• A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      ontemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation ...
    • A Security Policy Infrastructure for Tactical Service Oriented Architectures 

      Gkioulos, Vasileios; Wolthusen, Stephen (Chapter, 2017)
      Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant ...
    • A Systematic Literature Review on Military Software Defined Networks 

      Gkioulos, Vasileios; Gunleifsen, Håkon; Weldehawaryat, Goitom Kahsay (Journal article; Peer reviewed, 2018)
      Software Defined Networking (SDN) is an evolving network architecture paradigm that focuses on the separation of control and data planes. SDN receives increasing attention both from academia and industry, across a multitude ...
    • A Tiered Control Plane Model for Service Function Chaining Isolation 

      Gunleifsen, Håkon; Gkioulos, Vasileios; Kemmerich, Thomas (Journal article; Peer reviewed, 2018)
      This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay ...
    • Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      The first line of defense against cyber threats and cyber crimes is to be aware and get ready, e.g., through cyber security training. Training can have two forms, the first is directed towards security professionals and ...
    • Cyber-Attacks Against the Autonomous Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2019)
      Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ...
    • Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. ...
    • Dynamic setup of IPsec VPNs in service function chaining 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article describes a novel mechanism for the automated establishment of dynamic Virtual Private Networks (VPN) in the application domain of Network Function Virtualization (NFV). Each hop in an NFV Service Function ...
    • Enhancing Usage Control for Performance: An Architecture for Systems of Systems 

      Gkioulos, Vasileios; Rizos, Athanasios; Michailidou, Christina; Mori, Paolo; Saracino, Andrea (Journal article; Peer reviewed, 2019)
      The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things (IoT), on-line banking systems, and contemporary emergency information systems, require the integration of access and ...
    • Reference Topologies and Scenarios for Cyber-Physical Systems in the Norwegian Cyber Range 

      Rønneberg, Jens (Master thesis, 2019)
      «Cyber-physical systems» (CPS) er systemer som er konstruerte av cyber- og fysiske komponenter, og som samhandler med mulig hjelp av menneskelig interaksjon. CPS brukes i kritiske infrastruktursektorer som energisystemer ...
    • Securing Tactical Service Oriented Architectures 

      Gkioulos, Vasileios (Doctoral theses at NTNU;2018:46, Doctoral thesis, 2017)
      Abstract Research and development across military network technologies is an ongoing task, seeking to satisfy continuously evolving requirements and adversarial models. Beyond distinct implementations or technologies, the ...
    • Security Awareness of the Digital Natives 

      Gkioulos, Vasileios; Wangen, Gaute; Katsikas, Sokratis; Kavallieratos, George; Kotzanikolaou, Panayiotis (Journal article; Peer reviewed, 2017)
      Young generations make extensive use of mobile devices, such as smartphones, tablets and laptops, while a plethora of security risks associated with such devices are induced by vulnerabilities related to user behavior. ...
    • Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017 

      Gkioulos, Vasileios; Wolthusen, Stephen (Chapter; Conference object, 2017)
      The requirement for enabling network centric warfare through the accommodation of network-enabled capabilities, promoted the use of service oriented architectures (SOA) within military networks. The initial response of the ...
    • Security Requirements for the Deployment of Services Across Tactical SOA 

      Gkioulos, Vasileios; Wolthusen, Stephen (Journal article; Peer reviewed, 2017)
      Service Oriented Architectures (SOA) have been identified as a suitable mediator towards the attainment of the requirements imposed by modern warfare. Earlier studies focused primarily on the strategic domain, or the ...
    • Threat Analysis for Smart Homes 

      Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen (Journal article; Peer reviewed, 2019)
      The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments ...
    • Threat Analysis in Dynamic Environments: The Case of the Smart Home 

      Kavallieratos, Georgios; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2019)
      The rapid advancement of information and communication technologies has fostered the development and deployment of complex interrelated systems, many of which also present highly dynamic operational characteristics. These ...
    • User Modeling Validation Over the Security Awareness of Digital Natives 

      Gkioulos, Vasileios; Wangen, Gaute; Katsikas, Sokratis (Journal article; Peer reviewed, 2017)
      Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices ...