Sokratis K. Katsikas
Orcid: 0000-0003-2966-9683Affiliations:
- Norwegian University of Science and Technology, Gjøvik, Norway
- University of Pireaus, Greece
According to our database1,
Sokratis K. Katsikas
authored at least 168 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure.
Inf. Comput. Secur., 2024
Impact of Recurrent Neural Networks and Deep Learning Frameworks on Real-time Lightweight Time Series Anomaly Detection.
CoRR, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Interplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancements.
Proceedings of the IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems and Second IEEE/ACM International Workshop on Software Vulnerability, 2024
Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space.
Int. J. Crit. Infrastructure Prot., December, 2023
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises.
Comput. Sci. Rev., November, 2023
Comput. Commun., November, 2023
A systematic literature review on wireless security testbeds in the cyber-physical realm.
Comput. Secur., October, 2023
Int. J. Inf. Sec., June, 2023
ACM Trans. Priv. Secur., May, 2023
Comput. Secur., March, 2023
A systematic literature review of how cybersecurity-related behavior has been assessed.
Inf. Comput. Secur., 2023
Int. J. Netw. Manag., 2023
Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
PeerJ Comput. Sci., 2022
J. Cybersecur., 2022
Comput. Secur., 2022
Comput. Secur., 2022
Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Cyber Security When IT Meets OT.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Digit., December, 2021
Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems.
Sensors, 2021
Sensors, 2021
A Systematic Literature Review on RAMS analysis for critical infrastructures protection.
Int. J. Crit. Infrastructure Prot., 2021
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021
Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysical Systems.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
IEEE Trans. Ind. Informatics, 2020
Sensors, 2020
Cybersecurity and Safety Co-Engineering of Cyberphysical Systems - A Comprehensive Survey.
Future Internet, 2020
Comput. Stand. Interfaces, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020
Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Proceedings of the Intelligent Information and Database Systems - 12th Asian Conference, 2020
2019
EAI Endorsed Trans. Security Safety, 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
Proceedings of the 4th South-East Europe Design Automation, 2019
Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019.
Proceedings of the Critical Information Infrastructures Security, 2019
Proceedings of the 5th ACM on Cyber-Physical System Security Workshop, 2019
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
Int. J. Inf. Priv. Secur. Integr., 2018
Design of a dynamic log management infrastructure using risk and affiliation network analysis.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018
Towards Reliable Integrity in Blacklisting: Facing Malicious IPs in GHOST Smart Contracts.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018
Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain to promote user trust.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018
Proceedings of the Security in Computer and Information Sciences, 2018
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control.
Proceedings of the Security in Computer and Information Sciences, 2018
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
2017
J. Inf. Secur. Appl., 2017
Future Internet, 2017
A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems.
Comput. Secur., 2017
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
2016
Proceedings of the Trust, Privacy and Security in Digital Business, 2016
2015
Proceedings of the 19th Panhellenic Conference on Informatics, 2015
Proceedings of the 19th Panhellenic Conference on Informatics, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
2014
Compliance of the LinkedIn Privacy Policy with the Principles of the ISO 29100: 2011 Standard.
Proceedings of the Web Information Systems Engineering - WISE 2014 Workshops, 2014
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014
Proceedings of the IEEE 14th International Conference on Advanced Learning Technologies, 2014
2013
Proceedings of the Handbook of Medical and Healthcare Technologies, 2013
Comput. Secur., 2013
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Detecting intrusive activities from insiders in a wireless sensor network using game theory.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013
Attack detection capabilities of intrusion detection systems for Wireless Sensor Networks.
Proceedings of the 4th International Conference on Information, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
2012
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012
2011
Inf. Manag. Comput. Secur., 2011
A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
2010
Comput. Secur., 2010
2009
Integrating Disaster Recovery Plan Activities Into The System Development Life Cycle.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009
Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues.
Proceedings of the EMS 2009, 2009
2008
Simul. Model. Pract. Theory, 2008
Application of the multi-model partitioning theory for simultaneous order and parameter estimation of multivariate ARMA models.
Int. J. Model. Identif. Control., 2008
Int. J. Inf. Sec., 2008
Proceedings of the Trust, 2008
A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory.
Proceedings of the Panhellenic Conference on Informatics, 2008
Proceedings of the Panhellenic Conference on Informatics, 2008
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
Proceedings of the Computer Security, 2008
2007
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments.
Int. J. Inf. Sec., 2007
Proceedings of the Trust, 2007
2006
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices.
Int. J. Netw. Secur., 2006
Proceedings of the Second International Workshop on Security and Trust Management, 2006
Joint order and parameter estimation of multivariate autoregressive models using multi-model partitioning theory.
Digit. Signal Process., 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Artificial Intelligence Applications and Innovations, 2006
Proceedings of the Artificial Intelligence Applications and Innovations, 2006
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006
2005
Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng., 2005
Editorial.
Comput. Syst. Sci. Eng., 2005
Comput. Stand. Interfaces, 2005
Comput. Stand. Interfaces, 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the Advances in Informatics, 2005
Proceedings of the Advances in Informatics, 2005
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005
2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Doctoral Programme on Information and Communication Systems Security at the University of the Aegean.
Proceedings of the Information Security Management, Education and Privacy, 2004
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.
Proceedings of the Communications and Multimedia Security, 2004
2003
Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications.
Proceedings of the Secure Electronic Voting, 2003
Comput. Commun., 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
Quality assured trusted third parties for deploying secure internet-based healthcare applications.
Int. J. Medical Informatics, 2002
Revisiting Legal and Regulatory Requirements for Secure E-Voting.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
2001
IEEE Trans. Signal Process., 2001
Comput. Stand. Interfaces, 2001
Towards an ISO-9000 compliant certification service provider.
Proceedings of the 5th Hellenic-European Conference on Computer Mathematics and its Applications (HERCMA-01), 2001
2000
Health care management and information systems security: awareness, training or education?
Int. J. Medical Informatics, 2000
Comput. Secur., 2000
A Postgraduate Programme on Information and Communication Systems Security.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the CCS 2000, 2000
1999
Trusted third party services for deploying secure telemedical applications over the WWW.
Comput. Secur., 1999
Proceedings of the 5th European Control Conference, 1999
1998
IEEE Trans. Geosci. Remote. Sens., 1998
Estimation for Linear Systems with Non-Gaussian Initial State: Centralized and Decentralized Partitioning Algorithms.
Neural Parallel Sci. Comput., 1998
Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach.
Int. J. Medical Informatics, 1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the MEDINFO '98, 1998
1997
An attack detection system for secure computer systems - outline of the solution.
Proceedings of the Information Security in Research and Business, 1997
1996
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996
Defending Networks: The Expert System Components of SECURENET.
Proceedings of the Communications and Multimedia Security II, 1996
Attack Modelling in Open Network Environments.
Proceedings of the Communications and Multimedia Security II, 1996
1995
Signal Process., 1995
Fast and numerically robust recursive algorithms for solving the discrete time Riccati equation: the case of nonsingular plant noise covariance matrix.
Neural Parallel Sci. Comput., 1995
Comput. Secur., 1995
1994
IEEE Trans. Signal Process., 1994
Surveillance and Protection in IBC Management: The Applicability of Two RACE Security Projects - SecureNet II and SESAME.
Proceedings of the Towards a Pan-European Telecommunication Service Infrastructure, 1994
1993
Time series prediction based on fractal theory and nonlinear estimation using a network with Gaussian kernel functions.
Neural Parallel Sci. Comput., 1993
Fast and stable algorithm for computing the principal square root of a complex matrix.
Neural Parallel Sci. Comput., 1993
1992
1991
On the parallel implementations of the linear Kalman and Lainiotis filters and their efficiency.
Signal Process., 1991
Optimal state estimation for uncertain, time varying systems with non-Gaussian initial state.
Proceedings of the 1991 International Conference on Acoustics, 1991
1990
IEEE Trans. Acoust. Speech Signal Process., 1990
1988
Adaptive deconvolution of seismic signals-performance, computational analysis, parallelism.
IEEE Trans. Acoust. Speech Signal Process., 1988