Sokratis K. Katsikas

Orcid: 0000-0003-2966-9683

Affiliations:
  • Norwegian University of Science and Technology, Gjøvik, Norway
  • University of Pireaus, Greece


According to our database1, Sokratis K. Katsikas authored at least 163 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure.
Inf. Comput. Secur., 2024

GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning.
CoRR, 2024

Authentication of underwater assets.
Comput. Networks, 2024

Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Paralyzed or Compromised: A Case Study of Decisions in Cyber-Physical Systems.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024

2023
An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space.
Int. J. Crit. Infrastructure Prot., December, 2023

A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises.
Comput. Sci. Rev., November, 2023

Honey-list based authentication protocol for industrial IoT swarms.
Comput. Commun., November, 2023

A systematic literature review on wireless security testbeds in the cyber-physical realm.
Comput. Secur., October, 2023

Dependency-based security risk assessment for cyber-physical systems.
Int. J. Inf. Sec., June, 2023

Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework.
ACM Trans. Priv. Secur., May, 2023

Understanding situation awareness in SOCs, a systematic literature review.
Comput. Secur., March, 2023

A systematic literature review of how cybersecurity-related behavior has been assessed.
Inf. Comput. Secur., 2023

Editorial for special issue on security and trust on networked systems.
Int. J. Netw. Manag., 2023

A Blockchain-based two Factor Honeytoken Authentication System.
CoRR, 2023

Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Cybersecurity-Related Behavior of Personnel in the Norwegian Industry.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Threat Analysis in Dairy Farming 4.0.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
A multiplayer game model to detect insiders in wireless sensor networks.
PeerJ Comput. Sci., 2022

Navigation Data Anomaly Analysis and Detection.
Inf., 2022

Developing metrics to assess the effectiveness of cybersecurity awareness program.
J. Cybersecur., 2022

A Location-Based Global Authorization Method for Underwater Security.
CoRR, 2022

Investigating machine learning attacks on financial time series models.
Comput. Secur., 2022

Modeling effective cybersecurity training frameworks: A delphi method-based study.
Comput. Secur., 2022

Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Cyber Security When IT Meets OT.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Standardized cyber security risk assessment for unmanned offshore facilities.
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022

Towards Comprehensive Modeling of CPSs to Discover and Study Interdependencies.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

SoK: Combating threats in the digital supply chain.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture.
Digit., December, 2021

Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems.
Sensors, 2021

Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems.
Sensors, 2021

A Systematic Literature Review on RAMS analysis for critical infrastructures protection.
Int. J. Crit. Infrastructure Prot., 2021

ARIBC: Online Reporting Based on Identity-Based Cryptography.
Future Internet, 2021

WYK: Mobile Device Authentication Using the User's Address Book.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysical Systems.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Shipping 4.0: Security Requirements for the Cyber-Enabled Ship.
IEEE Trans. Ind. Informatics, 2020

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.
Sensors, 2020

Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things.
Sensors, 2020

Cybersecurity and Safety Co-Engineering of Cyberphysical Systems - A Comprehensive Survey.
Future Internet, 2020

SafeSec Tropos: Joint security and safety requirements elicitation.
Comput. Stand. Interfaces, 2020

Privacy-Preserving Passive DNS.
Comput., 2020

Identifying Critical Components in Large Scale Cyber Physical Systems.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Attack Path Analysis for Cyber Physical Systems.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Modelling Shipping 4.0: A Reference Architecture for the Cyber-Enabled Ship.
Proceedings of the Intelligent Information and Database Systems - 12th Asian Conference, 2020

2019
A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures.
EAI Endorsed Trans. Security Safety, 2019

Threat Analysis for Smart Homes.
Future Internet, 2019

A Forensics-by-Design Management Framework for Medical Devices Based on Blockchain.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Detection of abnormal behavior in smart-home environments.
Proceedings of the 4th South-East Europe Design Automation, 2019

Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Threat Analysis in Dynamic Environments: The Case of the Smart Home.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019.
Proceedings of the Critical Information Infrastructures Security, 2019

Towards a Cyber-Physical Range.
Proceedings of the 5th ACM on Cyber-Physical System Security Workshop, 2019

Towards a Secure Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Towards improving existing online social networks' privacy policies.
Int. J. Inf. Priv. Secur. Integr., 2018

Design of a dynamic log management infrastructure using risk and affiliation network analysis.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

A Secured and Trusted Demand Response system based on Blockchain technologies.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018

Towards Reliable Integrity in Blacklisting: Facing Malicious IPs in GHOST Smart Contracts.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018

Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain to promote user trust.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018

Using Blockchains to Strengthen the Security of Internet of Things.
Proceedings of the Security in Computer and Information Sciences, 2018

GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control.
Proceedings of the Security in Computer and Information Sciences, 2018

Cyber-Attacks Against the Autonomous Ship.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

2017
A structured methodology for deploying log management in WANs.
J. Inf. Secur. Appl., 2017

Security Awareness of the Digital Natives.
Inf., 2017

User Modelling Validation over the Security Awareness of Digital Natives.
Future Internet, 2017

New Frontiers: Assessing and Managing Security Risks.
Computer, 2017

A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems.
Comput. Secur., 2017

Default OSN Privacy Settings: Privacy Risks.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017

Cyber Security of the Autonomous Ship.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

2016
Design of a Log Management Infrastructure Using Meta-Network Analysis.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

2015
Designing a seamless privacy policy for social networks.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

A simulation platform for evaluating DoS attacks in wireless sensor networks.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

Tagged Data Breaches in Online Social Networks.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

2014
Compliance of the LinkedIn Privacy Policy with the Principles of the ISO 29100: 2011 Standard.
Proceedings of the Web Information Systems Engineering - WISE 2014 Workshops, 2014

Bypassing Antivirus Detection with Encryption.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Designing and developing a free Data Loss Prevention system.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Compliance of the Facebook Data Use Policy with the Principles of ISO 29100: 2011.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

A methodology for building a log management infrastructure.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

National Policy on Technology Supported Education in Greece.
Proceedings of the IEEE 14th International Conference on Advanced Learning Technologies, 2014

2013
Security of the Electronic Medical Record.
Proceedings of the Handbook of Medical and Healthcare Technologies, 2013

Enhancing IDS performance through comprehensive alert post-processing.
Comput. Secur., 2013

The Security of Information Systems in Greek Hospitals.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Detecting intrusive activities from insiders in a wireless sensor network using game theory.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Attack detection capabilities of intrusion detection systems for Wireless Sensor Networks.
Proceedings of the 4th International Conference on Information, 2013

A Test-Bed for Intrusion Detection Systems Results Post-processing.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

Uncertainty in Intrusion Detection Signaling Games.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2012
Disaster Recovery Analysis and Management Method (DRAMM): An IT Management Tool.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

2011
Enhancing SSADM with Disaster Recovery Plan activities.
Inf. Manag. Comput. Secur., 2011

A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

2010
Reducing false positives in intrusion detection systems.
Comput. Secur., 2010

A game-based intrusion detection mechanism to confront internal attackers.
Comput. Secur., 2010

2009
Editorial.
Comput. Secur., 2009

Integrating Disaster Recovery Plan Activities Into The System Development Life Cycle.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues.
Proceedings of the EMS 2009, 2009

2008
Modeling of the grounding resistance variation using ARMA models.
Simul. Model. Pract. Theory, 2008

Application of the multi-model partitioning theory for simultaneous order and parameter estimation of multivariate ARMA models.
Int. J. Model. Identif. Control., 2008

Specifying and implementing privacy-preserving cryptographic protocols.
Int. J. Inf. Sec., 2008

A Generic Intrusion Detection Game Model in IT Security.
Proceedings of the Trust, 2008

A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory.
Proceedings of the Panhellenic Conference on Informatics, 2008

Intrusion Detection Using Evolutionary Neural Networks.
Proceedings of the Panhellenic Conference on Informatics, 2008

Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
Proceedings of the Computer Security, 2008

2007
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments.
Int. J. Inf. Sec., 2007

Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
Proceedings of the Trust, 2007

2006
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices.
Int. J. Netw. Secur., 2006

Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

Joint order and parameter estimation of multivariate autoregressive models using multi-model partitioning theory.
Digit. Signal Process., 2006

A Framework for Exploiting Security Expertise in Application Development.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Source Code Author Identification Based on N-gram Author Profiles.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Optimized Multi-Domain Secure Interoperation using Soft Constraints.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Effective identification of source code authors using byte-level information.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

2005
Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng., 2005

Editorial.
Comput. Syst. Sci. Eng., 2005

A formal model for pricing information systems insurance contracts.
Comput. Stand. Interfaces, 2005

Specifying Privacy-Preserving Protocols in Typed MSR.
Comput. Stand. Interfaces, 2005

Specifying electronic voting protocols in typed MSR.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Multivariate AR Model Order Estimation with Unknown Process Order.
Proceedings of the Advances in Informatics, 2005

Trust, Privacy and Security in E-Business: Requirements and Solutions.
Proceedings of the Advances in Informatics, 2005

Adaptive on-line multiple source detection.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

2004
How Much Should We Pay for Security? (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Doctoral Programme on Information and Communication Systems Security at the University of the Aegean.
Proceedings of the Information Security Management, Education and Privacy, 2004

An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.
Proceedings of the Communications and Multimedia Security, 2004

2003
Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications.
Proceedings of the Secure Electronic Voting, 2003

Special issue: securing computer communications with Public Key Infrastructure.
Comput. Commun., 2003

Electronic Voting Systems: Security Implications of the Administrative Workflow.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Quality assured trusted third parties for deploying secure internet-based healthcare applications.
Int. J. Medical Informatics, 2002

Revisiting Legal and Regulatory Requirements for Secure E-Voting.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Building a Reliable e-Voting System: Functional Requirements and Legal Constraints.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
Genetically determined variable structure multiple model estimation.
IEEE Trans. Signal Process., 2001

Multi-technology distributed objects and their integration.
Comput. Stand. Interfaces, 2001

Towards an ISO-9000 compliant certification service provider.
Proceedings of the 5th Hellenic-European Conference on Computer Mathematics and its Applications (HERCMA-01), 2001

2000
Health care management and information systems security: awareness, training or education?
Int. J. Medical Informatics, 2000

Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture.
Comput. Secur., 2000

A Postgraduate Programme on Information and Communication Systems Security.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Evaluating certificate status information mechanisms.
Proceedings of the CCS 2000, 2000

1999
Trusted third party services for deploying secure telemedical applications over the WWW.
Comput. Secur., 1999

Passive target tracking with non Gaussian initial conditions.
Proceedings of the 5th European Control Conference, 1999

1998
Optimal seismic deconvolution: distributed algorithms.
IEEE Trans. Geosci. Remote. Sens., 1998

Estimation for Linear Systems with Non-Gaussian Initial State: Centralized and Decentralized Partitioning Algorithms.
Neural Parallel Sci. Comput., 1998

Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach.
Int. J. Medical Informatics, 1998

Enforcing Security Policies in Large Scale Communication Networks.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Methods of Responding to Healthcare Security Incidents.
Proceedings of the MEDINFO '98, 1998

1997
An attack detection system for secure computer systems - outline of the solution.
Proceedings of the Information Security in Research and Business, 1997

1996
High Level Security Policy Guidelines.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996

The SEISMED High Level Security Policy for Health Care.
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996

Model for network behaviour under viral attack.
Comput. Commun., 1996

Towards a formal system-to-system authentication protocol.
Comput. Commun., 1996

Defending Networks: The Expert System Components of SECURENET.
Proceedings of the Communications and Multimedia Security II, 1996

Attack Modelling in Open Network Environments.
Proceedings of the Communications and Multimedia Security II, 1996

1995
Underwater tracking of a maneuvering target using time delay measurements.
Signal Process., 1995

Fast and numerically robust recursive algorithms for solving the discrete time Riccati equation: the case of nonsingular plant noise covariance matrix.
Neural Parallel Sci. Comput., 1995

Design of a neural network for recognition and classification of computer viruses.
Comput. Secur., 1995

1994
Passive tracking of a maneuvering target: an adaptive approach.
IEEE Trans. Signal Process., 1994

Surveillance and Protection in IBC Management: The Applicability of Two RACE Security Projects - SecureNet II and SESAME.
Proceedings of the Towards a Pan-European Telecommunication Service Infrastructure, 1994

1993
Time series prediction based on fractal theory and nonlinear estimation using a network with Gaussian kernel functions.
Neural Parallel Sci. Comput., 1993

Fast and stable algorithm for computing the principal square root of a complex matrix.
Neural Parallel Sci. Comput., 1993

1992
Determining access rights for medical information systems.
Comput. Secur., 1992

A zero knowledge probabilistic login protocol.
Comput. Secur., 1992

1991
On the parallel implementations of the linear Kalman and Lainiotis filters and their efficiency.
Signal Process., 1991

Data security in medical information systems: The Greek case.
Comput. Secur., 1991

Optimal state estimation for uncertain, time varying systems with non-Gaussian initial state.
Proceedings of the 1991 International Conference on Acoustics, 1991

1990
AR model identification with unknown process order.
IEEE Trans. Acoust. Speech Signal Process., 1990

1988
Adaptive deconvolution of seismic signals-performance, computational analysis, parallelism.
IEEE Trans. Acoust. Speech Signal Process., 1988


  Loading...