Publications

Our Publications

  • All
  • Conference
  • Journal
Conference

Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting

Eva Papadogiannaki, Sotiris Ioannidis. (2023, July). Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting. In Proceedings of the 2023 IEEE Symposium on Computers and Communications (ISCC 2023). http://doi.org/10.1109/ISCC58397.2023.10218210
Conference

Standards and NIS compliance

Chatzopoulou Argyro. (2022, April). Standards and NIS compliance. In Consolidated Proceedings of the Second ECSCI Workshop on Critical Infrastructure Protection and Resilience. ISBN 978-3-95663-285-3. link
Journal

The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0

Kioskli, K., Fotis, T., Nifakos, S., & Mouratidis, H. (2023). The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0. Applied Sciences, 13(6), 3410. http://doi.org/10.3390/app13063410
Journal

Co-creation in a digital health living lab: A case study

Fotis, T., Kioskli, K., Sundaralingam, A., Fasihi, A., & Mouratidis, H. (2023). Co-creation in a digital health living lab: A case study. Frontiers in Public Health, 10, 892930. http://doi.org/10.3389/fpubh.2022.892930
Journal

A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem

Silvestri, S., Islam, S., Papastergiou, S., Tzagkarakis, C., & Ciampi, M. (2023). A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Sensors, 23(2), 651. http://doi.org/10.3390/s23020651
Journal

Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT

Karagiannis, S., Ribeiro, L. L., Ntantogian, C., Magkos, E., & Campos, L. M. (2023). Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT. Applied Sciences, 13(5), 3061. http://doi.org/10.3390/app13053061
Conference

Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem

Ribino, P., Islam, S., Ciampi, M., & Papastergiou, S. (2022, November). Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem. In Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022) (pp. 50-61). Cham: Springer International Publishing. http://doi.org/10.1007/978-3-031-21333-5_5
Conference

A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security

Alwaheidi, M. K., Islam, S., & Papastergiou, S. (2022, August). A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security. In Proceedings of the ICR’22 International Conference on Innovations in Computing Research (pp. 365-374). Cham: Springer International Publishing. http://doi.org/10.1007/978-3-031-14054-9_34
Conference

Incident Handling for Healthcare Organizations and Supply-Chains

Lakka, E., Hatzivasilis, G., Karagiannis, S., Alexopoulos, A., Athanatos, M., Ioannidis, S., … & Spanoudakis, G. (2022, June). Incident Handling for Healthcare Organizations and Supply-Chains. In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-7). IEEE. http://doi.org/10.1109/ISCC55528.2022.9912965
Conference

Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System

Islam, S., Papastergiou, S., & Silvestri, S. (2022, June). Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System. In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-7). IEEE. http://doi.org/10.1109/ISCC55528.2022.9912768
Conference

Standards and NIS compliance

Chatzopoulou, A. (2022, April). Standards and NIS compliance. In: Abie, H., Ferrario, D., Troiano, E., Soldatos, J., & Di Peppo, F. (eds.) Consolidated Proceedings of the first ECSCI Workshop on Critical Infrastructure Protection. https://www.steinbeis-edition.de/shop/Tagungsbaende/Tagungen-Symposien/Consolidated-Proceedings-of-theSecond-ECSCI-Workshop-on-Critical-Infrastructure-Protection-and-Resilience.html
Journal

An integrated cyber security risk management framework and risk predication for the critical infrastructure protection

Kure, H. I., Islam, S., & Mouratidis, H. (2022). An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications, 34(18), 15241-15271. http://doi.org/10.1007/s00521-022-06959-2
Journal

Process Authentication through Blockchain: Three Case Studies

Ciampi, M., Romano, D., & Schmid, G. (2022). Process Authentication through Blockchain: Three Case Studies. Cryptography, 6(4), 58. http://doi.org/10.3390/cryptography6040058
Journal

Iterative Annotation of Biomedical NER Corpora with Deep Neural Networks and Knowledge Bases

Silvestri, S., Gargiulo, F., & Ciampi, M. (2022). Iterative annotation of biomedical ner corpora with deep neural networks and knowledge bases. Applied Sciences, 12(12), 5775. http://doi.org/10.3390/app12125775
Journal

The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies

Kioskli, K., Dellagiacoma, D., Fotis, T., & Mouratidis, H. (2022). The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 13(2), 147-182. http://doi.org/10.22667/JOWUA.2022.06.30.147
Journal

Vulnerability prediction for secure healthcare supply chain service delivery

Islam, S., Abba, A., Ismail, U., Mouratidis, H., & Papastergiou, S. (2022). Vulnerability prediction for secure healthcare supply chain service delivery. Integrated Computer-Aided Engineering, (Preprint), 1-21.http://doi.org/10.3233/ICA-220689
Journal

A Privacy-Preserving and Standard-Based Architecture for Secondary Use of Clinical Data

Ciampi, M., Sicuranza, M., & Silvestri, S. (2022). A privacy-preserving and standard-based architecture for secondary use of clinical data. Information, 13(2), 87. http://doi.org/10.3390/info13020087
Conference

Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores

Kioskli, K., Polemi, N. (2022). Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores. In: Tareq Ahram and Waldemar Karwowski (eds) Human Factors in Cybersecurity. AHFE (2022) International Conference. AHFE Open Access, vol 53. AHFE International, USA.http://doi.org/10.54941/ahfe1002211
Journal

Cyberattack path generation and prioritisation for securing healthcare systems

Islam, S., Papastergiou, S., Kalogeraki, E. M., & Kioskli, K. (2022). Cyberattack path generation and prioritisation for securing healthcare systems. Applied Sciences, 12(9), 4443. http://doi.org/10.3390/app12094443
Conference

Swarm intelligence model for securing healthcare ecosystem

Ribino, P., Ciampi, M., Islam, S., & Papastergiou, S. (2022). Swarm intelligence model for securing healthcare ecosystem. Procedia Computer Science, 210, 149-156. http://doi.org/10.1016/j.procs.2022.10.131
Journal

Cyberattack Path Generation and Prioritisation for Securing Healthcare Systems​

Islam, S., Papastergiou, S., Kalogeraki, E. M., & Kioskli, K. (2022). Cyberattack path generation and prioritisation for securing healthcare systems. Applied Sciences, 12(9), 4443. http://doi.org/10.3390/app12094443
Conference

A dynamic cyber security situational awareness framework for healthcare ICT infrastructures

Islam, S., Papastergiou, S., & Mouratidis, H. (2021, November). A dynamic cyber security situational awareness framework for healthcare ICT infrastructures. In 25th Pan-Hellenic Conference on Informatics (pp. 334-339). http://doi.org/10.1145/3503823.3503885
Conference

The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations

Kioskli, K., Fotis, T., & Mouratidis, H. (2021, August). The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. In Proceedings of the 16th International Conference on Availability, Reliability and Security (pp. 1-9). http://doi.org/10.1145/3465481.3470033
Background image designed by iconicbestiary / Freepik
Scroll to Top