• A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      ontemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation ...
    • A Security Policy Infrastructure for Tactical Service Oriented Architectures 

      Gkioulos, Vasileios; Wolthusen, Stephen (Chapter, 2017)
      Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant ...
    • A Systematic Literature Review on Military Software Defined Networks 

      Gkioulos, Vasileios; Gunleifsen, Håkon; Weldehawaryat, Goitom Kahsay (Journal article; Peer reviewed, 2018)
      Software Defined Networking (SDN) is an evolving network architecture paradigm that focuses on the separation of control and data planes. SDN receives increasing attention both from academia and industry, across a multitude ...
    • A Tiered Control Plane Model for Service Function Chaining Isolation 

      Gunleifsen, Håkon; Gkioulos, Vasileios; Kemmerich, Thomas (Journal article; Peer reviewed, 2018)
      This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay ...
    • Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation 

      Amro, Ahmed Walid; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2020)
      Recent innovations in the smart city domain include new autonomous transportation solutions such as buses and cars, while Autonomous Passenger Ships (APS) are being considered for carrying passengers across urban waterways. ...
    • Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      The first line of defense against cyber threats and cyber crimes is to be aware and get ready, e.g., through cyber security training. Training can have two forms, the first is directed towards security professionals and ...
    • Cyber Security Training for Critical Infrastructure Protection: a Literature Review 

      Chowdhury, Nabin; Gkioulos, Vasileios (Peer reviewed; Journal article, 2021)
      Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted ...
    • Cyber-Attacks Against the Autonomous Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2019)
      Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ...
    • Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. ...
    • Dynamic setup of IPsec VPNs in service function chaining 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article describes a novel mechanism for the automated establishment of dynamic Virtual Private Networks (VPN) in the application domain of Network Function Virtualization (NFV). Each hop in an NFV Service Function ...
    • Enabling Defensive Deception by Leveraging Software Defined Networks 

      Belalis, Ilias; Kavallieratos, Georgios; Gkioulos, Vasileios; Spathoulas, Georgios (Chapter, 2020)
      Computer networks are critical for modern society and protecting their security is of high importance. Due to their increasing size and complexity providing the required cyber security counter measures has become a very ...
    • Enhancing Usage Control for Performance: An Architecture for Systems of Systems 

      Gkioulos, Vasileios; Rizos, Athanasios; Michailidou, Christina; Mori, Paolo; Saracino, Andrea (Journal article; Peer reviewed, 2019)
      The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things (IoT), on-line banking systems, and contemporary emergency information systems, require the integration of access and ...
    • Reference Topologies and Scenarios for Cyber-Physical Systems in the Norwegian Cyber Range 

      Rønneberg, Jens (Master thesis, 2019)
      «Cyber-physical systems» (CPS) er systemer som er konstruerte av cyber- og fysiske komponenter, og som samhandler med mulig hjelp av menneskelig interaksjon. CPS brukes i kritiske infrastruktursektorer som energisystemer ...
    • SafeSec Tropos: Joint security and safety requirements elicitation 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      The growing convergence of information technology with operational technology and the accordant proliferation of interconnected cyber-physical systems (CPSs) has given rise to several security and safety challenges. One ...
    • Securing Tactical Service Oriented Architectures 

      Gkioulos, Vasileios (Doctoral theses at NTNU;2018:46, Doctoral thesis, 2017)
      Abstract Research and development across military network technologies is an ongoing task, seeking to satisfy continuously evolving requirements and adversarial models. Beyond distinct implementations or technologies, the ...
    • Security Awareness of the Digital Natives 

      Gkioulos, Vasileios; Wangen, Gaute; Katsikas, Sokratis; Kavallieratos, George; Kotzanikolaou, Panayiotis (Journal article; Peer reviewed, 2017)
      Young generations make extensive use of mobile devices, such as smartphones, tablets and laptops, while a plethora of security risks associated with such devices are induced by vulnerabilities related to user behavior. ...
    • Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017 

      Gkioulos, Vasileios; Wolthusen, Stephen (Chapter; Conference object, 2017)
      The requirement for enabling network centric warfare through the accommodation of network-enabled capabilities, promoted the use of service oriented architectures (SOA) within military networks. The initial response of the ...
    • Security Requirements for the Deployment of Services Across Tactical SOA 

      Gkioulos, Vasileios; Wolthusen, Stephen (Journal article; Peer reviewed, 2017)
      Service Oriented Architectures (SOA) have been identified as a suitable mediator towards the attainment of the requirements imposed by modern warfare. Earlier studies focused primarily on the strategic domain, or the ...
    • Threat Analysis for Smart Homes 

      Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen (Journal article; Peer reviewed, 2019)
      The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments ...
    • Threat Analysis in Dynamic Environments: The Case of the Smart Home 

      Kavallieratos, Georgios; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2019)
      The rapid advancement of information and communication technologies has fostered the development and deployment of complex interrelated systems, many of which also present highly dynamic operational characteristics. These ...