Dr Gregory Epiphaniou
PhD FBCS FHEA CEH CISMP CSTA MIEEE IPTX MIISP
Dr Gregory has worked as cybersecurity consultant and trainer for QA Ltd with high engagement with several industry partners in Information security domains. He delivered a broad range of technical and bespoke certifications including but not limited to CISSP, CISMP, CEH and BCS. Gregory has also been a leading trainer and developer for bespoke Cyber Security programmes with a dedicated, strong team of experts and trainers in several technical domains in both offensive and defensive security. He has also contributed to a numerous public events and seminars around cybersecurity as a keynote speaker, course development and effective training both private and government bodies. He was holding a position as a senior lecturer in Cybersecurity at the University of Bedfordshire, and since Jan 2018, Gregory is an Associate Professor in Cybersecurity and Commercial director of the WCRI at the University of Wolverhampton.
Part of his current research activities are formalised around a research group in wireless communications with the main focus on crypto-key generation, exploiting the time-domain physical attributes of V-V channels. His main work revolves around models to be used in developing understanding, integration and identification of the key design parameters of the VANET communication system environment starting with the needs or requirements of the various stakeholders, including the End-User.
Gregory also has extensive academic experience in the embedding of the credible vocationally driven curriculum through creating continuous opportunities for outside speakers (derived from world-class centres of excellence) via a programme of MSc research seminars. He found this activity both personally enriching and suitably challenging. He has taught in many Universities both nationally and internationally a variety of areas related to Cybersecurity with over 50 international publications in journals, conference proceedings and author in several book chapters.
He holds several industry certifications around Information Security and worked with several government agencies including the MoD in Cybersecurity related projects. He currently holds a subject matter expert panel position in the Chartered Institute for Securities and Investments and acts as a technical committee member for several scientific conferences in Information and network security.
Network Security Protocols
Authentication Protocols and Key establishment
Proactive network Defence
Security and Privacy
V2V Secure communications
Trust and security issues in Cloud
FHEA Fellow of the Higher Education Academy, 2012 -currently
FBCS Fellow of the British Computer Society, 2016 -Ongoing
CSTA Certified Security Testing Associate, 7 Safe, 2007
CEH Certified Ethical Hacker, EC-Council, 2007
IPTX IP-Telephony Express, Cisco CME (Training Certificate), 2006
MIEEE Member of the Institute of Electrical and Electronic Engineering (2010 -current)
ELSEVIER distinguished reviewer in Journal of Computers & Security
IISP Institute of Information Security Professionals, Member, 2016 -Current
CISI Subject panel member in Chartered Institute for Securities & Investment
Hamish Haughey, Gregory Epiphaniou, Haider Al-Khateeb, and Ali Dehghantanha, “An Adaptive Traffic Fingerprinting for Darknet Threat Intelligence" Chapter 8 in Cyber Threat Intelligence (Springer), Advances in Information Security series, Oct 2017 [in press].
Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou, “A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies" Chapter 6 in Cyber Threat Intelligence (Springer), Advances in Information Security series, Oct 2017.
Gregory Epiphaniou, Tim French, Haider Al-khateeb, Ali Dehghantanha and Hamid Jahankhani, “A Novel Anonymity Quantification and Preservation Model for UnderNet Relay Networks" Chapter 6 in (Springer) Communications in Computer and Information Science series, vol.630 2017.
Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou, “Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors" Chapter 6 in (Elsevier) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 1 st Edition- 2017
Al-Khateeb H., Epiphaniou G. ,Revikczy A., Karadimas P., Proactive Threat Detection for Connected cars using Recursive Bayesian Estimation, IEEE Sensors Journal Special Issue on Sensor Technologies for Connected Cars: Devices, Systems and Modelling, Jul 2017 [in review]
Dhouha K. B. I., Karadimas P., and Epiphaniou G. ,“Adaptive Key Generation for Physical Layer Security in Vehicular Communication Systems", IEEE Communication Letters, Jul 2017 [in preparation].
Epiphaniou G., et al. ,“Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks", IEEE Internet of Things Journal, Jul 2017 [in press].
Al-Khateeb, H. M., Epiphaniou, G. , Alhaboby, Z. A., Barnes, J. Short, E. “Cyberstalking: Investigating Formal Intervention and the Role of Corporate Social Responsibility" Journal of Telematics and Informatics, Elsevier, Aug 2016
Shehu, U., Safdar, G., A., Epiphaniou, G. ; Fruit Fly optimization algorithm for Network-Aware Web Service Composition in the Cloud, Feb 2016 , Vol 7 , DOI:10 .14569 /IJACSA.2016 .070201
Hamish, H., Epiphaniou, G. , Al-Khateeb, H. M. “Anonymity Networks and the Fragile Cyber Ecosystem: A partial articulation of anonymity degradation attacks as a building block of Privacy enhancing technologies" Network Security, Elsevier, Nov 2015
Al-Khateeb, H. M., Epiphaniou, G. (in-press) “The role of technology to mitigate and counteract cyberstalking and online grooming" Computer Fraud & Security, Elsevier, Nov 2015 .
Shehu, U., Safdar, G., Epiphaniou, G. , Towards Network-Aware Composition of Big data Services in the Cloud, International Journal of Advanced Computer Science and Applications (IJACSA), Nov 2015 , Vol. 6
Ibor, A., Epiphaniou, G. , A Hybrid Mitigation Technique for Malicious Network Traffic based on Active Response, International Journal of Security and Its Applications, Aug 2015 , Nol 4 , Vol 9
Shehu, U., Epiphaniou, G. , Safdar, G., A.; Network Aware Composition for Internet of Thing Services, Transactions on Services Computing, Mar 2015 , Vol 1 , http://dx.doi.org/10 .14738 /tnc.31 .961
Epiphaniou, G. , French, T., Maple, C.; The “Dark” Web: Cyber-Security Intelligence Gathering Opportunities, Risks and Rewards, International Journal of Computing and Information Technology , Mar 2014 , Special Issue on LISS 2013 , 21 â˘A ¸S30 doi:10 .2498 /cit.1002282
Umar, S.; Epiphaniou, G. and Safdar, G.; A Comprehensive Survey on QoS-Aware Web Service Composition Techniques International Journal of Computer Applications ,vol. 89 , no. 12 , pp10 -17 , 10 .5120 /15681 -4466 , Mar 2014
Uchenna P D.; Epiphaniou, G. ; Safeguarding Forensic Integrity of Virtual Environment Evidence, International Journal of Computer Applications, vol.82 , no.6 ,pp 43 -52 , Nov 2013
Oriwoh, E.; Sant, P.; Epiphaniou, G. ; “Guidelines for Existing Internet of Things deployment approaches: The Things Commandments”, 4th International Conference on Emerging Ubiguitous Systems and Pervasive Networks, EUSPN-2013 , vol. 21 , special issue, Elsevier, Feb 2013.
Epiphaniou, G. ; Maple, C.; Sant, P.; Safdar, G.; Effects of Iterative Block Ciphers on Quality of Experience for IPSec Enabled VoIP Calls, IET Information Security ,vol. 3 , no. 3 , pp141 -148
Geraldine Lee, Gregory Epiphaniou and Carsten Maple, "Security and Privacy of Things: Regulatory Challenges and Gaps for the Secure Integration of Cyber-Physical Systems", 3rd International Congress on Information and Communication Technology (ICICT 2018 )„ 27 -28 Feb. 2018 , Springer, London, UK. [in press]
Kbaier Ben Ismail Dhouha, Petros Karadimas, and Gregory Epiphaniou, "Error Reconciliation with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks", IEEE Computing Conference, 10 -12 Jul. 2018 , London, UK.
Kbaier Ben Ismail, D., Karadimas, P., Epiphaniou, G., Al-Khateeb, H., “Optimizing Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks" (best paper award), American University in the Emirates International Research Conference (AUEIRC 2017 ), Nov 2017 , Springer.
Waleed Alabbas, Haider M. al-Khateeb, Ali Mansour, Gregory Epiphaniou, Ingo Frommholz, “A Classification of Colloquial Arabic Tweets in real-time to detect high-risk floods " International Conference on Social Media, Wearable and Web Analytics (C-MRIC 2017 ), Jun 2017 , IEEE.
Gregory Epiphaniou, Tim French, Haider Al-khateeb, Ali Dehghantanha and Hamid Jahankhani, “A Novel Anonymity Quantification and Preservation Model for UnderNet Relay Networks" 11th International Conference on Global Security, safety and Sustainability ICGS3, Jan 2017, Springer.
Depietro, S., D.; Epiphaniou, G.; Freiderikos, V.; Maple, C.; “Downhill+: An Improved Trust-based Path Selection Algorithm for the Tor Relay Network", 22th Telecommunications Forum, TELFOR, IEEE, Nov 2014
Ghazanfar, A., S.; Albermany, S.; Epiphaniou, G.; Masour, A.; “Prevention against threats to self coexistence: a Novel Authentication Protocol for CRNs”, The 7th IFIPWireless and Mobile Networking Conference (WMNC 2014), IEEE, May 2014
Oriwoh, E., Sant P., Epiphaniou, G., French T., Maple C. (2013) Do Not Pass The Buck: the need for responsibility Modelling in the Internet of Things, Procs. of the International Conference on ICT LAW 2013 (Information and Communication Technology & Law, Protection and Access Rights)
Oriwoh, E.; Jazani, D.; Epiphaniou, G.; Sant, P.; “Internet of Things Forensics: Challenges and approaches,” Collaborative Computing: Networking, Applications andWorksharing (Collaboratecom), 2013 9th International Conference Conference on ,IEEE, pp.608,615, 20-23 Oct. 2013
Oriwoh, E.; Sant, P.; Epiphaniou, G.; “Guidelines for Existing Internet of Things deployment approaches: The Things Commandments”, 4th International Conference on Emerging Ubiguitous Systems and Pervasive Networks, EUSPN-2013, Elsevier, Karlsruhe, Germany, Feb 2013.
French, T.;, Epiphaniou, G,; “The World wide Web: Cyber-security Crime Challenges and Intelligence Gathering Opportunitites from the “Dark” Side”, 3nd International Conference on Logistics, Informatics and Service Science, LISS, Springer, Aug 2013.
Ghazanfar, A. Safdar;, Epiphaniou, G,; “Wireless Sensor Networks for Rock Fall Detection and Pre-Warning”, 2nd International Conference on Applied Radio Systems Research and Smart Wireless Communications, SWICOM, May 2013.
Tazeen S. Syed,; Epiphaniou, G.; Ghazanfar A. Safdar;, “Dynamic Adjustment of Weighting and Safety Factors in Playout Buffers for Enhancing VoIP Quality”, International Conference on Science and Information, (SAI 2013), IEEE, Oct 2013.
Uchenna, P., D.,A.; Epiphaniou, G.; French, T.;, “A Novel Evidence Integrity Preservation Framework (EIPF) for Virtualised Environments: A Digital Forensic Approach”, International Conference on Cyber Security, Cyber Peacefare and Digital Forensics, (CyberSec2013), SDIWC, Mar 2013.
Epiphaniou, G.; Maple, C.; Sant, P.;, “Bridging the Gap Between Security and Quality of Service for VoIP Streams over Unicast Transmissions,” 19th Telecommunications Forum TELFOR 2011, IEEE, Nov 2011.
Maple, C.;, Viduto, V.; Epiphaniou, G.;, “A Theoretical Framework for Addressing Trust in Open Pervasive Networks”, International Conference on Pervasive and Embedded Computing and Communication Systems, (PECCS) pp 173-178, IEEE Sep 2011.
Epiphaniou, G.; Maple, C.; Sant, P.; Reeve, M.; , “An experimental analysis on iterative block ciphers and their effects on VoIP under different coding schemes,” Signal Processing and Multimedia Applications (SIGMAP), pp.17-25, IEEE, 26-28, Athens, July 2010.
Epiphaniou, G.; Maple, C.; Sant, P.; Norrington, P.; , “The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729,” International Conference for Internet Technology and Secured Transactions (ICITST), pp.1-6, 8-11, IEEE, London, Nov. 2010.
Epiphaniou, G.; Maple, C.; Sant, P.; Reeve, M.; , “Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss,”, International Conference on Availability, Reliability, and Security, (ARES), pp.33-40, IEEE, Feb 2010.
Epiphaniou, G.; Maple, C.;Reeve, M.; “An Optimisation Scheme for Encrypted VoIP Streams over Unicast Transmissions”, 1st International mini-Conference on Applied Computer Science and Technology
(ICACST-2010), RGS, Best Abstract Award, Feb 2010.