Publications

Our Publications

  • All
  • Conference
  • Journal
Journal

Cyber threat assessment and management for securing healthcare ecosystems using natural language processing

Silvestri, S., Islam, S., Amelin, D., Weiler, G., Papastergiou, S., & Ciampi, M. (2023). Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. International Journal of Information Security, 1-20. https://doi.org/10.1007/s10207-023-00769-w 
Journal

A Swarm-Based Clinical Validation Framework of Artificial Intelligence Solutions for Non-Communicable Diseases

Kitty Kioskli, Spyridon Papastergiou, Theofanis Fotis. (2023, October). A Swarm-Based Clinical Validation Framework of Artificial Intelligence Solutions for Non-Communicable Diseases. 10.55708/js0209001, https://www.jenrs.com/v02/i09/p001/
Conference

Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting

Eva Papadogiannaki, Sotiris Ioannidis. (2023, July). Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting. In Proceedings of the 2023 IEEE Symposium on Computers and Communications (ISCC 2023). http://doi.org/10.1109/ISCC58397.2023.10218210
Conference

Standards and NIS compliance

Chatzopoulou Argyro. (2022, April). Standards and NIS compliance. In Consolidated Proceedings of the Second ECSCI Workshop on Critical Infrastructure Protection and Resilience. ISBN 978-3-95663-285-3. link
Journal

Enhancing practical cybersecurity skills: The ECSF and the CyberSecPro European efforts

Polemi, N., Kioskli, K.  (2023). Enhancing practical cybersecurity skills: The ECSF and the CyberSecPro European efforts. In: Abbas Moallem (eds) Human Factors in Cybersecurity. AHFE (2023) International Conference. AHFE Open Access, vol 91. AHFE International, USA, http://doi.org/10.54941/ahfe1003723
Conference

Bringing humans at the core of cybersecurity: challenges and future research directions

Kioskli, K., Mouratidis, H., Polemi, N.  (2023). Bringing humans at the core of cybersecurity: Challenges and future research directions. In: Abbas Moallem (eds) Human Factors in Cybersecurity. AHFE (2023) International Conference. AHFE Open Access, vol 91. AHFE International, USA. http://doi.org/10.54941/ahfe1003722
Journal

Russo-Ukrainian War: Prediction and explanation of Twitter suspension

Alexander Shevtsov, Despoina Antonakaki, Ioannis Lamprou, Ioannis Kontogiorgakis, Polyvios Pratikakis, Sotiris Ioannidis. (2023, June). Russo-Ukrainian War: Prediction and explanation of Twitter suspension. https://arxiv.org/abs/2306.03502
Conference

A Swarm Artificial Intelligence Approach for Effective Treatment of Chronic Conditions

K. Kioskli and S. Papastergiou, “A Swarm Artificial Intelligence Approach for Effective Treatment of Chronic Conditions,” 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), Vilanova i la Geltru, Spain, 2023, pp. 1-5, doi: 10.1109/DRCN57075.2023.10108128, https://ieeexplore.ieee.org/document/10108128
Conference

Information Sharing for Creating Awareness for Securing Healthcare Ecosystem

S. Islam, C. Grigoriadis and S. Papastergiou, “Information Sharing for Creating Awareness for Securing Healthcare Ecosystem,” 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), Vilanova i la Geltru, Spain, 2023, pp. 1-5, doi: 10.1109/DRCN57075.2023.10108266 , https://ieeexplore.ieee.org/document/10108266
Journal

The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0

Kioskli, K., Fotis, T., Nifakos, S., & Mouratidis, H. (2023). The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0. Applied Sciences, 13(6), 3410. http://doi.org/10.3390/app13063410
Journal

Co-creation in a digital health living lab: A case study

Fotis, T., Kioskli, K., Sundaralingam, A., Fasihi, A., & Mouratidis, H. (2023). Co-creation in a digital health living lab: A case study. Frontiers in Public Health, 10, 892930. http://doi.org/10.3389/fpubh.2022.892930
Journal

A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem

Silvestri, S., Islam, S., Papastergiou, S., Tzagkarakis, C., & Ciampi, M. (2023). A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Sensors, 23(2), 651. http://doi.org/10.3390/s23020651
Journal

Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT

Karagiannis, S., Ribeiro, L. L., Ntantogian, C., Magkos, E., & Campos, L. M. (2023). Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT. Applied Sciences, 13(5), 3061. http://doi.org/10.3390/app13053061
Journal

Swarm intelligence model for securing healthcare ecosystem

Ribino, P., Ciampi, M., Islam, S., & Papastergiou, S. (2022). Swarm intelligence model for securing healthcare ecosystem. Procedia Computer Science, 210, 149-156.http://doi.org/10.1016/j.procs.2022.10.131
Journal

Process Authentication through Blockchain: Three Case Studies

Ciampi, M., Romano, D., & Schmid, G. (2022). Process Authentication through Blockchain: Three Case Studies. Cryptography, 6(4), 58. http://doi.org/10.3390/cryptography6040058
Conference

Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem

Ribino, P., Islam, S., Ciampi, M., & Papastergiou, S. (2022, November). Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem. In Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022) (pp. 50-61). Cham: Springer International Publishing. http://doi.org/10.1007/978-3-031-21333-5_5
Journal

The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies

Kioskli, K., Dellagiacoma, D., Fotis, T., & Mouratidis, H. (2022). The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 13(2), 147-182. http://doi.org/10.22667/JOWUA.2022.06.30.147
Journal

Vulnerability prediction for secure healthcare supply chain service delivery

Islam, S., Abba, A., Ismail, U., Mouratidis, H., & Papastergiou, S. (2022). Vulnerability prediction for secure healthcare supply chain service delivery. Integrated Computer-Aided Engineering, (Preprint), 1-21. http://doi.org/10.3233/ICA-220689
Conference

A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security

Alwaheidi, M. K., Islam, S., & Papastergiou, S. (2022, August). A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security. In Proceedings of the ICR’22 International Conference on Innovations in Computing Research (pp. 365-374). Cham: Springer International Publishing. http://doi.org/10.1007/978-3-031-14054-9_34
Journal

Iterative Annotation of Biomedical NER Corpora with Deep Neural Networks and Knowledge Bases

Silvestri, S., Gargiulo, F., & Ciampi, M. (2022). Iterative annotation of biomedical ner corpora with deep neural networks and knowledge bases. Applied Sciences, 12(12), 5775. http://doi.org/10.3390/app12125775
Conference

Incident Handling for Healthcare Organizations and Supply-Chains

Lakka, E., Hatzivasilis, G., Karagiannis, S., Alexopoulos, A., Athanatos, M., Ioannidis, S., … & Spanoudakis, G. (2022, June). Incident Handling for Healthcare Organizations and Supply-Chains. In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-7). IEEE. http://doi.org/10.1109/ISCC55528.2022.9912965
Conference

Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System

Islam, S., Papastergiou, S., & Silvestri, S. (2022, June). Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System. In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-7). IEEE. http://doi.org/10.1109/ISCC55528.2022.9912768
Journal

Cyberattack Path Generation and Prioritisation for Securing Healthcare Systems

Islam, S.; Papastergiou, S.; Kalogeraki, E.-M.; Kioskli, K. Cyberattack Path Generation and Prioritisation for Securing Healthcare Systems. Appl. Sci. 2022, 12, 4443. https://doi.org/10.3390/app12094443
Conference

Standards and NIS compliance

Chatzopoulou, A. (2022, April). Standards and NIS compliance. In: Abie, H., Ferrario, D., Troiano, E., Soldatos, J., & Di Peppo, F. (eds.) Consolidated Proceedings of the first ECSCI Workshop on Critical Infrastructure Protection. https://www.steinbeis-edition.de/shop/Tagungsbaende/Tagungen-Symposien/Consolidated-Proceedings-of-theSecond-ECSCI-Workshop-on-Critical-Infrastructure-Protection-and-Resilience.html
Journal

An integrated cyber security risk management framework and risk predication for the critical infrastructure protection

Kure, H.I., Islam, S. & Mouratidis, H. An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing & Application, 34, 15241–15271 (2022). https://doi.org/10.1007/s00521-022-06959-2
Journal

An integrated cyber security risk management framework and risk predication for the critical infrastructure protection

Kure, H. I., Islam, S., & Mouratidis, H. (2022). An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications, 34(18), 15241-15271. http://doi.org/10.1007/s00521-022-06959-2
Journal

Process Authentication through Blockchain: Three Case Studies

Ciampi, M., Romano, D., & Schmid, G. (2022). Process Authentication through Blockchain: Three Case Studies. Cryptography, 6(4), 58. http://doi.org/10.3390/cryptography6040058
Journal

Iterative Annotation of Biomedical NER Corpora with Deep Neural Networks and Knowledge Bases

Silvestri, S., Gargiulo, F., & Ciampi, M. (2022). Iterative annotation of biomedical ner corpora with deep neural networks and knowledge bases. Applied Sciences, 12(12), 5775. http://doi.org/10.3390/app12125775
Journal

The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies

Kioskli, K., Dellagiacoma, D., Fotis, T., & Mouratidis, H. (2022). The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 13(2), 147-182. http://doi.org/10.22667/JOWUA.2022.06.30.147
Journal

Vulnerability prediction for secure healthcare supply chain service delivery

Islam, S., Abba, A., Ismail, U., Mouratidis, H., & Papastergiou, S. (2022). Vulnerability prediction for secure healthcare supply chain service delivery. Integrated Computer-Aided Engineering, (Preprint), 1-21.http://doi.org/10.3233/ICA-220689
Journal

A Privacy-Preserving and Standard-Based Architecture for Secondary Use of Clinical Data

Ciampi, M., Sicuranza, M., & Silvestri, S. (2022). A privacy-preserving and standard-based architecture for secondary use of clinical data. Information, 13(2), 87. http://doi.org/10.3390/info13020087
Conference

Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores

Kioskli, K., Polemi, N. (2022). Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores. In: Tareq Ahram and Waldemar Karwowski (eds) Human Factors in Cybersecurity. AHFE (2022) International Conference. AHFE Open Access, vol 53. AHFE International, USA.http://doi.org/10.54941/ahfe1002211
Journal

Cyberattack path generation and prioritisation for securing healthcare systems

Islam, S., Papastergiou, S., Kalogeraki, E. M., & Kioskli, K. (2022). Cyberattack path generation and prioritisation for securing healthcare systems. Applied Sciences, 12(9), 4443. http://doi.org/10.3390/app12094443
Conference

Swarm intelligence model for securing healthcare ecosystem

Ribino, P., Ciampi, M., Islam, S., & Papastergiou, S. (2022). Swarm intelligence model for securing healthcare ecosystem. Procedia Computer Science, 210, 149-156. http://doi.org/10.1016/j.procs.2022.10.131
Journal

Cyberattack Path Generation and Prioritisation for Securing Healthcare Systems​

Islam, S., Papastergiou, S., Kalogeraki, E. M., & Kioskli, K. (2022). Cyberattack path generation and prioritisation for securing healthcare systems. Applied Sciences, 12(9), 4443. http://doi.org/10.3390/app12094443
Conference

A dynamic cyber security situational awareness framework for healthcare ICT infrastructures

Islam, S., Papastergiou, S., & Mouratidis, H. (2021, November). A dynamic cyber security situational awareness framework for healthcare ICT infrastructures. In 25th Pan-Hellenic Conference on Informatics (pp. 334-339). http://doi.org/10.1145/3503823.3503885
Conference

The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations

Kioskli, K., Fotis, T., & Mouratidis, H. (2021, August). The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. In Proceedings of the 16th International Conference on Availability, Reliability and Security (pp. 1-9). http://doi.org/10.1145/3465481.3470033
Background image designed by iconicbestiary / Freepik
Scroll to Top