Panagiotis Katsaros

Orcid: 0000-0002-4309-5295

Affiliations:
  • Aristotle University of Thessaloniki, Greece


According to our database1, Panagiotis Katsaros authored at least 102 papers between 2000 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Model-based safety analysis of requirement specifications.
J. Syst. Softw., 2025

2024
Adversarial robustness improvement for deep neural networks.
Mach. Vis. Appl., May, 2024

TP-DejaVu: Combining Operational and Declarative Runtime Verification.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2024

2023

A digital twin prototype for traffic sign recognition of a learning-enabled autonomous vehicle.
Proceedings of the Companion Proceedings of the 16th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling and the 13th Enterprise Design and Engineering Working Conference: BES, DTE, FACETE, Tools & Demos, Forum, EDEN Doctoral Consortium co-located with PoEM 2023, Vienna, Austria, November 28, 2023

2022
Operational State Recognition of a DC Motor Using Edge Artificial Intelligence.
Sensors, 2022

Sboing4Real: A real-time crowdsensing-based traffic management system.
J. Parallel Distributed Comput., 2022

Semantic Modeling and Analysis of Natural Language System Requirements.
IEEE Access, 2022

Runtime Verification for FMI-Based Co-simulation.
Proceedings of the Runtime Verification - 22nd International Conference, 2022

Towards a Digital Twin Architecture with Formal Analysis Capabilities for Learning-Enabled Autonomous Systems.
Proceedings of the Modelling and Simulation for Autonomous Systems, 2022

An IoT Digital Twin for Cyber-Security Defence Based on Runtime Verification.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles, 2022

Resource-Constrained Image Processing for Scientific CubeSats.
Proceedings of the 6th International Conference on Algorithms, Computing and Systems, 2022

On Neural Network Equivalence Checking Using SMT Solvers.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2022

Formal Specification for Learning-Enabled Autonomous Systems.
Proceedings of the Software Verification and Formal Methods for ML-Enabled Autonomous Systems, 2022

2021
Energy characterization of IoT systems through design aspect monitoring.
Int. J. Softw. Tools Technol. Transf., 2021

On methods and tools for rigorous system design.
Int. J. Softw. Tools Technol. Transf., 2021

2020
Correction to: Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems.
Int. J. Softw. Tools Technol. Transf., 2020

Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems.
Int. J. Softw. Tools Technol. Transf., 2020

A survey on the formalisation of system requirements and their validation.
Array, 2020

Runtime Verification of Autonomous Driving Systems in CARLA.
Proceedings of the Runtime Verification - 20th International Conference, 2020

Scalable IoT architecture for balancing performance and security in mobile crowdsensing systems<sup>*</sup>.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

2019
Formal Verification of Network Interlocking Control by Distributed Signal Boxes.
Proceedings of the Model-Based Safety and Assessment - 6th International Symposium, 2019

Model-Based Energy Characterization of IoT System Design Aspects.
Proceedings of the From Reactive Systems to Cyber-Physical Systems, 2019

2018
Model-based design of IoT systems with the BIP component framework.
Softw. Pract. Exp., 2018

Formal analysis of DeGroot Influence Problems using probabilistic model checking.
Simul. Model. Pract. Theory, 2018

Early validation of system requirements and design through correctness-by-construction.
J. Syst. Softw., 2018

Compositional execution semantics for business process verification.
J. Syst. Softw., 2018

Maximal software execution time: a regression-based approach.
Innov. Syst. Softw. Eng., 2018

Ensuring business and service requirements in enterprise mashups.
Inf. Syst. E Bus. Manag., 2018

Abstract model repair for probabilistic systems.
Inf. Comput., 2018

Model-Based Design of Energy-Efficient Applications for IoT Systems.
Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design, 2018

Process Network Models for Embedded System Design Based on the Real-Time BIP Execution Engine.
Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design, 2018

A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism.
Proceedings of the Fundamental Approaches to Software Engineering, 2018

2017
Security-aware elasticity for NoSQL databases in multi-cloud environments.
Int. J. Intell. Inf. Database Syst., 2017

Program analysis with risk-based classification of dynamic invariants for logical error detection.
Comput. Secur., 2017

Cost-aware horizontal scaling of NoSQL databases using probabilistic model checking.
Clust. Comput., 2017

Regression-Based Statistical Bounds on Software Execution Time.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2017

Design of Embedded Systems with Complex Task Dependencies and Shared Resource Interference (Short Paper).
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017

Cache activity profiling tool for the LEON4 processor.
Proceedings of the 6th International Conference on Modern Circuits and Systems Technologies, 2017

2016
Online Analysis of Security Risks in Elastic Cloud Applications.
IEEE Cloud Comput., 2016

Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Solving Influence Problems on the DeGroot Model with a Probabilistic Model Checking Tool.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016

Architecture-Based Design: A Satellite On-Board Software Case Study.
Proceedings of the Formal Aspects of Component Software - 13th International Conference, 2016

OPEN-SME - Component Certification for Open Source Reuse.
Proceedings of the European Project Space on Intelligent Technologies, 2016

2015
Abstract Model Repair.
Log. Methods Comput. Sci., 2015

Using BIP to reinforce correctness of resource-constrained IoT applications.
Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems, 2015

Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position.
Proceedings of the SECRYPT 2015, 2015

Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources.
Proceedings of the Runtime Verification - 6th International Conference, 2015

Security-Aware Elasticity for NoSQL Databases.
Proceedings of the Model and Data Engineering - 5th International Conference, 2015

Execution Path Classification for Vulnerability Analysis and Detection.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Dependable Horizontal Scaling Based on Probabilistic Model Checking.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
Spacecraft early design validation using formal methods.
Reliab. Eng. Syst. Saf., 2014

Cloud elasticity using probabilistic model checking.
CoRR, 2014

TRACER: A Platform for Securing Legacy Code.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Correct-by-Construction Web Service Architecture.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Securing Legacy Code with the TRACER Platform.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities II - (Extended Abstract).
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014

Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model Checking.
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

Automated Detection of Logical Errors in Programs.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
Inlined monitors for security policy enforcement in web applications.
Proceedings of the 17th Panhellenic Conference on Informatics, 2013

The Sphinx enigma in critical VoIP infrastructures: Human or botnet?
Proceedings of the 4th International Conference on Information, 2013

2012
A simulation process for asynchronous event processing systems: Evaluating performance and availability in transaction models.
Simul. Model. Pract. Theory, 2012

Formal analysis for robust anti-SPIT protection using model checking.
Int. J. Inf. Sec., 2012

Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services.
Int. J. Electron. Secur. Digit. Forensics, 2012

Model checking and code generation for transaction processing software.
Concurr. Comput. Pract. Exp., 2012

Rigorous Analysis of Service Composability by Embedding WS-BPEL into the BIP Component Framework.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
Synthesis of attack actions using model checking for the verification of security protocols.
Secur. Commun. Networks, 2011

Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach.
Comput. Secur., 2011

Model Repair for Probabilistic Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2011

Elastic Component Characterization with Respect to Quality Properties: An Intuitionistic Fuzzy-Based Approach.
Proceedings of the 15th Panhellenic Conference on Informatics, 2011

Quantitative model checking of an RSA-based email protocol on mobile devices.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Economic Evaluation of Interactive Audio Media for Securing Internet Services.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

A Framework for Access Control with Inference Constraints.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Quantification of interacting runtime qualities in software architectures: Insights from transaction processing in client-server architectures.
Inf. Softw. Technol., 2010

Component Certification as a Prerequisite forWidespread OSS Reuse.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

An intruder model with message inspection for model checking security protocols.
Comput. Secur., 2010

Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking.
Proceedings of the 12th IEEE High Assurance Systems Engineering Symposium, 2010

Ontology-Based Model Driven Engineering for Safety Verification.
Proceedings of the 36th EUROMICRO Conference on Software Engineering and Advanced Applications, 2010

A Formally Verified Mechanism for Countering SPIT.
Proceedings of the Critical Information Infrastructures Security, 2010

2009
A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach.
Inf. Softw. Technol., 2009

State Space Reduction with Message Inspection in Security Protocol Model Checking
CoRR, 2009

Attacking an OT-Based Blind Signature Scheme
CoRR, 2009

Probabilistic model checking for the quantification of DoS security threats.
Comput. Secur., 2009

The ACID model checker and code generator for transaction processing.
Proceedings of the 2009 International Conference on High Performance Computing & Simulation, 2009

Synthetic Metrics for Evaluating Runtime Quality of Software Architectures with Complex Tradeoffs.
Proceedings of the 35th Euromicro Conference on Software Engineering and Advanced Applications, 2009

2008
Towards Compositional Safety Analysis via Semantic Representation of Component Failure Behaviour.
Proceedings of the Knowledge-Based Software Engineering, 2008

A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Product Line Variability with Elastic Components and Test-Driven Development.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

Static Program Analysis for Java Card Applets.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Performance and effectiveness trade-off for checkpointing in fault-tolerant distributed systems.
Concurr. Comput. Pract. Exp., 2007

Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees.
Proceedings of the Computer Safety, 2007

Elastic Components: Addressing Variance of Quality Properties in Components.
Proceedings of the 33rd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2007), 2007

2006
Evaluation of composite object replication schemes for dependable server applications.
Inf. Softw. Technol., 2006

Interlocking Control by Distributed Signal Boxes: Design and Verification with the SPIN Model Checker.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

2005
On the Design of Access Control to Prevent Sensitive Information Leakage in Distributed Object Systems: A Colored Petri Net Based Model.
Proceedings of the On the Move to Meaningful Internet Systems 2005: CoopIS, 2005

2004
Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed Systems.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2002
Κατανεμημένα υπολογιστικά συστήματα
PhD thesis, 2002

2001
Steady state simulations on queuing processes in parallel time streams: Problems and potentialities.
Proceedings of the 5th Hellenic-European Conference on Computer Mathematics and its Applications (HERCMA-01), 2001

2000
Regenerative queuing network distributed simulation.
Proceedings of the 14<sup>th</sup> European Simulation Multiconference, 2000


  Loading...