Selected Publications
2020
- Darren Hurley-Smith, Constantinos Patsakis, and Julio Hernandez-Castro. On the unbearable lightness of fips 140-2 randomness tests. IEEE transactions on information forensics and security, 2020. (To appear)
- D. Kallergis, Z. Garofalaki, G. Katsikogiannis and C. Douligeris, “CAPODAZ: A Containerised Authorisation and Policy-driven Architecture using Microservices”, Ad Hoc Journal (Elsevier), March 2020.
- Papastergiou, S., Mouratidis, H. & Kalogeraki, E. (2020) “Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures”. Evolving Systems.
- Constantinos Patsakis, Fran Casino, Vasilios Katos: Encrypted and covert DNS queries for botnets: Challenges and countermeasures. Comput. Secur. 88 (2020)
- M. Shahraeini and P. Kotzanikolaou, "A Dependency Analysis Model for Resilient Wide Area Measurement Systems in Smart Grid," IEEE Selected Areas of Communications, Special Issue on Communications and Data Analytics in Smart Grid, 38(1), January 2020.
- A. Valkanis, P. Nicopolitidis, G. Papadimitriou, D. Kallergis, C. Douligeris, and P. D. Bamidis, “Efficient Resource Allocation in Tactile-Capable Ethernet Passive Optical Healthcare LANs”, IEEE Access, accepted for publication, March 2020
2019
- C. Alcaraz, M. Burmester, J. Cuellar, X. Huan, P. Kotzanikolaou and M. Psarakis, “Guest Editiorial: Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures”, IEEE Internet of Things journal, Vol.6, Issue 5, pp.7988 – 7991, October 2019
- Fran Casino, Thomas K. Dasaklis, Constantinos Patsakis: A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics Informatics 36: 55-81 (2019)
- Fran Casino, Kim-Kwang Raymond Choo, Constantinos Patsakis: HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets. IEEE Trans. Information Forensics and Security 14(11): 2916-2926 (2019)
- A.Karalis, D. Zorbas and C. Douligeris, “Collision-Free Advertisement Scheduling for IEEE 802.15.4.TSCH Networks, Sensors, MDPI, 19,1789, doi:10.3390/s1908189, 2019.
- Nai-Fovino, R. Neisse, J.L. Hernandex-Ramos, G. Rzzzante, N. Polemi " European Cybersecurity Centres of Expertise Map -Definitions and Taxonomy" JRC Technical Reports, 2019
- Schauer S., Kalogeraki, E.M., Papastergiou S. and Douligeris C. (2019) "Detecting Sophisticated Attacks in Maritime Environments using Hybrid Situational Awareness" International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), Paris, France, 2019, pp. 1-7
- Schauer, S., Polemi, N., & Mouratidis, H. (2019) “MITIGATE: a dynamic supply chain cyber risk assessment methodology”, Journal of Transportation Security, 12(1-2), 1-35
2018
- Kalogeraki, E.-M., Papastergiou, S., Mouratidis, H., Polemi N., (2018) “A novel risk assessment methodology for SCADA maritime logistics environments”, Applied Sciences, MDPI AG, Switzerland, 8(9): 1477, ISSN: 2076-3417
- Kalogeraki, E.-M., Papastergiou, S., Polemi N., Douligeris C. (2018) “SAURON Real-life Scenario: A Terrorist Coordinated Attack in a EU Port”, NMIOTIC Maritime Interdiction Operations Journal 16(1) 22-27, ISSN: 2242-441X
- Kalogeraki, E.-M., Apostolou, D., Polemi N., Papastergiou S. (2018) "Knowledge Management Methodology for Identifying Threats in Maritime/Logistics Supply Chains" in S. Durtst, P. Evangelista (Eds) (SI) “Logistics knowledge management: state of the art and future perspectives”, Knowledge Management Research and Practice Journal, Taylor and Francis, ISSN: 1477-8238 (Print) 1477-8246, DOI: 10.1080/14778238.2018.1486789, Vol. 6, No 2.
- G. Katsikogiannis, D. Kallergis, Z. Garofalaki, S. Mitropoulos, C. Douligeris, Α Policy‐aware Service Oriented Architecture for Secure Machine‐to‐Machine Communications, Elsevier Ad hoc Networks, vol. 80, pp.70-80, 2018, Elsevier
- Eugenia A. Politou, Efthimios Alepis, Constantinos Patsakis: Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions. J. Cybersecurity 4(1)(2018)
- Polatidis, N., Pimenidis, E., Pavlidis, M., Papastergiou, S. and Mouratidis, H. (2018) From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks. Evolving Systems. ISSN 1868-6478, Springer-Verlag GmbH Germany, pp. 1–12
- I. Stellios, P. Kotzanikolaou, M. Psarakis, C. Alcaraz and J. Lopez, "A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services," in IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3453-3495, Forth quarter 2018.
Older
- P. Kotzanikolaou, G. Chatzisofroniou, M. Burmester, “Broadcast Anonymous Routing (BAR): Scalable Real-Time Anonymous Communication”, International Journal of Information Security, 6(3), pp 313–326, Springer, 2017.
- N.Polemi “Port Cybersecurity”, 1st Edition Securing Critical Information Infrastructures and Supply Chains, Elsevier, 2017
- G. Stergiopoulos, P. Kotzanikolaou, M. Theocharidou, G. Lykou, D. Gritzalis, “Time-based Critical Infrastructure Dependency Analysis for Large-Scale and Cross-Sectoral Failures”, Elsevier International Journal of Critical Infrastructure Protection 12(2016), 46-60.
- S. Mitropoulos, C. Othonos and C. Douligeris, “An effective and secure web banking system: development and Evaluation”, International Journal of Business Information Systems, Vol. 12, No. 13, pp. 335-361, 2013.
- A Avramidis, P. Kotzanikolaou, C. Douligeris and M. Burmester, “Chord-PKI: A Distributed Trust Infrastructure Based on P2P Networks, Computer Networks (Elsevier) Vol. 56, Issue 1, Jan. 2012, 378-398.
- D.A. Glynos, P. Argyroudis and C. Douligeris, “Collaborative Service Evaluation with the TwoHop Trust Framework”, Security and Communication Networks, Wiley, Vol. 5, 6, 594-613, June 2012.
- C. Tselikis, S. Mitropoulos, N. Komninos and C. Douligeris, “Degree-based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack”, IEEE Communications Letters, Vol. 16, Issue 5, pp. 619-621, March 2012.
- S. Mitropoulos, E. Kapodistria and C. Douligeris, "An Advanced Web Attack Detection and Prevention Tool" Information Management and Computer Security, Vol. 19, Issue 5, pp. 280-299, 2011, Emerald Publishers
- D. Patsos, S. Mitropoulos and C. Douligeris, “Expanding Topological Vulnerability Analysis through the Incident Response Intelligent System”, Information Management and Computer Security, Vol. 18, No. 4, 2010, pp. 291-309. (Outstanding Paper Award)
- P. Kotzanikolaou, R. Mavropodi, C. Douligeris, V. Chrissikopoulos, “Secure Distributed Intelligent Networks”, Computer Communications, Special Issue on Security, Vol. 29, No. 3, pp. 325-336, 2006.