Publications
Our Publications
- All
- Conference
- Journal
Conference
Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting
Eva Papadogiannaki, Sotiris Ioannidis. (2023, July). Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting. In Proceedings of the 2023 IEEE Symposium on Computers and Communications (ISCC 2023). http://doi.org/10.1109/ISCC58397.2023.10218210
Conference
Standards and NIS compliance
Chatzopoulou Argyro. (2022, April). Standards and NIS compliance. In Consolidated Proceedings of the Second ECSCI Workshop on Critical Infrastructure Protection and Resilience. ISBN 978-3-95663-285-3. link
Journal
The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0
Kioskli, K., Fotis, T., Nifakos, S., & Mouratidis, H. (2023). The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0. Applied Sciences, 13(6), 3410. http://doi.org/10.3390/app13063410
Journal
Co-creation in a digital health living lab: A case study
Fotis, T., Kioskli, K., Sundaralingam, A., Fasihi, A., & Mouratidis, H. (2023). Co-creation in a digital health living lab: A case study. Frontiers in Public Health, 10, 892930. http://doi.org/10.3389/fpubh.2022.892930
Journal
A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem
Silvestri, S., Islam, S., Papastergiou, S., Tzagkarakis, C., & Ciampi, M. (2023). A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Sensors, 23(2), 651. http://doi.org/10.3390/s23020651
Journal
Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT
Karagiannis, S., Ribeiro, L. L., Ntantogian, C., Magkos, E., & Campos, L. M. (2023). Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT. Applied Sciences, 13(5), 3061. http://doi.org/10.3390/app13053061
Conference
Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem
Ribino, P., Islam, S., Ciampi, M., & Papastergiou, S. (2022, November). Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem. In Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022) (pp. 50-61). Cham: Springer International Publishing. http://doi.org/10.1007/978-3-031-21333-5_5
Conference
A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security
Alwaheidi, M. K., Islam, S., & Papastergiou, S. (2022, August). A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security. In Proceedings of the ICR’22 International Conference on Innovations in Computing Research (pp. 365-374). Cham: Springer International Publishing. http://doi.org/10.1007/978-3-031-14054-9_34
Conference
Incident Handling for Healthcare Organizations and Supply-Chains
Lakka, E., Hatzivasilis, G., Karagiannis, S., Alexopoulos, A., Athanatos, M., Ioannidis, S., … & Spanoudakis, G. (2022, June). Incident Handling for Healthcare Organizations and Supply-Chains. In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-7). IEEE. http://doi.org/10.1109/ISCC55528.2022.9912965
Conference
Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System
Islam, S., Papastergiou, S., & Silvestri, S. (2022, June). Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System. In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-7). IEEE. http://doi.org/10.1109/ISCC55528.2022.9912768
Conference
Standards and NIS compliance
Chatzopoulou, A. (2022, April). Standards and NIS compliance. In: Abie, H., Ferrario, D., Troiano, E., Soldatos, J., & Di Peppo, F. (eds.) Consolidated Proceedings of the first ECSCI Workshop on Critical Infrastructure Protection. https://www.steinbeis-edition.de/shop/Tagungsbaende/Tagungen-Symposien/Consolidated-Proceedings-of-theSecond-ECSCI-Workshop-on-Critical-Infrastructure-Protection-and-Resilience.html
Journal
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection
Kure, H. I., Islam, S., & Mouratidis, H. (2022). An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications, 34(18), 15241-15271. http://doi.org/10.1007/s00521-022-06959-2
Journal
Process Authentication through Blockchain: Three Case Studies
Ciampi, M., Romano, D., & Schmid, G. (2022). Process Authentication through Blockchain: Three Case Studies. Cryptography, 6(4), 58. http://doi.org/10.3390/cryptography6040058
Journal
Iterative Annotation of Biomedical NER Corpora with Deep Neural Networks and Knowledge Bases
Silvestri, S., Gargiulo, F., & Ciampi, M. (2022). Iterative annotation of biomedical ner corpora with deep neural networks and knowledge bases. Applied Sciences, 12(12), 5775. http://doi.org/10.3390/app12125775
Journal
The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies
Kioskli, K., Dellagiacoma, D., Fotis, T., & Mouratidis, H. (2022). The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 13(2), 147-182. http://doi.org/10.22667/JOWUA.2022.06.30.147
Journal
Vulnerability prediction for secure healthcare supply chain service delivery
Islam, S., Abba, A., Ismail, U., Mouratidis, H., & Papastergiou, S. (2022). Vulnerability prediction for secure healthcare supply chain service delivery. Integrated Computer-Aided Engineering, (Preprint), 1-21.http://doi.org/10.3233/ICA-220689
Journal
A Privacy-Preserving and Standard-Based Architecture for Secondary Use of Clinical Data
Ciampi, M., Sicuranza, M., & Silvestri, S. (2022). A privacy-preserving and standard-based architecture for secondary use of clinical data. Information, 13(2), 87. http://doi.org/10.3390/info13020087
Conference
Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores
Kioskli, K., Polemi, N. (2022). Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores. In: Tareq Ahram and Waldemar Karwowski (eds) Human Factors in Cybersecurity. AHFE (2022) International Conference. AHFE Open Access, vol 53. AHFE International, USA.http://doi.org/10.54941/ahfe1002211
Journal
Cyberattack path generation and prioritisation for securing healthcare systems
Islam, S., Papastergiou, S., Kalogeraki, E. M., & Kioskli, K. (2022). Cyberattack path generation and prioritisation for securing healthcare systems. Applied Sciences, 12(9), 4443. http://doi.org/10.3390/app12094443
Conference
Swarm intelligence model for securing healthcare ecosystem
Ribino, P., Ciampi, M., Islam, S., & Papastergiou, S. (2022). Swarm intelligence model for securing healthcare ecosystem. Procedia Computer Science, 210, 149-156. http://doi.org/10.1016/j.procs.2022.10.131
Journal
Cyberattack Path Generation and Prioritisation for Securing Healthcare Systems
Islam, S., Papastergiou, S., Kalogeraki, E. M., & Kioskli, K. (2022). Cyberattack path generation and prioritisation for securing healthcare systems. Applied Sciences, 12(9), 4443. http://doi.org/10.3390/app12094443
Conference
A dynamic cyber security situational awareness framework for healthcare ICT infrastructures
Islam, S., Papastergiou, S., & Mouratidis, H. (2021, November). A dynamic cyber security situational awareness framework for healthcare ICT infrastructures. In 25th Pan-Hellenic Conference on Informatics (pp. 334-339). http://doi.org/10.1145/3503823.3503885
Conference
The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations
Kioskli, K., Fotis, T., & Mouratidis, H. (2021, August). The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. In Proceedings of the 16th International Conference on Availability, Reliability and Security (pp. 1-9). http://doi.org/10.1145/3465481.3470033
Background image designed by iconicbestiary / Freepik