, 2007

IPTX IP-Telephony Express, Cisco CME (Training Certificate), 2006

MIEEE Member of the Institute of Electrical and Electronic Engineering (2010 -current)

ELSEVIER distinguished reviewer in Journal of Computers & Security

IISP Institute of Information Security Professionals, Member, 2016 -Current

CISI Subject panel member in Chartered Institute for Securities & Investment

Selected Publications

Book Chapters

Hamish Haughey, Gregory Epiphaniou, Haider Al-Khateeb, and Ali Dehghantanha, “An Adaptive Traffic Fingerprinting for Darknet Threat Intelligence" Chapter 8 in Cyber Threat Intelligence (Springer), Advances in Information Security series, Oct 2017 [in press].

Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou, “A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies" Chapter 6 in Cyber Threat Intelligence (Springer), Advances in Information Security series, Oct 2017.

Gregory Epiphaniou, Tim French, Haider Al-khateeb, Ali Dehghantanha and Hamid Jahankhani, “A Novel Anonymity Quantification and Preservation Model for UnderNet Relay Networks" Chapter 6 in (Springer) Communications in Computer and Information Science series, vol.630 2017.

Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou, “Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors" Chapter 6  in (Elsevier) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 1 st Edition- 2017

Journals

Al-Khateeb H., Epiphaniou G. ,Revikczy A., Karadimas P., Proactive Threat Detection for Connected cars using Recursive Bayesian Estimation, IEEE Sensors Journal Special Issue on Sensor Technologies for Connected Cars: Devices, Systems and Modelling, Jul 2017  [in review]

Dhouha K. B. I., Karadimas P., and Epiphaniou G. ,“Adaptive Key Generation for Physical Layer Security in Vehicular Communication Systems", IEEE Communication Letters, Jul 2017  [in preparation].

Epiphaniou G., et al. ,“Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks", IEEE Internet of Things Journal, Jul 2017  [in press].

Al-Khateeb, H. M., Epiphaniou, G. , Alhaboby, Z. A., Barnes, J. Short, E. “Cyberstalking: Investigating Formal Intervention and the Role of Corporate Social Responsibility"  Journal of Telematics and Informatics, Elsevier, Aug 2016

Shehu, U., Safdar, G., A., Epiphaniou, G. ; Fruit Fly optimization algorithm for Network-Aware Web Service Composition in the Cloud, Feb 2016 , Vol 7 , DOI:10 .14569 /IJACSA.2016 .070201

Hamish, H., Epiphaniou, G. , Al-Khateeb, H. M. “Anonymity Networks and the Fragile Cyber Ecosystem: A partial articulation of anonymity degradation attacks as a building block of Privacy enhancing technologies" Network Security, Elsevier, Nov 2015

Al-Khateeb, H. M., Epiphaniou, G.  (in-press) “The role of technology to mitigate and counteract cyberstalking and online grooming" Computer Fraud & Security, Elsevier, Nov 2015 .

Shehu, U., Safdar, G., Epiphaniou, G. , Towards Network-Aware Composition of Big data Services in the Cloud, International Journal of Advanced Computer Science and Applications (IJACSA), Nov 2015 , Vol. 6

Ibor, A., Epiphaniou, G. , A Hybrid Mitigation Technique for Malicious Network Traffic based on Active Response, International Journal of Security and Its Applications,  Aug 2015 , Nol 4 , Vol 9

Shehu, U., Epiphaniou, G. , Safdar, G., A.; Network Aware Composition for Internet of Thing Services, Transactions on Services Computing, Mar 2015 , Vol 1 , http://dx.doi.org/10 .14738 /tnc.31 .961

Epiphaniou, G. , French, T., Maple, C.; The “Dark” Web: Cyber-Security Intelligence Gathering Opportunities, Risks and Rewards, International Journal of Computing and Information Technology , Mar 2014 , Special Issue on LISS 2013 , 21 â˘A ¸S30  doi:10 .2498 /cit.1002282

Umar, S.; Epiphaniou, G.  and Safdar, G.; A Comprehensive Survey on QoS-Aware Web Service Composition Techniques International Journal of Computer Applications ,vol. 89 , no. 12 , pp10 -17 , 10 .5120 /15681 -4466 , Mar 2014

Uchenna P D.; Epiphaniou, G. ; Safeguarding Forensic Integrity of Virtual Environment Evidence, International Journal of Computer Applications, vol.82 , no.6 ,pp 43 -52 , Nov 2013

Oriwoh, E.; Sant, P.; Epiphaniou, G. ; “Guidelines for Existing Internet of Things deployment approaches: The Things Commandments”, 4th International Conference on Emerging Ubiguitous Systems and Pervasive Networks, EUSPN-2013 , vol. 21 , special issue, Elsevier, Feb 2013.

Epiphaniou, G. ; Maple, C.; Sant, P.; Safdar, G.; Effects of Iterative Block Ciphers on Quality of Experience for IPSec Enabled VoIP Calls, IET Information Security ,vol. 3 , no. 3 , pp141 -148

Selected Proceedings

Geraldine Lee, Gregory Epiphaniou and Carsten Maple, "Security and Privacy of Things: Regulatory Challenges and Gaps for the Secure Integration of Cyber-Physical Systems", 3rd  International Congress on Information and Communication Technology (ICICT 2018 )„ 27 -28  Feb. 2018 , Springer, London, UK. [in press]

Kbaier Ben Ismail Dhouha, Petros Karadimas, and Gregory Epiphaniou, "Error Reconciliation with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks", IEEE Computing Conference, 10 -12  Jul. 2018 , London, UK.

Kbaier Ben Ismail, D., Karadimas, P., Epiphaniou, G.,  Al-Khateeb, H., “Optimizing Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks" (best paper award), American University in the Emirates International Research Conference (AUEIRC 2017 ), Nov 2017 , Springer.

Waleed Alabbas, Haider M. al-Khateeb, Ali Mansour, Gregory Epiphaniou, Ingo Frommholz, “A Classification of Colloquial Arabic Tweets in real-time to detect high-risk floods " International Conference on Social Media, Wearable and Web Analytics (C-MRIC 2017 ), Jun 2017 , IEEE.

Gregory Epiphaniou, Tim French, Haider Al-khateeb, Ali Dehghantanha and Hamid Jahankhani, “A Novel Anonymity Quantification and Preservation Model for UnderNet Relay Networks" 11th International Conference on Global Security, safety and Sustainability ICGS3, Jan 2017, Springer.

Depietro, S., D.;  Epiphaniou, G.; Freiderikos, V.; Maple, C.; “Downhill+: An Improved Trust-based Path Selection Algorithm for the Tor Relay Network", 22th Telecommunications Forum, TELFOR, IEEE, Nov 2014

Ghazanfar, A., S.; Albermany, S.;  Epiphaniou, G.; Masour, A.; “Prevention against threats to self coexistence: a Novel Authentication Protocol for CRNs”, The 7th IFIPWireless and Mobile Networking Conference (WMNC 2014), IEEE, May 2014

Oriwoh, E., Sant P.,  Epiphaniou, G., French T., Maple C. (2013) Do Not Pass The Buck: the need for responsibility Modelling in the Internet of Things, Procs. of the International Conference on ICT LAW 2013 (Information and Communication Technology & Law, Protection and Access Rights)

Oriwoh, E.; Jazani, D.;  Epiphaniou, G.; Sant, P.; “Internet of Things Forensics: Challenges and approaches,” Collaborative Computing: Networking, Applications andWorksharing (Collaboratecom), 2013 9th International Conference Conference on ,IEEE, pp.608,615, 20-23 Oct. 2013

Oriwoh, E.; Sant, P.;  Epiphaniou, G.; “Guidelines for Existing Internet of Things deployment approaches: The Things Commandments”, 4th International Conference on Emerging Ubiguitous Systems and Pervasive Networks, EUSPN-2013, Elsevier, Karlsruhe, Germany, Feb 2013.

French, T.;,  Epiphaniou, G,; “The World wide Web: Cyber-security Crime Challenges and Intelligence Gathering Opportunitites from the “Dark” Side”, 3nd International Conference on Logistics, Informatics and Service Science, LISS, Springer, Aug 2013.

Ghazanfar, A. Safdar;,  Epiphaniou, G,; “Wireless Sensor Networks for Rock Fall Detection and Pre-Warning”, 2nd International Conference on Applied Radio Systems Research and Smart Wireless Communications, SWICOM, May 2013.

Tazeen S. Syed,;  Epiphaniou, G.; Ghazanfar A. Safdar;, “Dynamic Adjustment of Weighting and Safety Factors in Playout Buffers for Enhancing VoIP Quality”, International Conference on Science and Information, (SAI 2013), IEEE, Oct 2013.

Uchenna, P., D.,A.;  Epiphaniou, G.; French, T.;, “A Novel Evidence Integrity Preservation Framework (EIPF) for Virtualised Environments: A Digital Forensic Approach”, International Conference on Cyber Security, Cyber Peacefare and Digital Forensics, (CyberSec2013), SDIWC, Mar 2013.

Epiphaniou, G.; Maple, C.; Sant, P.;, “Bridging the Gap Between Security and Quality of Service for VoIP Streams over Unicast Transmissions,” 19th Telecommunications Forum TELFOR 2011, IEEE, Nov 2011.

Maple, C.;, Viduto, V.;  Epiphaniou, G.;, “A Theoretical Framework for Addressing Trust in Open Pervasive Networks”, International Conference on Pervasive and Embedded Computing and Communication Systems, (PECCS) pp 173-178, IEEE Sep 2011.

Epiphaniou, G.; Maple, C.; Sant, P.; Reeve, M.; , “An experimental analysis on iterative block ciphers and their effects on VoIP under different coding schemes,” Signal Processing and Multimedia Applications (SIGMAP), pp.17-25, IEEE, 26-28, Athens, July 2010.

Epiphaniou, G.; Maple, C.; Sant, P.; Norrington, P.; , “The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729,” International Conference for Internet Technology and Secured Transactions (ICITST), pp.1-6, 8-11, IEEE, London, Nov. 2010.

Epiphaniou, G.; Maple, C.; Sant, P.; Reeve, M.; , “Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss,”, International Conference on Availability, Reliability, and Security, (ARES), pp.33-40, IEEE, Feb 2010.

Epiphaniou, G.; Maple, C.;Reeve, M.; “An Optimisation Scheme for Encrypted VoIP Streams over Unicast Transmissions”, 1st International mini-Conference on Applied Computer Science and Technology

(ICACST-2010), RGS, Best Abstract Award, Feb 2010.