George Stergiopoulos
Orcid: 0000-0002-5336-6765
According to our database1,
George Stergiopoulos
authored at least 52 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Enhancing attack resilience of cyber-physical systems through state dependency graph models.
Int. J. Inf. Sec., February, 2024
Scaling private proximity testing protocols for geofenced information exchange: A metropolitan-wide case study.
Comput. Networks, 2024
Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical Infrastructures.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control Systems.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Modeling Networks of Interdependent Infrastructure in Complex Urban Environments Using Open-Data.
Proceedings of the 9th International Conference on Complexity, 2024
2023
Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps.
IEEE Syst. J., June, 2023
Int. J. Inf. Sec., 2023
Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering.
IEEE Access, 2023
2022
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0.
Int. J. Inf. Sec., 2022
Int. J. Inf. Sec., 2022
Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
2021
Misinformation vs. Situational Awareness: The Art of Deception and the Need for Cross-Domain Detection.
Sensors, 2021
Dropping malware through sound injection: A comparative analysis on Android operating systems.
Comput. Secur., 2021
Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal.
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
2020
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis.
Secur. Priv., 2020
Automatic network restructuring and risk mitigation through business process asset dependency analysis.
Comput. Secur., 2020
Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns.
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems.
Proceedings of the E-Business and Telecommunications, 2020
On a Security-oriented Design Framework for Medical IoT Devices: The Hardware Security Perspective.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
2019
J. Comput. Secur., 2019
2018
Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment.
Comput. Networks, 2018
Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure.
IEEE Access, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets.
Proceedings of the Computer Security, 2018
Cybersecurity Self-assessment Tools: Evaluating the Importance for Securing Industrial Control Systems in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2018
2017
Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures.
SIGMETRICS Perform. Evaluation Rev., 2017
Int. J. Crit. Infrastructures, 2017
Program analysis with risk-based classification of dynamic invariants for logical error detection.
Comput. Secur., 2017
Proceedings of the Critical Infrastructure Protection XI, 2017
2016
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures.
Int. J. Crit. Infrastructure Prot., 2016
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Critical Infrastructure Protection X, 2016
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
2015
Risk mitigation strategies for critical infrastructures based on graph centrality analysis.
Int. J. Crit. Infrastructure Prot., 2015
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position.
Proceedings of the SECRYPT 2015, 2015
Proceedings of the Critical Infrastructure Protection IX, 2015
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar.
Proceedings of the Critical Information Infrastructures Security, 2015
2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
2012
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012