Publications

Project material

Journals

  1. “WARDOG: Awareness detection watchdog for Botnet infection on the host device”, G. Hatzivasilis, O. Soultatos, P. Chatziadam, K. Fysarakis, I. Askoxylakis, S. Ioannidis, G. Alexandris, V. Katos, G. Spanoudakis, IEEE Transactions on Sustainable Computing – Special Issue on Sustainable Information and Forensic Computing, vol. 4, pp. 1-15, May 2019 (DOI: 10.1109/TSUSC.2019.2914917)
  2. “An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning”, E. A. Alkeem, S.-K. Kim, C. Y. Yeun, M. J. Zemerly, K. F. Poon, G. Gianini, P. D. Yoo, IEEE Access – Special Section on Artificial Intelligence in Cybersecurity, vol. 7, pp. 123069-123075, August 2019 (DOI: 10.1109/ACCESS.2019.2937357)
  3. “The coevolution of contagion and behavior with increasing and decreasing awareness”, S. Maghool, N. M.-J. Maghoolsaraei, M. Cremonini, PLOS ONE, vol. 14, issue 12, article: e0225447, pp. 1-22, December 2019 (DOI:https://doi.org/10.1371/journal.pone.0225447)
  4. “Managing a pool of rules for credit card fraud detection by a Game Theory based approach”, G. Gianini, L. G. Fossi, C. Mio, O. Caelend, L. Brunie, E. Damiani, Future Generation Computer Systems, Elsevier, , vol. 102, issue 2020, pp. 549-561, January 2020 (DOI: 10.1016/j.future.2019.08.028)
  5. “MobileTrust: Secure Knowledge Integration in VANETs”, G. Hatzivasilis, O. Soultatos, S. Ioannidis, G. Spanoudakis, V. Katos, G. Demetriou, ACM Transactions on Cyber-Physical Systems – Special Issue on User-Centric Security and Safety for Cyber-Physical Systems, ACM, , vol. 4, issue 3, Article no. 33, pp. 1-25, March 2020 (DOI: 10.1145/3364181)
  6. “A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem”, S. Cimato, G. Gianini, M. Sepehri, R. Asal, E. Damiani, Journal of Information Security and Applications, Elsevier, vol. 51, article 102462, pp. 1-10, April 2020 (DOI:10.1016/j.jisa.2020.102462)
  7. “The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks”, M. Diamantaris, F. Marcantoni, S. Ioannidis, J. Polakis, ACM Transactions on Privacy and Security (TOPS), ACM, vol. 23, issue 4, article 19, pp. 1-19, July 2020 (DOI: 10.1145/3403947)
  8. “AI-driven composition and security validation of an IoT ecosystem”, G. Hatzivasilis, N. Papadakis, I. Hatzakis, S. Ioannidis, G. Vardakis, Applied Sciences – Special Issue on Smart City and Multi-Agent Systems, MDPI Open Access Journal, vol. 10, issue 14, article 4862, pp. 1-31, August 2020 (DOI: 10.3390/app10144862)
  9. “Modern aspects of cyber-security training and continuous adaptation of programmes to trainees”, G. Hatzivasilis, S. Ioannidis, M. Smyrlis, G. Spanoudakis, F. Frati, L. Goeke, T. Hildebrandt, G. Tsakirakis, F. Oikonomou, G. Leftheriotis, H. Koshutanski, Applied Sciences – Special Issue on Cyber Security of Critical Infrastructures, MDPI Open Access Journal, vol. 10, issue 16, article 5702, pp. 1-26, August 2020 (DOI: 10.3390/app10165702)
  10. “Temporal-based intrusion detection for IoV”, M. Hamad, Z. A. H. Hammadeh, S. Saidi, V. Prevelakis, Information Technology, De Gruyter Oldenbourg, vol. 62, issue 5-6, pp. 227-239, December 2020 (DOI: 10.1515/itit-2020-0009)
  11. “SPD-Safe: Secure administration of railway intelligent transportation systems”, G. Hatzivasilis, K. Fysarakis, S. Ioannidis, I. Hatzakis, G. Vardakis, N. Papadakis, G. Spanoudakis, Electronics – Special Issue on Advances in Public Transport Platform for the Development of Sustainability Cities, MDPI Open Access Journal, vol. 10, issue 1, article 92, pp. 1-26, January 2021 (DOI: 10.3390/electronics10010092)
  12. “CYRA: A Model-Driven CYber Range Assurance Platform”, M. Smyrlis, I. Somarakis, G. Spanoudakis, G. Hatzivasilis, S. Ioannidis, Applied Sciences – Special Issue on Security management of 5G and IoT ecosystems, MDPI Open Access Journal, vol. 11, issue 11, article 5165, pp. 1-28, June 2021 (DOI: 10.3390/app11115165)

Articles

  1. “Big Data & Issues & Opportunities: Cybersecurity”, J. Debussche, J. César, S. Mortier, in TwoBirds, the 4th article of the “Big Data & Issues & Opportunities” series, January 2019, Also published in Lexology and Digital Business
  2. “Big Data & Issues & Opportunities: Breach-related obligations”, J. Debussche, J. César, I. De Moortel, S. Mortier, in TwoBirds, the 5th article of the “Big Data & Issues & Opportunities” series, February 2019, Also published in Lexology and Digital Business
  3. “Cyber risks in healthcare organizations and the insight of using the THREAT-ARREST platform for training”, (in Italian) A. Chieti, G. Maglio, V. Petrarolo, C. Tanzarella, Agendadigitale.eu, July 2019
  4. “Cyber-Ranges as a Mean of Security Culture Establishment”, G. Hatzivasilis, K. Fysarakis, S. Ioannidis, ERCIM News – Special Theme: The Climate Action, ERCIM, issue 121, Article no. 36, pp. 36-37, April 2020
  5. “TÜV HELLAS (TÜV NORD) Leading in the Implementation of Cyber-Security Innovations”, (in Greek) George Leftheriotis, TÜV NORD Blog, September 2020
  6. “Cyber-ranges and security training for the maritime sector”, S. Ioannidis and G. Hatzivasilis, 4th NMIOTC Conference on Cyber Security in Maritime Domain, NATO, Souda Bay, Chania, Greece, 30 September – 1 October, 2020
  7. “Security in Human vs Cyber ecosystems”, G. Tsakirakis, ITML Blog, November, 2020
  8. “Training and Security in the Cyber-Space”, (in Greek) G. Hatzivasilis, Researcher’s Night 2020, Heraklion, November, 2020
  9. “Teaching Users New IoT Tricks: A Model-driven Cyber Range for IoT Security Training”, M. Smyrlis, G. Spanoudakis, K. Fysarakis, IEEE Internet of Things (IoT) Magazine, March, 2021
Conferences/Workshops
  1. “A Secure and Efficient File System Access Control Mechanism (FlexFS)”, J. Najar and V. Prevelakis, International workshop on Information & Operational Technology (IT & OT) security systems (IOSec), RAID Heraklion, Crete, Greece, Springer, LNCS, vol. 11398, pp. 15-26, September 2018 (DOI: 10.1007/978-3-030-12085-6_2)
  2. “ProSEV: Proxy-Based Secure and Efficient Vehicular Communication”, M. Hamad, M. R. Agha, V. Prevelakis, IEEE Vehicular Networking Conference (VNC), Taipei, Taiwan, pp. 1-8, January 2019 (DOI: 10.1109/VNC.2018.8628360)
  3. “REAPER: Real-time App Analysis for Augmenting the Android Permission System”, M. Diamantaris; E. P. Papadopoulos, E. P. Markatos, S. Ioannidis, J. Polakis, 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Richardson, TX, USA, pp. 3063-3071, March 2019 (DOI: 10.1145/3292006.3300027)
  4. “A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks”, F. Marcantoni, M. Diamantaris, S. Ioannidis, J. Polakis, The World Wide Web (WWW’18) Conference, San Francisco, CA, USA, pp. 3063-3071, May 2019 (DOI: 10.1145/3308558.3313539)
  5. “Review of Security and Privacy for the Internet of Medical Things (IoMT)”, G. Hatzivasilis, O. Soultatos, S. Ioannidis, C.  Verikoukis, G. Demetriou, C. I. Tsatsoulis, IEEE 15th International Conference on Distributed Computing in Sensor Systems (DCOSS),
    Santorini Island, Greece, pp. 457-464, May 2019 (DOI: 10.1109/DCOSS.2019.00091)
  6. “The CE-IoT Framework for Green ICT Organizations”, G. Hatzivasilis, N. Christodoulakis, C. Tzagkarakis, S. Ioannidis, K. Fysarakis, G. Demetriou, M. Panayiotou, IEEE 15th International
    Conference on Distributed Computing in Sensor Systems (DCOSS),
    Santorini Island, Greece, pp. 436-442, May 2019 (DOI: 10.1109/DCOSS.2019.00088)
  7. “Cyber Insurance of Information Systems”, G. Hatzivasilis, P. Chatziadam, N. E. Petroulakis, M. Mangini, C. Kloukinas, A. Yautsiukhin, M. Antoniou, D. G. Katehakis, M. Panayiotou,
    24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), Limassol, Cyprus, pp. 1-7, September 2019 (DOI: 10.1109/camad.2019.8858165)
  8. “Towards the Insurance of Healthcare Systems”, G. Hatzivasilis, P. Chatziadam, A. Miaoudakis, E. Lakka, A. Alessio, M. Smyrlis, G. Spanoudakis, A. Yautsiukhin, M. Antoniou, N. Stathiakis, 1st Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Luxembourg, Springer, LNCS, vol. 11981, pp. 185-198, September 2019 (DOI: 10.1007/978-3-030-42051-2_13)
  9. “The TREAT-ARREST Cyber-Security Training Platform”, O. Soultatos, K. Fysarakis, G. Spanoudakis, H. Koshutanski, E. Damiani, K. Beckers, D. Wortmann, G. Bravos, M. Ioannidis, 1st Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Luxembourg, Springer, LNCS, vol. 11981, pp 199-214 September 2019 (DOI: 10.1007/978-3-030-42051-2_14)
  10. “PROTECT – An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks”, L. Goeke, A. Quintanar, K. Beckers, S. Pape, 1st Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Luxembourg, Springer, LNCS, vol. 11981, pp 156-171, September 2019 (DOI: 10.1007/978-3-030-42051-2_11)
  11. “Model-driven Cyber Range Training – The Cyber Security Assurance Perspective”, I. Somarakis, M. Smyrlis, K. Fysarakis, G. Spanoudakis, 1st Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Luxembourg, Springer, LNCS, vol. 11981, pp 172-184, September 2019 (DOI: 10.1007/978-3-030-42051-2_12)
  12. “A model driven approach for cyber security scenarios deployment”, C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, L. Mauri, 1st Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Luxembourg, Springer, LNCS, vol. 11981, pp 107-122, September 2019 (DOI: 10.1007/978-3-030-42051-2_8)
  13. “Secure Data Exchange for Computationally Constrained Devices”, V. Prevelakis, M., J. Najar, I. Spais, International workshop on Information & Operational Technology (IT & OT) security systems (IOSec), ESORICS, Luxembourg, pp. 1-15, September 2019 (DOI: -)
  14. “Efficient Monitoring of Library Call Invocation”, M. Tsantekidis and V. Prevelakis, 6th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), IEEE, Granada,Spain, pp. 387-392, October 2019 (DOI: 10.1109/IOTSMS48152.2019.8939203)
  15. “Secure Semantic Interoperability for IoT Applications with Linked Data”, G. Hatzivasilis, O. Soultatos, E. Lakka, S. Ioannidis, D. Anicic, A. Broring, L. Ciechomski, M. Falchetto, K. Fysarakis, G. Spanoudakis, IEEE Global Communications Conference (GLOBECOM 2019), Waikoloa, HI, USA, pp. 1-7, December 2019 (DOI: 10.1109/globecom38437.2019.9013147)
  16. “Systematic Scenario Creation for Serious Security-Awareness Games”, V. Hazilov, S. Pape, 2nd Workshop on Security, Privacy, Organizations, and Systems Engineering (SPOSE), ESORICS, Guildford, UK, Springer, LNCS, vol. 12580, pp. 294-311, September 2020 (DOI: 10.1007/978-3-030-66504-3_18)
  17. “Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models”, M. Smyrlis, K. Fysarakis, G. Spanoudakis, G. Hatzivasilis, 2nd Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Guildford, UK, Springer, LNCS, vol. 12512, pp. 22-37, September 2020 (DOI: 10.1007/978-3-030-62433-0_2)
  18. “Conceptualization of a CyberSecurity Awareness Quiz”, S. Pape, L. Goeke, A. Quintanar, K. Beckers, 2nd Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Guildford, UK, Springer, LNCS, vol. 12512, pp. 61-76, September 2020 (DOI: 10.1007/978-3-030-62433-0_4)
  19. “Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges”, C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, S. Astaneh, 2nd Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Guildford, UK, Springer, LNCS, vol. 12512, pp. 79-91, September 2020 (DOI: 10.1007/978-3-030-62433-0_5)
  20. “Chasing Botnets: A Real Security Incident Investigation”, G. Hatzivasilis and M. Kunc, 2nd Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Guildford, UK, Springer, LNCS, vol. 12512, pp. 111-124, September 2020 (DOI: 10.1007/978-3-030-62433-0_7)
  21. “Software System Exploration using Library Call Analysis”, M. Tsantekidis and V. Prevelakis, 2nd Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Guildford, UK, Springer, LNCS, vol. 12512, pp. 125-139, September 2020 (DOI: 10.1007/978-3-030-62433-0_8)
  22. “Password Management – How Secure Is Your Login Process?”, G. Hatzivasilis, 2nd Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Guildford, UK, Springer, LNCS, vol. 12512, pp. 157-177, September 2020 (DOI: 10.1007/978-3-030-62433-0_10)
  23. “Learning Vector Quantization and Radial Basis Function Performance Comparison Based Intrusion Detection System”, J. T. Hounsou, P. B. C. Niyomukiza, T. Nsabimana, G. Vlavonou, F. Frati, E. Damiani, International Conference on Intelligent Human Systems Integration (IHSI), Palermo, Italy, Springer, AISC, vol. 1322, pp. 561-572, February 2021 (DOI: 10.1007/978-3-030-68017-6_83)