Konstantinos Fysarakis

Orcid: 0000-0002-6871-8102

According to our database1, Konstantinos Fysarakis authored at least 57 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Introduction to the Special Issue on Distributed Intelligence on the Internet.
ACM Trans. Internet Techn., 2024

Towards Incident Response Orchestration and Automation for the Advanced Metering Infrastructure.
Proceedings of the 20th IEEE International Conference on Factory Communication Systems, 2024

Uncovering Hidden Threats: Automated, Machine Learning-based Discovery & Extraction of Cyber Threat Intelligence from Online Sources.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSE.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
CoRR, 2023

Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022

A Blueprint for Collaborative Cybersecurity Operations Centres with Capacity for Shared Situational Awareness, Coordinated Response, and Joint Preparedness.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device.
IEEE Trans. Sustain. Comput., 2021

Defining IoT Orchestrations with Security and Privacy by Design: A Gap Analysis.
IEEE Internet Things Mag., 2021

2020
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets?
IEEE Veh. Technol. Mag., 2020

Networking-Aware IoT Application Development.
Sensors, 2020

Cyber-Ranges as a Mean of Security Culture Establishment.
ERCIM News, 2020

Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI Properties.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

2019
Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS).
ERCIM News, 2019

Secure Semantic Interoperability for IoT Applications with Linked Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

SEMIoTICS Architectural Framework: End-to-end Security, Connectivity and Interoperability for Industrial IoT.
Proceedings of the 2019 Global IoT Summit, 2019

Architectural Patterns for Secure IoT Orchestrations.
Proceedings of the 2019 Global IoT Summit, 2019

The THREAT-ARREST Cyber-Security Training Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

2018
Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources.
IEEE Syst. J., 2018

A review of lightweight block ciphers.
J. Cryptogr. Eng., 2018

XSACd - Cross-domain resource sharing & access control for smart environments.
Future Gener. Comput. Syst., 2018

Reactive security for SDN/NFV-enabled industrial networks leveraging service function chaining.
Trans. Emerg. Telecommun. Technol., 2018

The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park's SDN/NFV-enabled 5G industrial network.
Comput. Commun., 2018

CloudNet Anti-malware Engine: GPU-Accelerated Network Monitoring for Cloud Services.
Proceedings of the Information and Operational Technology Security Systems, 2018

VirtuWind - An SDN- and NFV-Based Architecture for Softwarized Industrial Networks.
Proceedings of the Measurement, Modelling and Evaluation of Computing Systems, 2018

SeMIBIoT: Secure Multi-Protocol Integration Bridge for the IoT.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

2017
Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

SecRoute: End-to-end secure communications for wireless ad-hoc networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

A Reactive Security Framework for operational wind parks using Service Function Chaining.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

2016
Analysis and composition of security primitives towards a framework that safeguards the confidentiality, integrity and availability of embedded systems: uSPBM - a secure policy-based management framework for ubiquitous smart devices
PhD thesis, 2016

Node.DPWS: Efficient Web Services for the Internet of Things.
IEEE Softw., 2016

A survey of lightweight stream ciphers for embedded systems.
Secur. Commun. Networks, 2016

RtVMF: A Secure Real-Time Vehicle Management Framework.
IEEE Pervasive Comput., 2016

Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Embedded Systems Security: A Survey of EU Research Efforts.
Secur. Commun. Networks, 2015

Node.DPWS: High performance and scalable Web Services for the IoT.
CoRR, 2015

Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Proceedings of the Information Security Theory and Practice, 2015

WSACd - A Usable Access Control Framework for Smart Home Devices.
Proceedings of the Information Security Theory and Practice, 2015

RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
The Electronic McPhail Trap.
Sensors, 2014

Policy-Based Access Control for Body Sensor Networks.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Embedded Systems Security Challenges.
Proceedings of the PECCS 2014, 2014

DSAPE - Dynamic Security Awareness Program Evaluation.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Policy-based access control for DPWS-enabled ubiquitous devices.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014

2013
A lightweight anonymity & location privacy service.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Lightweight Cryptography for Embedded Systems - A Comparative Analysis.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
How Effective Is Your Security Awareness Program? An Evaluation Methodology.
Inf. Secur. J. A Glob. Perspect., 2012

Secure policy-based management solutions in heterogeneous embedded systems networks.
Proceedings of the 2012 International Conference on Telecommunications and Multimedia, 2012


  Loading...