Publications
Our Publications
- All
- Conference
- Journal
Journal
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing
Silvestri, S., Islam, S., Amelin, D., Weiler, G., Papastergiou, S., & Ciampi, M. (2023). Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. International Journal of Information Security, 1-20. https://doi.org/10.1007/s10207-023-00769-w
Journal
A Swarm-Based Clinical Validation Framework of Artificial Intelligence Solutions for Non-Communicable Diseases
Kitty Kioskli, Spyridon Papastergiou, Theofanis Fotis. (2023, October). A Swarm-Based Clinical Validation Framework of Artificial Intelligence Solutions for Non-Communicable Diseases. 10.55708/js0209001, https://www.jenrs.com/v02/i09/p001/
Conference
Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting
Eva Papadogiannaki, Sotiris Ioannidis. (2023, July). Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting. In Proceedings of the 2023 IEEE Symposium on Computers and Communications (ISCC 2023). http://doi.org/10.1109/ISCC58397.2023.10218210
Conference
Standards and NIS compliance
Chatzopoulou Argyro. (2022, April). Standards and NIS compliance. In Consolidated Proceedings of the Second ECSCI Workshop on Critical Infrastructure Protection and Resilience. ISBN 978-3-95663-285-3. link
Journal
Enhancing practical cybersecurity skills: The ECSF and the CyberSecPro European efforts
Polemi, N., Kioskli, K. (2023). Enhancing practical cybersecurity skills: The ECSF and the CyberSecPro European efforts. In: Abbas Moallem (eds) Human Factors in Cybersecurity. AHFE (2023) International Conference. AHFE Open Access, vol 91. AHFE International, USA, http://doi.org/10.54941/ahfe1003723
Conference
Bringing humans at the core of cybersecurity: challenges and future research directions
Kioskli, K., Mouratidis, H., Polemi, N. (2023). Bringing humans at the core of cybersecurity: Challenges and future research directions. In: Abbas Moallem (eds) Human Factors in Cybersecurity. AHFE (2023) International Conference. AHFE Open Access, vol 91. AHFE International, USA. http://doi.org/10.54941/ahfe1003722
Journal
Russo-Ukrainian War: Prediction and explanation of Twitter suspension
Alexander Shevtsov, Despoina Antonakaki, Ioannis Lamprou, Ioannis Kontogiorgakis, Polyvios Pratikakis, Sotiris Ioannidis. (2023, June). Russo-Ukrainian War: Prediction and explanation of Twitter suspension. https://arxiv.org/abs/2306.03502
Conference
A Swarm Artificial Intelligence Approach for Effective Treatment of Chronic Conditions
K. Kioskli and S. Papastergiou, “A Swarm Artificial Intelligence Approach for Effective Treatment of Chronic Conditions,” 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), Vilanova i la Geltru, Spain, 2023, pp. 1-5, doi: 10.1109/DRCN57075.2023.10108128, https://ieeexplore.ieee.org/document/10108128
Conference
Information Sharing for Creating Awareness for Securing Healthcare Ecosystem
S. Islam, C. Grigoriadis and S. Papastergiou, “Information Sharing for Creating Awareness for Securing Healthcare Ecosystem,” 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), Vilanova i la Geltru, Spain, 2023, pp. 1-5, doi: 10.1109/DRCN57075.2023.10108266 , https://ieeexplore.ieee.org/document/10108266
Journal
The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0
Kioskli, K., Fotis, T., Nifakos, S., & Mouratidis, H. (2023). The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0. Applied Sciences, 13(6), 3410. http://doi.org/10.3390/app13063410
Journal
Co-creation in a digital health living lab: A case study
Fotis, T., Kioskli, K., Sundaralingam, A., Fasihi, A., & Mouratidis, H. (2023). Co-creation in a digital health living lab: A case study. Frontiers in Public Health, 10, 892930. http://doi.org/10.3389/fpubh.2022.892930
Journal
A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem
Silvestri, S., Islam, S., Papastergiou, S., Tzagkarakis, C., & Ciampi, M. (2023). A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Sensors, 23(2), 651. http://doi.org/10.3390/s23020651
Journal
Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT
Karagiannis, S., Ribeiro, L. L., Ntantogian, C., Magkos, E., & Campos, L. M. (2023). Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT. Applied Sciences, 13(5), 3061. http://doi.org/10.3390/app13053061
Journal
Swarm intelligence model for securing healthcare ecosystem
Ribino, P., Ciampi, M., Islam, S., & Papastergiou, S. (2022). Swarm intelligence model for securing healthcare ecosystem. Procedia Computer Science, 210, 149-156.http://doi.org/10.1016/j.procs.2022.10.131
Journal
Process Authentication through Blockchain: Three Case Studies
Ciampi, M., Romano, D., & Schmid, G. (2022). Process Authentication through Blockchain: Three Case Studies. Cryptography, 6(4), 58. http://doi.org/10.3390/cryptography6040058
Conference
Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem
Ribino, P., Islam, S., Ciampi, M., & Papastergiou, S. (2022, November). Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem. In Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022) (pp. 50-61). Cham: Springer International Publishing. http://doi.org/10.1007/978-3-031-21333-5_5
Journal
The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies
Kioskli, K., Dellagiacoma, D., Fotis, T., & Mouratidis, H. (2022). The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 13(2), 147-182. http://doi.org/10.22667/JOWUA.2022.06.30.147
Journal
Vulnerability prediction for secure healthcare supply chain service delivery
Islam, S., Abba, A., Ismail, U., Mouratidis, H., & Papastergiou, S. (2022). Vulnerability prediction for secure healthcare supply chain service delivery. Integrated Computer-Aided Engineering, (Preprint), 1-21. http://doi.org/10.3233/ICA-220689
Conference
A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security
Alwaheidi, M. K., Islam, S., & Papastergiou, S. (2022, August). A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security. In Proceedings of the ICR’22 International Conference on Innovations in Computing Research (pp. 365-374). Cham: Springer International Publishing. http://doi.org/10.1007/978-3-031-14054-9_34
Journal
Iterative Annotation of Biomedical NER Corpora with Deep Neural Networks and Knowledge Bases
Silvestri, S., Gargiulo, F., & Ciampi, M. (2022). Iterative annotation of biomedical ner corpora with deep neural networks and knowledge bases. Applied Sciences, 12(12), 5775. http://doi.org/10.3390/app12125775
Conference
Incident Handling for Healthcare Organizations and Supply-Chains
Lakka, E., Hatzivasilis, G., Karagiannis, S., Alexopoulos, A., Athanatos, M., Ioannidis, S., … & Spanoudakis, G. (2022, June). Incident Handling for Healthcare Organizations and Supply-Chains. In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-7). IEEE. http://doi.org/10.1109/ISCC55528.2022.9912965
Conference
Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System
Islam, S., Papastergiou, S., & Silvestri, S. (2022, June). Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System. In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-7). IEEE. http://doi.org/10.1109/ISCC55528.2022.9912768
Journal
Cyberattack Path Generation and Prioritisation for Securing Healthcare Systems
Islam, S.; Papastergiou, S.; Kalogeraki, E.-M.; Kioskli, K. Cyberattack Path Generation and Prioritisation for Securing Healthcare Systems. Appl. Sci. 2022, 12, 4443. https://doi.org/10.3390/app12094443
Conference
Standards and NIS compliance
Chatzopoulou, A. (2022, April). Standards and NIS compliance. In: Abie, H., Ferrario, D., Troiano, E., Soldatos, J., & Di Peppo, F. (eds.) Consolidated Proceedings of the first ECSCI Workshop on Critical Infrastructure Protection. https://www.steinbeis-edition.de/shop/Tagungsbaende/Tagungen-Symposien/Consolidated-Proceedings-of-theSecond-ECSCI-Workshop-on-Critical-Infrastructure-Protection-and-Resilience.html
Journal
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection
Kure, H.I., Islam, S. & Mouratidis, H. An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing & Application, 34, 15241–15271 (2022). https://doi.org/10.1007/s00521-022-06959-2
Journal
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection
Kure, H. I., Islam, S., & Mouratidis, H. (2022). An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications, 34(18), 15241-15271. http://doi.org/10.1007/s00521-022-06959-2
Journal
Process Authentication through Blockchain: Three Case Studies
Ciampi, M., Romano, D., & Schmid, G. (2022). Process Authentication through Blockchain: Three Case Studies. Cryptography, 6(4), 58. http://doi.org/10.3390/cryptography6040058
Journal
Iterative Annotation of Biomedical NER Corpora with Deep Neural Networks and Knowledge Bases
Silvestri, S., Gargiulo, F., & Ciampi, M. (2022). Iterative annotation of biomedical ner corpora with deep neural networks and knowledge bases. Applied Sciences, 12(12), 5775. http://doi.org/10.3390/app12125775
Journal
The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies
Kioskli, K., Dellagiacoma, D., Fotis, T., & Mouratidis, H. (2022). The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 13(2), 147-182. http://doi.org/10.22667/JOWUA.2022.06.30.147
Journal
Vulnerability prediction for secure healthcare supply chain service delivery
Islam, S., Abba, A., Ismail, U., Mouratidis, H., & Papastergiou, S. (2022). Vulnerability prediction for secure healthcare supply chain service delivery. Integrated Computer-Aided Engineering, (Preprint), 1-21.http://doi.org/10.3233/ICA-220689
Journal
A Privacy-Preserving and Standard-Based Architecture for Secondary Use of Clinical Data
Ciampi, M., Sicuranza, M., & Silvestri, S. (2022). A privacy-preserving and standard-based architecture for secondary use of clinical data. Information, 13(2), 87. http://doi.org/10.3390/info13020087
Conference
Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores
Kioskli, K., Polemi, N. (2022). Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores. In: Tareq Ahram and Waldemar Karwowski (eds) Human Factors in Cybersecurity. AHFE (2022) International Conference. AHFE Open Access, vol 53. AHFE International, USA.http://doi.org/10.54941/ahfe1002211
Journal
Cyberattack path generation and prioritisation for securing healthcare systems
Islam, S., Papastergiou, S., Kalogeraki, E. M., & Kioskli, K. (2022). Cyberattack path generation and prioritisation for securing healthcare systems. Applied Sciences, 12(9), 4443. http://doi.org/10.3390/app12094443
Conference
Swarm intelligence model for securing healthcare ecosystem
Ribino, P., Ciampi, M., Islam, S., & Papastergiou, S. (2022). Swarm intelligence model for securing healthcare ecosystem. Procedia Computer Science, 210, 149-156. http://doi.org/10.1016/j.procs.2022.10.131
Journal
Cyberattack Path Generation and Prioritisation for Securing Healthcare Systems
Islam, S., Papastergiou, S., Kalogeraki, E. M., & Kioskli, K. (2022). Cyberattack path generation and prioritisation for securing healthcare systems. Applied Sciences, 12(9), 4443. http://doi.org/10.3390/app12094443
Conference
A dynamic cyber security situational awareness framework for healthcare ICT infrastructures
Islam, S., Papastergiou, S., & Mouratidis, H. (2021, November). A dynamic cyber security situational awareness framework for healthcare ICT infrastructures. In 25th Pan-Hellenic Conference on Informatics (pp. 334-339). http://doi.org/10.1145/3503823.3503885
Conference
The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations
Kioskli, K., Fotis, T., & Mouratidis, H. (2021, August). The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. In Proceedings of the 16th International Conference on Availability, Reliability and Security (pp. 1-9). http://doi.org/10.1145/3465481.3470033
Background image designed by iconicbestiary / Freepik