George Hatzivasilis

Orcid: 0000-0002-2213-7759

Affiliations:
  • Technical University of Crete, Greece


According to our database1, George Hatzivasilis authored at least 41 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

2022
Incident Handling for Healthcare Organizations and Supply-Chains.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

2021
WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device.
IEEE Trans. Sustain. Comput., 2021


2020
MobileTrust: Secure Knowledge Integration in VANETs.
ACM Trans. Cyber Phys. Syst., 2020

Cyber-Ranges as a Mean of Security Culture Establishment.
ERCIM News, 2020

Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

Chasing Botnets: A Real Security Incident Investigation.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

Password Management: How Secure Is Your Login Process?
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

2019
Secure Semantic Interoperability for IoT Applications with Linked Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Towards the Insurance of Healthcare Systems.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Review of Security and Privacy for the Internet of Medical Things (IoMT).
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

End-to-End Semantic Interoperability Mechanisms for IoT.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

2018
A review of lightweight block ciphers.
J. Cryptogr. Eng., 2018

The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park's SDN/NFV-enabled 5G industrial network.
Comput. Commun., 2018

AmbISPDM - Managing embedded systems in ambient environments and disaster mitigation planning.
Appl. Intell., 2018

CloudNet Anti-malware Engine: GPU-Accelerated Network Monitoring for Cloud Services.
Proceedings of the Information and Operational Technology Security Systems, 2018

The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

Blockchains as Enablers for Auditing Cooperative Circular Economy Networks.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

2017
SCOTRES: Secure Routing for IoT and CPS.
IEEE Internet Things J., 2017

Password-Hashing Status.
Cryptogr., 2017

Real-time management of railway CPS secure administration of IoT and CPS infrastructure.
Proceedings of the 6th Mediterranean Conference on Embedded Computing, 2017

SecRoute: End-to-end secure communications for wireless ad-hoc networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

2016
Software Security, Privacy, and Dependability: Metrics and Measurement.
IEEE Softw., 2016

A survey of lightweight stream ciphers for embedded systems.
Secur. Commun. Networks, 2016

RtVMF: A Secure Real-Time Vehicle Management Framework.
IEEE Pervasive Comput., 2016

Lightweight authenticated encryption for embedded on-chip systems.
Inf. Secur. J. A Glob. Perspect., 2016

2015
Password Hashing Competition - Survey and Benchmark.
IACR Cryptol. ePrint Arch., 2015

Lightweight Password Hashing Scheme for Embedded Systems.
Proceedings of the Information Security Theory and Practice, 2015

RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
ULCL - An Ultra-lightweight Cryptographic Library for Embedded Systems.
Proceedings of the PECCS 2014, 2014

Embedded Systems Security Challenges.
Proceedings of the PECCS 2014, 2014

A Reasoning System for Composition Verification and Security Validation.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

DSAPE - Dynamic Security Awareness Program Evaluation.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
Lightweight Cryptography for Embedded Systems - A Comparative Analysis.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
Building Trust in Ad Hoc Distributed Resource-Sharing Networks Using Reputation-Based Systems.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012


  Loading...