• Access Control in Critical Infrastructure Control Rooms using Continuous Authentication and Face Recognition 

      Dragerengen, Kristian (Master thesis, 2018)
      Access control solutions in critical infrastructure control rooms do not support needs for availability and traceability. Most solutions rely on usernames and passwords that are used on multiple accounts on different ...
    • Communication architecture for autonomous passenger ship 

      Amro, Ahmed Walid; Gkioulos, Vasileios; Katsikas, Sokratis (Peer reviewed; Journal article, 2021)
      Novel innovations have been witnessed in the past few years in the field of technology for autonomous vehicles. These have been exploited in various applications in the maritime domain; one such application is the proposal ...
    • Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation 

      Amro, Ahmed Walid; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2020)
      Recent innovations in the smart city domain include new autonomous transportation solutions such as buses and cars, while Autonomous Passenger Ships (APS) are being considered for carrying passengers across urban waterways. ...
    • Cyber-Attacks Against the Autonomous Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2019)
      Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ...
    • Cyberpower Praxis: A Study of Ways to Improve Understanding and Governance in the Cyber Domain 

      Knox, Benjamin James (Doctoral theses at NTNU;2020:153, Doctoral thesis, 2020)
      Powerful effects arriving through cyberspace present real-world shared problems that cannot be foreseen. This thesis acknowledges the modern-day Faustian Bargain of staying digitally dependent, staying vulnerable presented ...
    • GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control 

      Collen, Anastasija; Nijdam, Niels Alexander; Augusto-Gonzalez, Javier; Katsikas, Sokratis; Giannoutakis, Konstantinos M.; Spathoulas, Georgios; Gelenbe, Erol; Votis, Konstantinos; Tzovaras, Dimitrios; Ghavami, Navid; Volkamer, Melanie; Haller, Piroska; Sanchez, Alvaro; Dimas, Miltiadis (Chapter, 2018)
      We present the European research project GHOST, (Safe-guarding home IoT environments with personalised real-time risk control), which challenges the traditional cyber security solutions for the IoT by proposing a novel ...
    • Privacy Preserving Passive DNS 

      Papadopoulos, Pavlos; Pitropakis, Nikolaos; Buchanan, William; Lo, Owen; Katsikas, Sokratis (Peer reviewed; Journal article, 2020)
      The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and ...
    • A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric 

      Stamatellis, Charalampos; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Katsikas, Sokratis; Buchanan, William (Peer reviewed; Journal article, 2020)
      Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record ...
    • SafeSec Tropos: Joint security and safety requirements elicitation 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      The growing convergence of information technology with operational technology and the accordant proliferation of interconnected cyber-physical systems (CPSs) has given rise to several security and safety challenges. One ...
    • Security Awareness of the Digital Natives 

      Gkioulos, Vasileios; Wangen, Gaute; Katsikas, Sokratis; Kavallieratos, George; Kotzanikolaou, Panayiotis (Journal article; Peer reviewed, 2017)
      Young generations make extensive use of mobile devices, such as smartphones, tablets and laptops, while a plethora of security risks associated with such devices are induced by vulnerabilities related to user behavior. ...
    • Threat Analysis for Smart Homes 

      Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen (Journal article; Peer reviewed, 2019)
      The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments ...
    • Threat Analysis in Dynamic Environments: The Case of the Smart Home 

      Kavallieratos, Georgios; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2019)
      The rapid advancement of information and communication technologies has fostered the development and deployment of complex interrelated systems, many of which also present highly dynamic operational characteristics. These ...
    • Towards a secure automatic identification system (AIS) 

      Goudossis, Athanassios; Katsikas, Sokratis (Journal article; Peer reviewed, 2018)
      The Automatic Identification System (AIS) is the emerging system for automatic traffic control and collision avoidance services in the maritime transportation sector. It is one of the cornerstone systems for improved marine ...
    • Towards automated threat-based risk assessment for cyber security in smarthomes 

      Pandey, Pankaj; Collen, Anastasija; Nijdam, Niels Alexander; Anagnostopoulos, Marios; Katsikas, Sokratis; Konstantas, Dimitri (Journal article; Peer reviewed, 2019)
      Cyber security is a concern of each citizen, especially when it comes to novel technologies surrounding us in our daily lives. Fighting a cyber battle while enjoying your cup of coffee and observing gentle lights dimming ...
    • Towards Improving Existing Online Social Networks’ Privacy Policies 

      Michota, Alexandra; Katsikas, Sokratis (Journal article; Peer reviewed, 2018)
      Abstract: The privacy policies of online social network (OSN) service providers are criticised as falling short of satisfying their users’ privacy expectations letting huge quantities of their personally identifiable ...
    • User Modeling Validation Over the Security Awareness of Digital Natives 

      Gkioulos, Vasileios; Wangen, Gaute; Katsikas, Sokratis (Journal article; Peer reviewed, 2017)
      Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices ...
    • Using Blockchains to strengthen the security of Internet of Things 

      Kouzinopoulos, Charalampos S.; Spathoulas, Georgios; Giannoutakis, Konstantinos M.; Votis, Konstantinos; Pandey, Pankaj; Tzovaras, Dimitrios; Katsikas, Sokratis; Collen, Anastasija; Nijdam, Niels Alexander (Chapter, 2018)
      Blockchain is a distributed ledger technology that became popular as the foundational block of the Bitcoin cryptocurrency. Over the past few years it has seen a rapid growth, both in terms of research and commercial usage. ...
    • White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019 

      Assenza, Giacomo; Cozzani, Valerio; Flammini, Francesco; Gotcheva, Nadezhda; Gustafsson, Tommy; Hansson, Anders; Heikkilä, Jouko; Iaiani, Matteo; Katsikas, Sokratis; Nissilä, Minna; Oliva, Gabriele; Richter, Eleni; Roelofs, Maaike; Saman Azari, Mehdi; Setola, Roberto; Stejin, Wouter; Tugnoli, Alessandro; Vanderbeek, Dolf; Westerdahl, Lars; Ylönen, Marja; Young, Heather (Chapter, 2019)
      The security of critical infrastructures is of paramount importance nowadays due to the growing complexity of components and applications. This paper collects the contributions to the industry dissemination session within ...