Panagiotis Katsaros
Orcid: 0000-0002-4309-5295Affiliations:
- Aristotle University of Thessaloniki, Greece
According to our database1,
Panagiotis Katsaros
authored at least 102 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
2024
Mach. Vis. Appl., May, 2024
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2024
2023
Proceedings of the Bridging the Gap Between AI and Reality, 2023
A digital twin prototype for traffic sign recognition of a learning-enabled autonomous vehicle.
Proceedings of the Companion Proceedings of the 16th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling and the 13th Enterprise Design and Engineering Working Conference: BES, DTE, FACETE, Tools & Demos, Forum, EDEN Doctoral Consortium co-located with PoEM 2023, Vienna, Austria, November 28, 2023
2022
Sensors, 2022
J. Parallel Distributed Comput., 2022
IEEE Access, 2022
Proceedings of the Runtime Verification - 22nd International Conference, 2022
Towards a Digital Twin Architecture with Formal Analysis Capabilities for Learning-Enabled Autonomous Systems.
Proceedings of the Modelling and Simulation for Autonomous Systems, 2022
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles, 2022
Proceedings of the 6th International Conference on Algorithms, Computing and Systems, 2022
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2022
Proceedings of the Software Verification and Formal Methods for ML-Enabled Autonomous Systems, 2022
2021
Int. J. Softw. Tools Technol. Transf., 2021
Int. J. Softw. Tools Technol. Transf., 2021
2020
Correction to: Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems.
Int. J. Softw. Tools Technol. Transf., 2020
Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems.
Int. J. Softw. Tools Technol. Transf., 2020
Array, 2020
Proceedings of the Runtime Verification - 20th International Conference, 2020
Scalable IoT architecture for balancing performance and security in mobile crowdsensing systems<sup>*</sup>.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020
2019
Proceedings of the Model-Based Safety and Assessment - 6th International Symposium, 2019
Proceedings of the From Reactive Systems to Cyber-Physical Systems, 2019
2018
Softw. Pract. Exp., 2018
Simul. Model. Pract. Theory, 2018
Early validation of system requirements and design through correctness-by-construction.
J. Syst. Softw., 2018
J. Syst. Softw., 2018
Innov. Syst. Softw. Eng., 2018
Inf. Syst. E Bus. Manag., 2018
Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design, 2018
Process Network Models for Embedded System Design Based on the Real-Time BIP Execution Engine.
Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design, 2018
A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism.
Proceedings of the Fundamental Approaches to Software Engineering, 2018
2017
Int. J. Intell. Inf. Database Syst., 2017
Program analysis with risk-based classification of dynamic invariants for logical error detection.
Comput. Secur., 2017
Clust. Comput., 2017
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2017
Design of Embedded Systems with Complex Task Dependencies and Shared Resource Interference (Short Paper).
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017
Proceedings of the 6th International Conference on Modern Circuits and Systems Technologies, 2017
2016
IEEE Cloud Comput., 2016
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Solving Influence Problems on the DeGroot Model with a Probabilistic Model Checking Tool.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016
Proceedings of the Formal Aspects of Component Software - 13th International Conference, 2016
Proceedings of the European Project Space on Intelligent Technologies, 2016
2015
Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems, 2015
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position.
Proceedings of the SECRYPT 2015, 2015
Proceedings of the Runtime Verification - 6th International Conference, 2015
Proceedings of the Model and Data Engineering - 5th International Conference, 2015
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015
2014
Reliab. Eng. Syst. Saf., 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities II - (Extended Abstract).
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014
Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model Checking.
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
2013
Proceedings of the 17th Panhellenic Conference on Informatics, 2013
Proceedings of the 4th International Conference on Information, 2013
2012
A simulation process for asynchronous event processing systems: Evaluating performance and availability in transaction models.
Simul. Model. Pract. Theory, 2012
Int. J. Inf. Sec., 2012
Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services.
Int. J. Electron. Secur. Digit. Forensics, 2012
Concurr. Comput. Pract. Exp., 2012
Rigorous Analysis of Service Composability by Embedding WS-BPEL into the BIP Component Framework.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012
Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection.
Proceedings of the Critical Information Infrastructures Security, 2012
2011
Synthesis of attack actions using model checking for the verification of security protocols.
Secur. Commun. Networks, 2011
Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach.
Comput. Secur., 2011
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2011
Elastic Component Characterization with Respect to Quality Properties: An Intuitionistic Fuzzy-Based Approach.
Proceedings of the 15th Panhellenic Conference on Informatics, 2011
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
2010
Quantification of interacting runtime qualities in software architectures: Insights from transaction processing in client-server architectures.
Inf. Softw. Technol., 2010
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010
Comput. Secur., 2010
Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking.
Proceedings of the 12th IEEE High Assurance Systems Engineering Symposium, 2010
Proceedings of the 36th EUROMICRO Conference on Software Engineering and Advanced Applications, 2010
Proceedings of the Critical Information Infrastructures Security, 2010
2009
A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach.
Inf. Softw. Technol., 2009
CoRR, 2009
Comput. Secur., 2009
Proceedings of the 2009 International Conference on High Performance Computing & Simulation, 2009
Synthetic Metrics for Evaluating Runtime Quality of Software Architectures with Complex Tradeoffs.
Proceedings of the 35th Euromicro Conference on Software Engineering and Advanced Applications, 2009
2008
Towards Compositional Safety Analysis via Semantic Representation of Component Failure Behaviour.
Proceedings of the Knowledge-Based Software Engineering, 2008
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008
Proceedings of the Smart Card Research and Advanced Applications, 2008
2007
Performance and effectiveness trade-off for checkpointing in fault-tolerant distributed systems.
Concurr. Comput. Pract. Exp., 2007
Proceedings of the Computer Safety, 2007
Proceedings of the 33rd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2007), 2007
2006
Evaluation of composite object replication schemes for dependable server applications.
Inf. Softw. Technol., 2006
Interlocking Control by Distributed Signal Boxes: Design and Verification with the SPIN Model Checker.
Proceedings of the Parallel and Distributed Processing and Applications, 2006
2005
On the Design of Access Control to Prevent Sensitive Information Leakage in Distributed Object Systems: A Colored Petri Net Based Model.
Proceedings of the On the Move to Meaningful Internet Systems 2005: CoopIS, 2005
2004
Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed Systems.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
2002
2001
Steady state simulations on queuing processes in parallel time streams: Problems and potentialities.
Proceedings of the 5th Hellenic-European Conference on Computer Mathematics and its Applications (HERCMA-01), 2001
2000
Regenerative queuing network distributed simulation.
Proceedings of the 14<sup>th</sup> European Simulation Multiconference, 2000