Antonios Gouglidis

Orcid: 0000-0002-4702-3942

According to our database1, Antonios Gouglidis authored at least 47 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach.
IEEE Trans. Netw. Sci. Eng., 2024

Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments.
IEEE Trans. Cloud Comput., 2024

Security Evaluation in Software-Defined Networks.
CoRR, 2024

Real Arithmetic in TLAPM.
Proceedings of the NASA Formal Methods - 16th International Symposium, 2024

2023
An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments.
DTRAP, 2023

Model Checking Access Control Policies: A Case Study using Google Cloud IAM.
CoRR, 2023

Joint Security-vs-QoS Game Theoretical Optimization for Intrusion Response Mechanisms for Future Network Systems.
CoRR, 2023

Robust Federated Learning Method Against Data and Model Poisoning Attacks with Heterogeneous Data Distribution.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments.
Proceedings of the 13th International Conference on Cloud Computing and Services Science, 2023

2022
A Security Cost Modelling Framework for Cyber-Physical Systems.
ACM Trans. Internet Techn., 2022

A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems.
Int. J. Crit. Infrastructure Prot., 2022

An ICT architecture for enabling ancillary services in Distributed Renewable Energy Sources based on the SGAM framework.
Energy Inform., 2022

ThreatPro: Multi-Layer Threat Analysis in the Cloud.
CoRR, 2022

Poster: Multi-Layer Threat Analysis of the Cloud.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Specifying and verifying usage control models and policies in TLA<sup>+</sup>.
Int. J. Softw. Tools Technol. Transf., 2021

Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

2020
Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

Human and Organizational Issues for Resilient Communications.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

A categorisation of policy conflicts in distributed systems and network management.
Int. J. Inf. Priv. Secur. Integr., 2020

A flexible ICT architecture to support ancillary services in future electricity distribution networks: an accounting use case for DSOs.
Energy Inform., 2020

A Framework to Support ICS Cyber Incident Response and Recovery.
Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management, 2020

2019
Communication Standards for Distributed Renewable Energy Sources Integration in Future Electricity Distribution Networks.
Proceedings of the IEEE International Conference on Acoustics, 2019

Access Control in the Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Surveillance and security: protecting electricity utilities and other critical infrastructures.
Energy Inform., 2018

Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+.
Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design, 2018

2017
The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective.
IEEE J. Sel. Areas Commun., 2017

All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications.
Computer, 2017

Verification of Resilience Policies that Assist Attribute Based Access Control.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

2016
Information assurance techniques: Perceived cost effectiveness.
Comput. Secur., 2016

Modelling security risk in critical utilities: The system at risk as a three player game and agent society.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Technology-related disasters: A survey towards disaster-resilient Software Defined Networks.
Proceedings of the 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), 2016

Threat awareness for critical infrastructures resilience.
Proceedings of the 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), 2016

A multi-level approach to resilience of critical infrastructures and services.
Proceedings of the 23rd International Conference on Telecommunications, 2016

A Multi-commodity Network Flow Model for Cloud Service Environments.
Proceedings of the Engineering Applications of Neural Networks, 2016

Anomaly Detection in the Cloud Using Data Density.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Assurance Techniques for Industrial Control Systems (ICS).
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

2014
Security policy verification for multi-domains in cloud systems.
Int. J. Inf. Sec., 2014

2013
Access control requirements engineering, modeling and verification in multi-domain grid and cloud computing systems
PhD thesis, 2013

Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

A Methodology for the Development and Verification of Access Control Systems in Cloud Computing.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

2012
domRBAC: An access control model for modern collaborative systems.
Comput. Secur., 2012

A Use-Based Approach for Enhancing UCON.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

2011
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

2009
A Foundation for Defining Security Requirements in Grid Computing.
Proceedings of the PCI 2009, 2009

On the Definition of Access Control Requirements for Grid and Cloud Computing Systems.
Proceedings of the Networks for Grid Applications, 2009


  Loading...