Sokratis K. Katsikas

According to our database1, Sokratis K. Katsikas authored at least 111 papers between 1988 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures.
ICST Trans. Security Safety, 2019

Threat Analysis for Smart Homes.
Future Internet, 2019

A Forensics-by-Design Management Framework for Medical Devices Based on Blockchain.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Detection of abnormal behavior in smart-home environments.
Proceedings of the 4th South-East Europe Design Automation, 2019

Threat Analysis in Dynamic Environments: The Case of the Smart Home.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

Towards a Secure Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Towards improving existing online social networks' privacy policies.
IJIPSI, 2018

Design of a dynamic log management infrastructure using risk and affiliation network analysis.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

A Secured and Trusted Demand Response system based on Blockchain technologies.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018

Towards Reliable Integrity in Blacklisting: Facing Malicious IPs in GHOST Smart Contracts.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018

Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain to promote user trust.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018

Using Blockchains to Strengthen the Security of Internet of Things.
Proceedings of the Security in Computer and Information Sciences, 2018

GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control.
Proceedings of the Security in Computer and Information Sciences, 2018

Cyber-Attacks Against the Autonomous Ship.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

2017
A structured methodology for deploying log management in WANs.
J. Inf. Sec. Appl., 2017

Security Awareness of the Digital Natives.
Information, 2017

User Modelling Validation over the Security Awareness of Digital Natives.
Future Internet, 2017

New Frontiers: Assessing and Managing Security Risks.
IEEE Computer, 2017

A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems.
Computers & Security, 2017

Default OSN Privacy Settings: Privacy Risks.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017

Cyber Security of the Autonomous Ship.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

2016
Design of a Log Management Infrastructure Using Meta-Network Analysis.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

2015
Designing a seamless privacy policy for social networks.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

A simulation platform for evaluating DoS attacks in wireless sensor networks.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

Tagged Data Breaches in Online Social Networks.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

2014
Compliance of the LinkedIn Privacy Policy with the Principles of the ISO 29100: 2011 Standard.
Proceedings of the Web Information Systems Engineering - WISE 2014 Workshops, 2014

Bypassing Antivirus Detection with Encryption.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Designing and developing a free Data Loss Prevention system.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Compliance of the Facebook Data Use Policy with the Principles of ISO 29100: 2011.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

A methodology for building a log management infrastructure.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

National Policy on Technology Supported Education in Greece.
Proceedings of the IEEE 14th International Conference on Advanced Learning Technologies, 2014

2013
Security of the Electronic Medical Record.
Proceedings of the Handbook of Medical and Healthcare Technologies, 2013

Enhancing IDS performance through comprehensive alert post-processing.
Computers & Security, 2013

The Security of Information Systems in Greek Hospitals.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Detecting intrusive activities from insiders in a wireless sensor network using game theory.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Attack detection capabilities of intrusion detection systems for Wireless Sensor Networks.
Proceedings of the 4th International Conference on Information, 2013

A Test-Bed for Intrusion Detection Systems Results Post-processing.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

Uncertainty in Intrusion Detection Signaling Games.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2012
Disaster Recovery Analysis and Management Method (DRAMM): An IT Management Tool.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

2011
Enhancing SSADM with Disaster Recovery Plan activities.
Inf. Manag. Comput. Security, 2011

A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

2010
Reducing false positives in intrusion detection systems.
Computers & Security, 2010

A game-based intrusion detection mechanism to confront internal attackers.
Computers & Security, 2010

2009
Editorial.
Computers & Security, 2009

Integrating Disaster Recovery Plan Activities Into The System Development Life Cycle.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues.
Proceedings of the EMS 2009, 2009

2008
Modeling of the grounding resistance variation using ARMA models.
Simulation Modelling Practice and Theory, 2008

Application of the multi-model partitioning theory for simultaneous order and parameter estimation of multivariate ARMA models.
IJMIC, 2008

Specifying and implementing privacy-preserving cryptographic protocols.
Int. J. Inf. Sec., 2008

A Generic Intrusion Detection Game Model in IT Security.
Proceedings of the Trust, 2008

A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory.
Proceedings of the Panhellenic Conference on Informatics, 2008

Intrusion Detection Using Evolutionary Neural Networks.
Proceedings of the Panhellenic Conference on Informatics, 2008

Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
Proceedings of the Computer Security, 2008

2007
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments.
Int. J. Inf. Sec., 2007

Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation.
Electr. Notes Theor. Comput. Sci., 2007

Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
Proceedings of the Trust, 2007

2006
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices.
I. J. Network Security, 2006

Joint order and parameter estimation of multivariate autoregressive models using multi-model partitioning theory.
Digital Signal Processing, 2006

A Framework for Exploiting Security Expertise in Application Development.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Source Code Author Identification Based on N-gram Author Profiles.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Optimized Multi-Domain Secure Interoperation using Soft Constraints.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Effective identification of source code authors using byte-level information.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

2005
Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng., 2005

Editorial.
Comput. Syst. Sci. Eng., 2005

A formal model for pricing information systems insurance contracts.
Computer Standards & Interfaces, 2005

Specifying Privacy-Preserving Protocols in Typed MSR.
Computer Standards & Interfaces, 2005

Specifying electronic voting protocols in typed MSR.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Multivariate AR Model Order Estimation with Unknown Process Order.
Proceedings of the Advances in Informatics, 2005

Trust, Privacy and Security in E-Business: Requirements and Solutions.
Proceedings of the Advances in Informatics, 2005

Adaptive on-line multiple source detection.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

2004
How Much Should We Pay for Security? (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Doctoral Programme on Information and Communication Systems Security at the University of the Aegean.
Proceedings of the Information Security Management, Education and Privacy, 2004

An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.
Proceedings of the Communications and Multimedia Security, 2004

2003
Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications.
Proceedings of the Secure Electronic Voting, 2003

Special issue: securing computer communications with Public Key Infrastructure.
Computer Communications, 2003

Electronic Voting Systems: Security Implications of the Administrative Workflow.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Quality assured trusted third parties for deploying secure internet-based healthcare applications.
I. J. Medical Informatics, 2002

Revisiting Legal and Regulatory Requirements for Secure E-Voting.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Building a Reliable e-Voting System: Functional Requirements and Legal Constraints.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
Genetically determined variable structure multiple model estimation.
IEEE Trans. Signal Processing, 2001

Towards an ISO-9000 compliant certification service provider.
Proceedings of the 5th Hellenic-European Conference on Computer Mathematics and its Applications (HERCMA-01), 2001

2000
Health care management and information systems security: awareness, training or education?
I. J. Medical Informatics, 2000

Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture.
Computers & Security, 2000

A Postgraduate Programme on Information and Communication Systems Security.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Evaluating certificate status information mechanisms.
Proceedings of the CCS 2000, 2000

1999
Trusted third party services for deploying secure telemedical applications over the WWW.
Computers & Security, 1999

1998
Optimal seismic deconvolution: distributed algorithms.
IEEE Trans. Geoscience and Remote Sensing, 1998

Estimation for Linear Systems with Non-Gaussian Initial State: Centralized and Decentralized Partitioning Algorithms.
Neural Parallel & Scientific Comp., 1998

Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach.
I. J. Medical Informatics, 1998

Enforcing Security Policies in Large Scale Communication Networks.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Methods of Responding to Healthcare Security Incidents.
Proceedings of the MEDINFO '98, 1998

1997
An attack detection system for secure computer systems - outline of the solution.
Proceedings of the Information Security in Research and Business, 1997

1996
High Level Security Policy Guidelines.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996

The SEISMED High Level Security Policy for Health Care.
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996

Model for network behaviour under viral attack.
Computer Communications, 1996

Towards a formal system-to-system authentication protocol.
Computer Communications, 1996

Defending Networks: The Expert System Components of SECURENET.
Proceedings of the Communications and Multimedia Security II, 1996

Attack Modelling in Open Network Environments.
Proceedings of the Communications and Multimedia Security II, 1996

1995
Underwater tracking of a maneuvering target using time delay measurements.
Signal Processing, 1995

Fast and numerically robust recursive algorithms for solving the discrete time Riccati equation: the case of nonsingular plant noise covariance matrix.
Neural Parallel & Scientific Comp., 1995

Design of a neural network for recognition and classification of computer viruses.
Computers & Security, 1995

1994
Passive tracking of a maneuvering target: an adaptive approach.
IEEE Trans. Signal Processing, 1994

Surveillance and Protection in IBC Management: The Applicability of Two RACE Security Projects - SecureNet II and SESAME.
Proceedings of the Towards a Pan-European Telecommunication Service Infrastructure, 1994

1993
Time series prediction based on fractal theory and nonlinear estimation using a network with Gaussian kernel functions.
Neural Parallel & Scientific Comp., 1993

Fast and stable algorithm for computing the principal square root of a complex matrix.
Neural Parallel & Scientific Comp., 1993

1992
Determining access rights for medical information systems.
Computers & Security, 1992

A zero knowledge probabilistic login protocol.
Computers & Security, 1992

1991
On the parallel implementations of the linear Kalman and Lainiotis filters and their efficiency.
Signal Processing, 1991

Data security in medical information systems: The Greek case.
Computers & Security, 1991

1990
AR model identification with unknown process order.
IEEE Trans. Acoustics, Speech, and Signal Processing, 1990

1988
Adaptive deconvolution of seismic signals-performance, computational analysis, parallelism.
IEEE Trans. Acoustics, Speech, and Signal Processing, 1988


  Loading...