• A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      ontemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation ...
    • A Security Policy Infrastructure for Tactical Service Oriented Architectures 

      Gkioulos, Vasileios; Wolthusen, Stephen (Chapter, 2017)
      Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant ...
    • A Systematic Literature Review on Military Software Defined Networks 

      Gkioulos, Vasileios; Gunleifsen, Håkon; Weldehawaryat, Goitom Kahsay (Journal article; Peer reviewed, 2018)
      Software Defined Networking (SDN) is an evolving network architecture paradigm that focuses on the separation of control and data planes. SDN receives increasing attention both from academia and industry, across a multitude ...
    • A Tiered Control Plane Model for Service Function Chaining Isolation 

      Gunleifsen, Håkon; Gkioulos, Vasileios; Kemmerich, Thomas (Journal article; Peer reviewed, 2018)
      This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay ...
    • Attack scenarios in critical infrastructure - Remote control of the regional electricity grid 

      Johansen, Thomas (Master thesis, 2020)
      The regional electricity grid is a central and vital component in any national electricity distribution. This grid consist of multiple cyber-physical systems (CPS) and hence is prone to attacks against any of these components, ...
    • Communication architecture for autonomous passenger ship 

      Amro, Ahmed Walid; Gkioulos, Vasileios; Katsikas, Sokratis (Peer reviewed; Journal article, 2021)
      Novel innovations have been witnessed in the past few years in the field of technology for autonomous vehicles. These have been exploited in various applications in the maritime domain; one such application is the proposal ...
    • Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation 

      Amro, Ahmed Walid; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2020)
      Recent innovations in the smart city domain include new autonomous transportation solutions such as buses and cars, while Autonomous Passenger Ships (APS) are being considered for carrying passengers across urban waterways. ...
    • Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      The first line of defense against cyber threats and cyber crimes is to be aware and get ready, e.g., through cyber security training. Training can have two forms, the first is directed towards security professionals and ...
    • Cyber Security Training for Critical Infrastructure Protection: a Literature Review 

      Chowdhury, Nabin; Gkioulos, Vasileios (Peer reviewed; Journal article, 2021)
      Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted ...
    • Cyber-Attacks Against the Autonomous Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2019)
      Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ...
    • Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. ...
    • Dynamic setup of IPsec VPNs in service function chaining 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article describes a novel mechanism for the automated establishment of dynamic Virtual Private Networks (VPN) in the application domain of Network Function Virtualization (NFV). Each hop in an NFV Service Function ...
    • Emulating IED In Cyber Range Reference Scenarios 

      Wist, Tore (Master thesis, 2020)
      En «Intelligent Electronic Device» (IED) er en programmerbar enhent som er brukt til lesing av verdier og kontroll av det fysiske miljøet i cyber-fysiske systemer. IEDer kan kommunisere med ander systermer og menneske-ma ...
    • Enabling Defensive Deception by Leveraging Software Defined Networks 

      Belalis, Ilias; Kavallieratos, Georgios; Gkioulos, Vasileios; Spathoulas, Georgios (Chapter, 2020)
      Computer networks are critical for modern society and protecting their security is of high importance. Due to their increasing size and complexity providing the required cyber security counter measures has become a very ...
    • Enhancing Usage Control for Performance: An Architecture for Systems of Systems 

      Gkioulos, Vasileios; Rizos, Athanasios; Michailidou, Christina; Mori, Paolo; Saracino, Andrea (Journal article; Peer reviewed, 2019)
      The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things (IoT), on-line banking systems, and contemporary emergency information systems, require the integration of access and ...
    • Modelling Shipping 4.0: A Reference Architecture for the Cyber-Enabled Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2020)
      There is intense activity of the maritime industry towards making remotely controlled and autonomous ships sail in the near future; this activity constitutes the instantiation of the Industry 4.0 process in the maritime ...
    • Reference Topologies and Scenarios for Cyber-Physical Systems in the Norwegian Cyber Range 

      Rønneberg, Jens (Master thesis, 2019)
      «Cyber-physical systems» (CPS) er systemer som er konstruerte av cyber- og fysiske komponenter, og som samhandler med mulig hjelp av menneskelig interaksjon. CPS brukes i kritiske infrastruktursektorer som energisystemer ...
    • Risk Perception of Influence Operations on Social Media 

      Liberg, Bjørnar Fidje (Master thesis, 2021)
      Påvirkningsoperasjoner kan defineres som organiserte forsøk på å påvirke en gruppe menneskers beslutningstaking, holdninger, og meninger, helst uten at gruppen innser at de blir påvirket. Ondsinnede påvirkningsoperasjoner ...
    • Risk Perceptions when participating in public debates on digital platforms 

      KHAN, SALMAN (Master thesis, 2021)
      Sosiale medier er en kilde som sprer mange forskjellige følelser og elementer som kan føre til positive eller negative påvirkninger på samfunnet. En studie av elementer som falske nyheter og feilinformasjon utmerker seg ...
    • SafeSec Tropos: Joint security and safety requirements elicitation 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      The growing convergence of information technology with operational technology and the accordant proliferation of interconnected cyber-physical systems (CPSs) has given rise to several security and safety challenges. One ...