George Spanoudakis

Orcid: 0000-0002-0037-2600

Affiliations:
  • City University of London, UK
  • University of Crete, Greece (PhD 1994)


According to our database1, George Spanoudakis authored at least 149 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cybersecurity training and healthcare: the AERAS approach.
Int. J. Inf. Sec., April, 2024

Architectural Design for Enhancing Remote Patient Monitoring in Heart Failure: A Case Study of the RETENTION Project.
Proceedings of the 17th International Joint Conference on Biomedical Engineering Systems and Technologies, 2024

2023
Big Data Assurance: An Approach Based on Service-Level Agreements.
Big Data, June, 2023

PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
CoRR, 2023

Pseudonymisation in the context of GDPR-compliant medical research.
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
A Modelling Framework for Evidence-Based Public Health Policy Making.
IEEE J. Biomed. Health Informatics, 2022

Incident Handling for Healthcare Organizations and Supply-Chains.
Proceedings of the IEEE Symposium on Computers and Communications, 2022


Overview of the SMART-BEAR Technical Infrastructure.
Proceedings of the 8th International Conference on Information and Communication Technologies for Ageing Well and e-Health, 2022


A Blueprint for Collaborative Cybersecurity Operations Centres with Capacity for Shared Situational Awareness, Coordinated Response, and Joint Preparedness.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device.
IEEE Trans. Sustain. Comput., 2021

Defining IoT Orchestrations with Security and Privacy by Design: A Gap Analysis.
IEEE Internet Things Mag., 2021


2020
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets?
IEEE Veh. Technol. Mag., 2020

Pattern-Based Design and Verification of Secure Service Compositions.
IEEE Trans. Serv. Comput., 2020

MobileTrust: Secure Knowledge Integration in VANETs.
ACM Trans. Cyber Phys. Syst., 2020

Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI Properties.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

2019
Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS).
ERCIM News, 2019

Secure Semantic Interoperability for IoT Applications with Linked Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Architectural Patterns for Secure IoT Orchestrations.
Proceedings of the 2019 Global IoT Summit, 2019

The THREAT-ARREST Cyber-Security Training Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Towards the Insurance of Healthcare Systems.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

2018
Reactive security for SDN/NFV-enabled industrial networks leveraging service function chaining.
Trans. Emerg. Telecommun. Technol., 2018

Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

A big data repository and architecture for managing hearing loss related data.
Proceedings of the 2018 IEEE EMBS International Conference on Biomedical & Health Informatics, 2018

Big Data Assurance Evaluation: An SLA-Based Approach.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

Monitoring Data Integrity in Big Data Analytics Services.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Towards Transparent and Trustworthy Cloud.
IEEE Cloud Comput., 2017

Towards a Model-Driven Platform for Evidence based Public Health Policy Making.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

A Reactive Security Framework for operational wind parks using Service Function Chaining.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Cloud Certification Process Validation Using Formal Methods.
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017

Associations Between Hearing Performance and Physiological Measures - An Overview and Outlook.
Proceedings of the Informatics Empowers Healthcare Transformation, 2017

Fault Tolerance Using an SDN Pattern Framework.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Public Health Policy for Management of Hearing Impairments Based on Big Data Analytics: EVOTION at Genesis.
Proceedings of the 17th IEEE International Conference on Bioinformatics and Bioengineering, 2017

Validation of Service Level Agreements Using Probabilistic Model Checking.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

2016
Patterns for the design of secure and dependable software defined networks.
Comput. Networks, 2016

Mining balance disorders' data for the development of diagnostic decision support systems.
Comput. Biol. Medicine, 2016

Multiparametric data analysis for diagnostic decision support in balance disorders.
Proceedings of the 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2016

2015
Coverage-Based Testing for Service Level Agreements.
IEEE Trans. Serv. Comput., 2015

SIREN - A Network Infrastructure for Emergencies.
ERCIM News, 2015

Automatic test case generation for WS-Agreements using combinatorial testing.
Comput. Stand. Interfaces, 2015

Monitoring-Based Certification of Cloud Service Security.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015

A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

MBotCS: A Mobile Botnet Detection System Based on Machine Learning.
Proceedings of the Risks and Security of Internet and Systems, 2015

Diagnosis of balance disorders using decision support systems based on data mining techniques.
Proceedings of the 15th IEEE International Conference on Bioinformatics and Bioengineering, 2015

EMBalance data repository modeling and clinical application.
Proceedings of the 15th IEEE International Conference on Bioinformatics and Bioengineering, 2015

2014
Continuous Certification of Non-repudiation in Cloud Storage Services.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Analysing Security requirements in Cloud-based Service Level Agreements.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Designing Secure Service Workflows in BPEL.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014

A Multi-layer and MultiTenant Cloud Assurance Evaluation Methodology.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Generating Secure Service Compositions.
Proceedings of the Cloud Computing and Services Sciences, 2014

Discovering Secure Service Compositions.
Proceedings of the CLOSER 2014, 2014

A Certification Framework for Cloud Security Properties: The Monitoring Path.
Proceedings of the Accountability and Security in the Cloud, 2014

Towards Hybrid Cloud Service Certification Models.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Proactive and Reactive Runtime Service Discovery: A Framework and Its Evaluation.
IEEE Trans. Software Eng., 2013

A lightweight framework for secure life-logging in smart environments.
Inf. Secur. Tech. Rep., 2013

Assessing the genuineness of events in runtime monitoring of cyber systems.
Comput. Secur., 2013

A Privacy-Level Model of User-Centric Cyber-Physical Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Biologically inspired near extinct system reconstruction.
Proceedings of the 13th IEEE International Conference on BioInformatics and BioEngineering, 2013

2012
Constructing Secure Service Compositions with Patterns.
Proceedings of the Eighth IEEE World Congress on Services, 2012

Finding Secure Compositions of Software Services: Towards a Pattern Based Approach.
Proceedings of the 5th International Conference on New Technologies, 2012

Identifying Test Requirements by Analyzing SLA Guarantee Terms.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Formal Certification and Compliance for Run-Time Service Environments.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

2011
Editorial.
J. Syst. Archit., 2011

A monitoring approach for runtime service discovery.
Autom. Softw. Eng., 2011

Advanced service monitoring configurations with SLA decomposition and selection.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Predicting Software Service Availability: Towards a Runtime Monitoring Approach.
Proceedings of the IEEE International Conference on Web Services, 2011

Taming the Cloud: Safety, Certification and Compliance for Software Services - Keynote at the Workshop on Engineering Service-Oriented Applications (WESOA) 2011.
Proceedings of the Service-Oriented Computing - ICSOC 2011 Workshops, 2011

SMaRT: a workbench for reporting the monitorability of services from SLAs.
Proceedings of the 3rd International Workshop on Principles of Engineering Service-Oriented Systems, 2011

Proactive SLA Negotiation for Service Based Systems: Initial Implementation and Evaluation Experience.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Discovering Services during Service-Based System Design Using UML.
IEEE Trans. Software Eng., 2010

A UML-based static verification framework for security.
Requir. Eng., 2010

Comprehensive Monitoring of BPEL Processes.
IEEE Internet Comput., 2010

Proactive SLA Negotiation for Service Based Systems.
Proceedings of the 6th World Congress on Services, 2010

Dynamic set-up of monitoring infrastructures for service based systems.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

ASSERT4SOA: Toward Security Certification of Service-Oriented Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

EVEREST+: run-time SLA violations prediction.
Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing, 2010

Advanced Security Service cERTificate for SOA: Certified Services go Digital.
Proceedings of the ISSE 2010, 2010

A Framework for Proactive SLA Negotiation.
Proceedings of the ICSOFT 2010, 2010

2009
Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

The SERENITY Runtime Monitoring Framework.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Representation of Security and Dependability Solutions.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Future Directions.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Introduction: The SERENITY vision.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Detection of Security and Dependability Threats: A Belief Based Reasoning Approach.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Establishing and Monitoring SLAs in Complex Service Based Systems.
Proceedings of the IEEE International Conference on Web Services, 2009

A Query Language for Service Discovery.
Proceedings of the ICSOFT 2009, 2009

A Framework for Hierarchical and Recursive Monitoring of Service Based Systems.
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009

Describing and Verifying Monitoring Capabilities for SLA-Driven Service Based Systems.
Proceedings of the Forum at the CAiSE 2009 Conference, 2009

Web Service Trust: Towards a Dynamic Assessment Framework.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Diagnosing Runtime Violations of Security & Dependability Properties.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Estimating Event Lifetimes for Distributed Runtime Verification.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

From Monitoring Templates to Security Monitoring and Threat Detection.
Proceedings of the Second International Conference on Emerging Security Information, 2008

A Framework for Dynamic Service Discovery.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

A Temporal Abductive Diagnostic Process for Runtime Properties Violations.
Proceedings of the Explanation-aware Computing, 2008

Proactive Runtime Service Discovery.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

Property Specification and Static Verification of UML Models.
Proceedings of the The Third International Conference on Availability, 2008

2007
Architecture-Driven Service Discovery for Service Centric Systems.
Int. J. Web Serv. Res., 2007

Guest Editors: Introduction.
Int. J. Softw. Eng. Knowl. Eng., 2007

It-Outsourcing and IT-Offshoring: Trends and Impacts on SE/KE Curricula.
Int. J. Softw. Eng. Knowl. Eng., 2007

A Pattern-Driven Framework for Monitoring Security and Dependability.
Proceedings of the Trust, 2007

Monitoring <i>WS-Agreement</i> s: An Event Calculus-Based Approach.
Proceedings of the Test and Analysis of Web Services, 2007

Dynamic trust assessment of software services.
Proceedings of the 2nd International Workshop on Service Oriented Software Engineering: in conjunction with the 6th ESEC/FSE joint meeting, 2007

Towards security monitoring patterns.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

A Platform for Context Aware Runtime Web Service Discovery.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Towards a Framework for Dynamic Verification of Peer-to-Peer Systems.
Proceedings of the International Conference on Internet and Web Applications and Services (ICIW 2007), 2007

A Service Discovery Framework based on Linear Composition.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
Non-Intrusive Monitoring of Service-Based Systems.
Int. J. Cooperative Inf. Syst., 2006

UML-based Service Discovery Tool.
Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), 2006

UML-Based Service Discovery Framework.
Proceedings of the Service-Oriented Computing, 2006

2005
Guest Editors' Introduction.
Int. J. Softw. Eng. Knowl. Eng., 2005

Run-time Monitoring of Requirements for Systems Composed of Web-Services: Initial Implementation and Evaluation Experience.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

A Service Discovery Framework for Service Centric Systems.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
Supporting the reconciliation of models of object behaviour.
Softw. Syst. Model., 2004

Rule-based generation of requirements traceability relations.
J. Syst. Softw., 2004

Evidential Diagnosis Of Inconsistencies In Object-Oriented Designs.
Int. J. Softw. Eng. Knowl. Eng., 2004

Requirements Monitoring for Service-Based Systems: Towards a framework based on Event Calculus.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

A framework for requirents monitoring of service based systems.
Proceedings of the Service-Oriented Computing, 2004

2003
Tracing Software Requirements Artifacts.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

Revising Rules to Capture Requirements Traceability Relations: A Machine Learning Approach.
Proceedings of the Fifteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2003), 2003

2002
Diagnosis of the significance of inconsistencies in object-oriented designs: a framework and its experimental evaluation.
J. Syst. Softw., 2002

Plausible and adaptive requirement traceability structures.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

2001
Reconciliation of Object Interaction Models.
Proceedings of the 7th International Conference on Object Oriented Information Systems, 2001

UML: An Evaluation of the Visual Syntax of the Language.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

2000
Information Monitors: An Architecture Based on XML.
Proceedings of the 6th International Conference on Object Oriented Information Systems, 2000

1999
Overlaps in Requirements Engineering.
Autom. Softw. Eng., 1999

1997
Viewpoints 96: international workshop on multiple perspectives in software development (SIGSOFT 96) workshop report.
ACM SIGSOFT Softw. Eng. Notes, 1997

Reconciling Requirements: A Method for Managing Interference, Inconsistency and Conflict.
Ann. Softw. Eng., 1997

1996
Multi-perspective Requirements Engineering within NATURE.
Requir. Eng., 1996

Elaborating analogies from conceptual models.
Int. J. Intell. Syst., 1996

Analogical Reuse of Requirements Specifications: A Computational Model.
Appl. Artif. Intell., 1996

Managing interference.
Proceedings of the Joint Proceedings of the Second International Software Architecture Workshop (ISAW-2) and International Workshop on Multiple Perspectives in Software Development (Viewpoints '96) on SIGSOFT '96 workshops, 1996

Software Package Requirements and Procurement.
Proceedings of the 8th International Workshop on Software Specification and Design, 1996

1995
Integrating Specifications: A Similarity Reasoning Approach.
Autom. Softw. Eng., 1995

Computational Mechanisms for Distributed Requirements Engineering.
Proceedings of the SEKE'95, 1995

1994
Measuring similarity between software artifacts.
Proceedings of the SEKE'94, 1994

Similarity for Analogical Software Reuse: A Computational Model.
Proceedings of the Eleventh European Conference on Artificial Intelligence, 1994

On Evidential Feature Salience.
Proceedings of the Database and Expert Systems Applications, 5th International Conference, 1994

1993

Similarity for Analogical Software Reuse: A Conceptual Modelling Approach
Proceedings of the Advanced Information Systems Engineering, 1993


  Loading...