Vasilios Katos
Orcid: 0000-0001-6132-3004
According to our database1,
Vasilios Katos
authored at least 116 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle.
Int. J. Inf. Sec., August, 2024
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices.
Int. J. Inf. Sec., June, 2024
Empathy vs Reluctance to Challenge Misinformation: The Mediating Role of Relationship Costs, Perspective Taking, and Need for Cognition.
Proceedings of the Research Challenges in Information Science, 2024
2023
Inf. Fusion, April, 2023
VDGCNeT: A novel network-wide Virtual Dynamic Graph Convolution Neural network and Transformer-based traffic prediction model.
Knowl. Based Syst., 2023
Proceedings of the Workshop on Research Projects Track @ RCIS 2023 co-located with RCIS 2023, 2023
Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, 2023
2022
A dynamic spatial-temporal deep learning framework for traffic speed prediction on large-scale road networks.
Expert Syst. Appl., 2022
Loneliness, life satisfaction, problematic internet use and security behaviours: re-examining the relationships when working from home during COVID-19.
Behav. Inf. Technol., 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
IEEE Trans. Sustain. Comput., 2021
Neurocomputing, 2021
Future Gener. Comput. Syst., 2021
Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics.
DTRAP, 2021
Comput. Commun., 2021
The Sequence-to-Sequence Architecture with An Embedded Module for Long-Term Traffic Speed Forecasting with Missing Data.
Proceedings of the 26th International Conference on Automation and Computing, 2021
Education in Cyber Physical Systems Security: The Case of Connected Autonomous Vehicles.
Proceedings of the IEEE Global Engineering Education Conference, 2021
ISUMS: Indoor Space Usage Monitoring System for Sustainable Built Environment Using LoRaWAN.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021
Towards a Green Blockchain: A Review of Consensus Mechanisms and their Energy Consumption.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets?
IEEE Veh. Technol. Mag., 2020
R<sup>2</sup>BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification.
IEEE Trans. Cybern., 2020
ACM Trans. Cyber Phys. Syst., 2020
J. Inf. Secur. Appl., 2020
DHP Framework: Digital Health Passports Using Blockchain - Use case on international tourism during the COVID-19 pandemic.
CoRR, 2020
Comput., 2020
Comput. Secur., 2020
IEEE Access, 2020
On the Assessment of Completeness and Timeliness of Actionable Cyber Threat Intelligence Artefacts.
Proceedings of the Multimedia Communications, Services and Security, 2020
Proceedings of the Multimedia Communications, Services and Security, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Automated Mortality Prediction in Critically-ill Patients with Thrombosis using Machine Learning.
Proceedings of the 20th IEEE International Conference on Bioinformatics and Bioengineering, 2020
2019
IEEE 802.11ax Spatial Reuse Improvement: An Interference-Based Channel-Access Algorithm.
IEEE Veh. Technol. Mag., 2019
Inf. Comput. Secur., 2019
Future Internet, 2019
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.
Ad Hoc Networks, 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
An Ensemble Model for Short-Term Traffic Prediction in Smart City Transportation System.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
2018
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods.
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018
Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018
2017
Int. J. Inf. Comput. Secur., 2017
Int. J. Digit. Crime Forensics, 2017
Future Internet, 2017
Comput. Secur., 2017
1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web.
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment.
Inf. Comput. Secur., 2016
Comput. Secur., 2016
Big data security analysis approach using Computational Intelligence techniques in R for desktop users.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
Proceedings of the HCI 2016, 2016
2015
A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network.
Secur. Commun. Networks, 2015
Inf. Comput. Secur., 2015
Inf. Comput. Secur., 2015
"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar.
Proceedings of the Critical Information Infrastructures Security, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol.
Int. J. Electron. Secur. Digit. Forensics, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
2013
Kybernetes, 2013
Digit. Investig., 2013
Proceedings of the 4th International Conference on Information, 2013
Proceedings of the Balkan Conference in Informatics, 2013
2012
Inf. Manag. Comput. Secur., 2012
Int. J. Electron. Secur. Digit. Forensics, 2012
Proceedings of the Wired/Wireless Internet Communication - 10th International Conference, 2012
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012
2011
Int. J. Digit. Crime Forensics, 2011
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
2010
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
2009
Int. J. Inf. Technol. Syst. Approach, 2009
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009
2008
Int. J. Knowl. Learn., 2008
Proceedings of the Seventh International Network Conference (INC 2008), 2008
2007
Inf. Sci., 2007
Proceedings of the Fifth World Conference on Information Security Education, 2007
Proceedings of the Fifteenth European Conference on Information Systems, 2007
2005
Proceedings of the Mobile Information Systems II, 2005
2004
Diffusion Behaviour of Cryptographic Primitives in Feistel Networks.
Proceedings of the Security In Information Systems, 2004
1999
Product cipher negotiation with on-line evaluation for private communication over computer networks.
PhD thesis, 1999