• A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      ontemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation ...
    • A Security Policy Infrastructure for Tactical Service Oriented Architectures 

      Gkioulos, Vasileios; Wolthusen, Stephen (Chapter, 2017)
      Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant ...
    • A Systematic Literature Review on Military Software Defined Networks 

      Gkioulos, Vasileios; Gunleifsen, Håkon; Weldehawaryat, Goitom Kahsay (Journal article; Peer reviewed, 2018)
      Software Defined Networking (SDN) is an evolving network architecture paradigm that focuses on the separation of control and data planes. SDN receives increasing attention both from academia and industry, across a multitude ...
    • A Tiered Control Plane Model for Service Function Chaining Isolation 

      Gunleifsen, Håkon; Gkioulos, Vasileios; Kemmerich, Thomas (Journal article; Peer reviewed, 2018)
      This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay ...
    • Attack scenarios in critical infrastructure - Remote control of the regional electricity grid 

      Johansen, Thomas (Master thesis, 2020)
      The regional electricity grid is a central and vital component in any national electricity distribution. This grid consist of multiple cyber-physical systems (CPS) and hence is prone to attacks against any of these components, ...
    • Communication architecture for autonomous passenger ship 

      Amro, Ahmed Walid; Gkioulos, Vasileios; Katsikas, Sokratis (Peer reviewed; Journal article, 2021)
      Novel innovations have been witnessed in the past few years in the field of technology for autonomous vehicles. These have been exploited in various applications in the maritime domain; one such application is the proposal ...
    • Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation 

      Amro, Ahmed Walid; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2020)
      Recent innovations in the smart city domain include new autonomous transportation solutions such as buses and cars, while Autonomous Passenger Ships (APS) are being considered for carrying passengers across urban waterways. ...
    • Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      The first line of defense against cyber threats and cyber crimes is to be aware and get ready, e.g., through cyber security training. Training can have two forms, the first is directed towards security professionals and ...
    • Cyber Security Training for Critical Infrastructure Protection: a Literature Review 

      Chowdhury, Nabin; Gkioulos, Vasileios (Peer reviewed; Journal article, 2021)
      Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted ...
    • Cyber-Attacks Against the Autonomous Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2019)
      Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ...
    • Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services. As safety and security have ...
    • Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. ...
    • Dynamic setup of IPsec VPNs in service function chaining 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article describes a novel mechanism for the automated establishment of dynamic Virtual Private Networks (VPN) in the application domain of Network Function Virtualization (NFV). Each hop in an NFV Service Function ...
    • Emulating IED In Cyber Range Reference Scenarios 

      Wist, Tore (Master thesis, 2020)
      En «Intelligent Electronic Device» (IED) er en programmerbar enhent som er brukt til lesing av verdier og kontroll av det fysiske miljøet i cyber-fysiske systemer. IEDer kan kommunisere med ander systermer og menneske-ma ...
    • Enabling Defensive Deception by Leveraging Software Defined Networks 

      Belalis, Ilias; Kavallieratos, Georgios; Gkioulos, Vasileios; Spathoulas, Georgios (Chapter, 2020)
      Computer networks are critical for modern society and protecting their security is of high importance. Due to their increasing size and complexity providing the required cyber security counter measures has become a very ...
    • Enhancing Usage Control for Performance: An Architecture for Systems of Systems 

      Gkioulos, Vasileios; Rizos, Athanasios; Michailidou, Christina; Mori, Paolo; Saracino, Andrea (Journal article; Peer reviewed, 2019)
      The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things (IoT), on-line banking systems, and contemporary emergency information systems, require the integration of access and ...
    • Key Competencies for Critical Infrastructure Cyber-Security: a Systematic Literature Review 

      Chowdhury, Nabin; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      Purpose The purpose of this paper can be encapsulated in the following points: identify the research papers published on the topic: competencies and skills necessary for critical infrastructure (CI) cyber-security (CS) ...
    • Modeling Effective Cybersecurity Training Frameworks: a Delphi Method-based Study 

      Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2021)
      Today, cybersecurity training is commonplace in both large companies and Small & Medium Enterprise (SME). Nonetheless, the effectiveness of many of the current training offerings is put into question by reports of increasing ...
    • Modelling Shipping 4.0: A Reference Architecture for the Cyber-Enabled Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2020)
      There is intense activity of the maritime industry towards making remotely controlled and autonomous ships sail in the near future; this activity constitutes the instantiation of the Industry 4.0 process in the maritime ...
    • Reference Topologies and Scenarios for Cyber-Physical Systems in the Norwegian Cyber Range 

      Rønneberg, Jens (Master thesis, 2019)
      «Cyber-physical systems» (CPS) er systemer som er konstruerte av cyber- og fysiske komponenter, og som samhandler med mulig hjelp av menneskelig interaksjon. CPS brukes i kritiske infrastruktursektorer som energisystemer ...