George Stergiopoulos

Orcid: 0000-0002-5336-6765

According to our database1, George Stergiopoulos authored at least 48 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing attack resilience of cyber-physical systems through state dependency graph models.
Int. J. Inf. Sec., February, 2024

2023
Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps.
IEEE Syst. J., June, 2023

Correction to: A decentralized honeypot for IoT Protocols based on Android devices.
Int. J. Inf. Sec., 2023

Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering.
IEEE Access, 2023

2022
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0.
Int. J. Inf. Sec., 2022

A decentralized honeypot for IoT Protocols based on Android devices.
Int. J. Inf. Sec., 2022

Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
Misinformation vs. Situational Awareness: The Art of Deception and the Need for Cross-Domain Detection.
Sensors, 2021

Chaos Engineering for Enhanced Resilience of Cyber-Physical Systems.
CoRR, 2021

Dropping malware through sound injection: A comparative analysis on Android operating systems.
Comput. Secur., 2021

Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal.
IEEE Access, 2021

A Security-Aware Framework for Designing Industrial Engineering Processes.
IEEE Access, 2021

Towards Integrating Security in Industrial Engineering Design Practices.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
Security in IoMT Communications: A Survey.
Sensors, 2020

Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis.
Secur. Priv., 2020

Automatic network restructuring and risk mitigation through business process asset dependency analysis.
Comput. Secur., 2020

Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns.
IEEE Access, 2020

Assessing Interdependencies and Congestion Delays in the Aviation Network.
IEEE Access, 2020

Avoiding Network and Host Detection using Packet Bit-masking.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems.
Proceedings of the E-Business and Telecommunications, 2020

On a Security-oriented Design Framework for Medical IoT Devices: The Hardware Security Perspective.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

2019
Using side channel TCP features for real-time detection of malware connections.
J. Comput. Secur., 2019

2018
Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment.
Comput. Networks, 2018

Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure.
IEEE Access, 2018

Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets.
Proceedings of the Computer Security, 2018

Cybersecurity Self-assessment Tools: Evaluating the Importance for Securing Industrial Control Systems in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures.
SIGMETRICS Perform. Evaluation Rev., 2017

A process-based dependency risk analysis methodology for critical infrastructures.
Int. J. Crit. Infrastructures, 2017

Program analysis with risk-based classification of dynamic invariants for logical error detection.
Comput. Secur., 2017

Protecting the Transportation Sector from the Negative Impacts of Climate Change.
Proceedings of the Critical Infrastructure Protection XI, 2017

2016
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures.
Int. J. Crit. Infrastructure Prot., 2016

Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Classification and Comparison of Critical Infrastructure Protection Tools.
Proceedings of the Critical Infrastructure Protection X, 2016

Critical Infrastructure Protection: A Holistic Methodology for Greece.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

2015
Risk mitigation strategies for critical infrastructures based on graph centrality analysis.
Int. J. Crit. Infrastructure Prot., 2015

Hacking and Penetration Testing with Low Power Devices.
Comput. Secur., 2015

Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position.
Proceedings of the SECRYPT 2015, 2015

Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation.
Proceedings of the Critical Infrastructure Protection IX, 2015

Execution Path Classification for Vulnerability Analysis and Detection.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar.
Proceedings of the Critical Information Infrastructures Security, 2015

2014
A Bug Hunter's Diary.
Comput. Secur., 2014

Insider Threat: Enhancing BPM through Social Media.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Automated Detection of Logical Errors in Programs.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
Approaching Encryption through Complex Number Logarithms.
Proceedings of the SECRYPT 2013, 2013

On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
Hunting Application-Level Logical Errors.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012


  Loading...