Blar i NTNU Open på forfatter "Gkioulos, Vasileios"
-
Cyber Threats and Vulnerabilities in the Integrated Navigation System
Ruud, Ulrik Johansen (Master thesis, 2022)Det Integrerte Navigasjonssystemet (INS) er et viktig system i et maritimt fartøy. Det sørger for sikker navigering mens man er på havet. INS består av mange forskjellige typer enheter som hjelper til dette. Målet med denne ... -
Cyber-Attacks Against the Autonomous Ship
Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2019)Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ... -
Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey
Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services. As safety and security have ... -
Cybersecurity Training for Critical Infrastructure Protection
Chowdhury, Nabin (Doctoral theses at NTNU;2023:13, Doctoral thesis, 2023)Critical Infrastructures (CIs) are defined as the ensemble of assets that are essential for the functioning of a society and economy. As suggested by their namesake, they cover a key role in many of today’s developed and ... -
Cybersecurity Training in Norwegian Critical Infrastructure Companies
Chowdhury, Nabin; Nystad, Espen; Reegård, Kine; Gkioulos, Vasileios (Journal article; Peer reviewed, 2022)Human preparedness is a critical aspect of critical infrastructure (CI) cybersecurity. Many efforts, including educational curricula and training programs, have been taken at both national and company level to ensure human ... -
Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring
Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. ... -
Developing metrics to assess the effectiveness of cybersecurity awareness program
Chaudhary, Sunil; Gkioulos, Vasileios; Katsikas, Sokratis (Journal article; Peer reviewed, 2022) -
Dynamic setup of IPsec VPNs in service function chaining
Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)This article describes a novel mechanism for the automated establishment of dynamic Virtual Private Networks (VPN) in the application domain of Network Function Virtualization (NFV). Each hop in an NFV Service Function ... -
Emulating IED In Cyber Range Reference Scenarios
Wist, Tore (Master thesis, 2020)En «Intelligent Electronic Device» (IED) er en programmerbar enhent som er brukt til lesing av verdier og kontroll av det fysiske miljøet i cyber-fysiske systemer. IEDer kan kommunisere med ander systermer og menneske-ma ... -
Enabling Defensive Deception by Leveraging Software Defined Networks
Belalis, Ilias; Kavallieratos, Georgios; Gkioulos, Vasileios; Spathoulas, Georgios (Chapter, 2020)Computer networks are critical for modern society and protecting their security is of high importance. Due to their increasing size and complexity providing the required cyber security counter measures has become a very ... -
Enhancing Usage Control for Performance: An Architecture for Systems of Systems
Gkioulos, Vasileios; Rizos, Athanasios; Michailidou, Christina; Mori, Paolo; Saracino, Andrea (Journal article; Peer reviewed, 2019)The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things (IoT), on-line banking systems, and contemporary emergency information systems, require the integration of access and ... -
Evaluation of a Cyber Risk Assessment Approach for Cyber–Physical Systems: Maritime- and Energy-Use Cases
Amro, Ahmed Walid; Gkioulos, Vasileios (Peer reviewed; Journal article, 2023)In various domains such as energy, manufacturing, and maritime, cyber–physical systems (CPSs) have seen increased interest. Both academia and industry have focused on the cybersecurity aspects of such systems. The assessment ... -
From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks
Amro, Ahmed Walid; Gkioulos, Vasileios (Chapter, 2022)The maritime domain is among the critical sectors of our way of life. It is undergoing a major digital transformation introducing changes to its operations and technology. The International Maritime Organization urged the ... -
Holding on to Compliance While Adopting DevSecOps: An SLR
Ramaj, Xhesika; Sanchez Gordon, Mary Luz; Gkioulos, Vasileios; Chockalingam, Sabarathinam; Colomo-Palacios, Ricardo (Journal article; Peer reviewed, 2022)The software industry has witnessed a growing interest in DevSecOps due to the premises of integrating security in the software development lifecycle. However, security compliance cannot be disregarded, given the importance ... -
Improving Cyber Security Awareness of Seafarers
Moen, Ivar Olav (Master thesis, 2022)Skip har i takt med samfunnsutviklingen blitt høyteknologiske. Samtidig er det mange trusselaktører i cyberdomenet som retter angrep mot den maritime næringen. Sjøfolk får begrenset opplæring i temaer relatert til ... -
Industrial Control System Threat Intelligence, Process Safety, and Security Oriented Ontology
Berntsen, Sander Løken (Master thesis, 2022)Å beskytte industri kontroll systemer er en kompleks oppgave der feil kan føre til tap av liv. Denne oppgaven tar et dypdykk inn i litteraturen rundt industri kontroll system sikkerhet for å finne ut av hvilke elementer ... -
Interplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancements
Barbosa Heluany, Jessica; Amro, Ahmed Walid; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2024)This research delves into the consolidation of Digital Twin and cyber deception technologies and explores their potential synergy for advancing cybersecurity processes. The study begins with a literature survey and market ... -
Investigation of the Gap Between Traditional IP Network Security Management and the Adoption of Automation Techniques and Technologies to Network Security
Treider, Gloria (Master thesis, 2023)Innenfor området nettverks- og nettverkssikkerhetsautomatisering avdekker denne oppgaven et komplekst landskap av utfordringer og muligheter. Forskningen som er gjennomført, belyser de intrikate elementene som er innebygd ... -
Key Competencies for Critical Infrastructure Cyber-Security: a Systematic Literature Review
Chowdhury, Nabin; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)Purpose The purpose of this paper can be encapsulated in the following points: identify the research papers published on the topic: competencies and skills necessary for critical infrastructure (CI) cyber-security (CS) ... -
Modeling Effective Cybersecurity Training Frameworks: a Delphi Method-based Study
Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2021)Today, cybersecurity training is commonplace in both large companies and Small & Medium Enterprise (SME). Nonetheless, the effectiveness of many of the current training offerings is put into question by reports of increasing ...