Vasilios Katos

Orcid: 0000-0001-6132-3004

According to our database1, Vasilios Katos authored at least 111 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hybrid deep learning models for traffic prediction in large-scale road networks.
Inf. Fusion, April, 2023

VDGCNeT: A novel network-wide Virtual Dynamic Graph Convolution Neural network and Transformer-based traffic prediction model.
Knowl. Based Syst., 2023

Investigating IPTV Malware in the Wild.
Future Internet, 2023

Citizen participation: crowd-sensed sustainable indoor location services.
CoRR, 2023

Cyber-pi: Intelligent cyberthreat detection and supervised response.
Proceedings of the Workshop on Research Projects Track @ RCIS 2023 co-located with RCIS 2023, 2023

Introducing responsibly self-healing into the incident management lifecycle.
Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, 2023

2022
A dynamic spatial-temporal deep learning framework for traffic speed prediction on large-scale road networks.
Expert Syst. Appl., 2022

Loneliness, life satisfaction, problematic internet use and security behaviours: re-examining the relationships when working from home during COVID-19.
Behav. Inf. Technol., 2022

Web Bot Detection Evasion Using Deep Reinforcement Learning.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device.
IEEE Trans. Sustain. Comput., 2021

A joint temporal-spatial ensemble model for short-term traffic prediction.
Neurocomputing, 2021

Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks.
Future Gener. Comput. Syst., 2021

Unearthing malicious campaigns and actors from the blockchain DNS ecosystem.
Comput. Commun., 2021

The Sequence-to-Sequence Architecture with An Embedded Module for Long-Term Traffic Speed Forecasting with Missing Data.
Proceedings of the 26th International Conference on Automation and Computing, 2021

Education in Cyber Physical Systems Security: The Case of Connected Autonomous Vehicles.
Proceedings of the IEEE Global Engineering Education Conference, 2021

ISUMS: Indoor Space Usage Monitoring System for Sustainable Built Environment Using LoRaWAN.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

Threat Modelling of IoT Systems Using Distributed Ledger Technologies and IOTA.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

Towards a Green Blockchain: A Review of Consensus Mechanisms and their Energy Consumption.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

Web Bot Detection Evasion Using Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets?
IEEE Veh. Technol. Mag., 2020

R<sup>2</sup>BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification.
IEEE Trans. Cybern., 2020

MobileTrust: Secure Knowledge Integration in VANETs.
ACM Trans. Cyber Phys. Syst., 2020

An architecture for resilient intrusion detection in ad-hoc networks.
J. Inf. Secur. Appl., 2020

DHP Framework: Digital Health Passports Using Blockchain - Use case on international tourism during the COVID-19 pandemic.
CoRR, 2020

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem.
Comput., 2020

Encrypted and covert DNS queries for botnets: Challenges and countermeasures.
Comput. Secur., 2020

Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS.
IEEE Access, 2020

On the Assessment of Completeness and Timeliness of Actionable Cyber Threat Intelligence Artefacts.
Proceedings of the Multimedia Communications, Services and Security, 2020

A Machine Learning Approach to Dataset Imputation for Software Vulnerabilities.
Proceedings of the Multimedia Communications, Services and Security, 2020

An Architecture for Resilient Intrusion Detection in IoT Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Automated Mortality Prediction in Critically-ill Patients with Thrombosis using Machine Learning.
Proceedings of the 20th IEEE International Conference on Bioinformatics and Bioengineering, 2020

2019
IEEE 802.11ax Spatial Reuse Improvement: An Interference-Based Channel-Access Algorithm.
IEEE Veh. Technol. Mag., 2019

A framework for designing cloud forensic-enabled services (CFeS).
Requir. Eng., 2019

Actionable threat intelligence for digital forensics readiness.
Inf. Comput. Secur., 2019

Improving Forensic Triage Efficiency through Cyber Threat Intelligence.
Future Internet, 2019

Unravelling Ariadne's Thread: Exploring the Threats of Decentalised DNS.
CoRR, 2019

Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.
Ad Hoc Networks, 2019

A Location-Aware Authentication Model to Handle Uncertainty in IoT.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

An Ensemble Model for Short-Term Traffic Prediction in Smart City Transportation System.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Uncertainty-Aware Authentication Model for Fog Computing in IoT.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

Uncertainty-Aware Authentication Model for IoT.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

An Architecture for Blockchain over Edge-enabled IoT for Smart Circular Cities.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

IDEAL-CITIES - A Trustworthy and Sustainable Framework for Circular Smart Cities.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

Towards a framework for detecting advanced Web bots.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Towards Indeterminacy-Tolerant Access Control in IoT.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods.
IEEE Commun. Surv. Tutorials, 2018

Blockchains as Enablers for Auditing Cooperative Circular Economy Networks.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

2017
Opportunistic key management in delay tolerant networks.
Int. J. Inf. Comput. Secur., 2017

Age Detection Through Keystroke Dynamics from User Authentication Failures.
Int. J. Digit. Crime Forensics, 2017

Cryptographic Key Management in Delay Tolerant Networks: A Survey.
Future Internet, 2017

Exploring the protection of private browsing in desktop browsers.
Comput. Secur., 2017

1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web.
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017

TRAWL: Protection against rogue sites for the masses.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

You can run but you cannot hide from memory: Extracting IM evidence of Android apps.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Using Human Factor Approaches to an Organisation's Bring Your Own Device Scheme.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment.
Inf. Comput. Secur., 2016

Automated key exchange protocol evaluation in delay tolerant networks.
Comput. Secur., 2016

Big data security analysis approach using Computational Intelligence techniques in R for desktop users.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Malevolent app pairs: an Android permission overpassing scheme.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Human-Centered Specification Exemplars for Critical Infrastructure Environments.
Proceedings of the HCI 2016, 2016

2015
A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network.
Secur. Commun. Networks, 2015

Language-independent gender identification through keystroke analysis.
Inf. Comput. Secur., 2015

Reengineering the user: privacy concerns about personal data on smartphones.
Inf. Comput. Secur., 2015

"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar.
Proceedings of the Critical Information Infrastructures Security, 2015

Mitigating Circumstances in Cybercrime: A Position Paper.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol.
Int. J. Electron. Secur. Digit. Forensics, 2014

Reengineering the user: Privacy concerns about personal data on smartphones.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

Developing contextual understanding of information security risks.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
Macroeconomics of Privacy and Security for Identity Management and Surveillance.
Kybernetes, 2013

On-scene triage open source forensic tool chests: Are they effective?
Digit. Investig., 2013

Differential malware forensics.
Digit. Investig., 2013

A critical review of 7 years of Mobile Device Forensics.
Digit. Investig., 2013

The Sphinx enigma in critical VoIP infrastructures: Human or botnet?
Proceedings of the 4th International Conference on Information, 2013

Keystroke forensics: are you typing on a desktop or a laptop?
Proceedings of the Balkan Conference in Informatics, 2013

2012
An integrated model for online transactions: illuminating the black box.
Inf. Manag. Comput. Secur., 2012

A framework for password harvesting from volatile memory.
Int. J. Electron. Secur. Digit. Forensics, 2012

Real time DDoS detection using fuzzy estimators.
Comput. Secur., 2012

A Novel Security Architecture for a Space-Data DTN.
Proceedings of the Wired/Wireless Internet Communication - 10th International Conference, 2012

Assessing forensic readiness.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network.
Proceedings of the Information Security and Privacy Research, 2012

Authenticated Key Exchange (AKE) in Delay Tolerant Networks.
Proceedings of the Information Security and Privacy Research, 2012

On the user acceptance of graphical passwords.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

2011
Requirements for a Forensically Ready Cloud Storage Service.
Int. J. Digit. Crime Forensics, 2011

Towards a forensically ready cloud storage service.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

Practical Password Harvesting from Volatile Memory.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

A Framework for Access Control with Inference Constraints.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
On the detection of pod slurping attacks.
Comput. Secur., 2010

Surveillance, Privacy and the Law of Requisite Variety.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

2009
From Synergy to Symbiosis: New Directions in Security and Privacy?
Int. J. Inf. Technol. Syst. Approach, 2009

Detecting Data Leakage from Pod Slurping Based Attacks on a Windows XP Platform.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

Diversity Networks in Digital Investigations.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

Addressing The Human Factor In Information Systems Security.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

Economics of Personal Data Management: Fair Personal Information Trades.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

Information Assurance and Forensic Readiness.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

2008
A partial equilibrium view on security and privacy.
Inf. Manag. Comput. Secur., 2008

Innovation management through the use of diversity networks.
Int. J. Knowl. Learn., 2008

A cyber-crime investigation framework.
Comput. Stand. Interfaces, 2008

On the Security Controls of Portable Computing Devices in Healthcare Environments.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

2007
Exploring confusion in product ciphers through regression analysis.
Inf. Sci., 2007

Network intrusion detection: Evaluating cluster, discriminant, and logit analysis.
Inf. Sci., 2007

An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education.
Proceedings of the Fifth World Conference on Information Security Education, 2007

Systems Analysis: Exploring the Spectrum of Diversity.
Proceedings of the Fifteenth European Conference on Information Systems, 2007

2005
Modelling corporate wireless security and privacy.
J. Strateg. Inf. Syst., 2005

A randomness test for block ciphers.
Appl. Math. Comput., 2005

Privacy Challenges for Location Aware Technologies.
Proceedings of the Mobile Information Systems II, 2005

2004
Diffusion Behaviour of Cryptographic Primitives in Feistel Networks.
Proceedings of the Security In Information Systems, 2004

1999
Product cipher negotiation with on-line evaluation for private communication over computer networks.
PhD thesis, 1999


  Loading...