Sotirios Katsikeas

ORCID: 0000-0001-8287-3160
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Simulation Techniques and Applications
  • Advanced Software Engineering Methodologies
  • Software Engineering Research
  • Model-Driven Software Engineering Techniques
  • Business Process Modeling and Analysis
  • User Authentication and Security Systems
  • Information Technology Governance and Strategy
  • IoT and Edge/Fog Computing
  • Cybersecurity and Cyber Warfare Studies
  • Digital and Cyber Forensics
  • Vehicular Ad Hoc Networks (VANETs)
  • Software System Performance and Reliability
  • Safety Systems Engineering in Autonomy
  • Service-Oriented Architecture and Web Services
  • Energy Efficient Wireless Sensor Networks

KTH Royal Institute of Technology
2019-2024

Technical University of Crete
2017

Massive advancements in computing and communication technologies have enabled the ubiquitous presence of interconnected devices all aspects modern life, forming what is typically referred to as "Internet Things". These major changes could not leave industrial environment unaffected, with "smart" deployments gradually becoming a reality; trend that often 4th revolution or Industry 4.0. Nevertheless, direct interaction smart physical world their resource constraints, along strict performance,...

10.1109/iscc.2017.8024687 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2017-07-01

Ethical hacking and vulnerability assessments are gaining rapid momentum as academic fields of study. Still, it is sometimes unclear what research areas included in the categories how they fit into traditional framework. Previous studies have reviewed literature field, but attempts use manual analysis thus fail to provide a comprehensive view domain. To better understand area treated within academia, 537,629 related articles from Scopus database were analyzed. A Python script was used for...

10.1016/j.cosrev.2023.100551 article EN cc-by Computer Science Review 2023-03-30

In order to provide a coherent overview of cyber security research, the Scopus academic abstract and citation database was mined create graph 98,373 authors active in field between 1949 early 2020. The Louvain community detection algorithm applied identify existing research communities. analysis discovered twelve top-level communities: access control, authentication, biometrics, cryptography (I & II), cyber-physical systems, information hiding, intrusion detection, malwares, quantum...

10.1016/j.cosrev.2021.100431 article EN cc-by Computer Science Review 2021-09-11

The complexity of ICT infrastructures is continuously increasing, presenting a formidable challenge in safeguarding them against cyber attacks. In light escalating threats and limited availability expert resources, organizations must explore more efficient approaches to assess their resilience undertake proactive measures. Threat modeling an effective approach for assessing the systems. One method utilize Attack Graphs, which visually represent steps taken by adversaries during attack....

10.1016/j.cose.2024.103743 article EN cc-by Computers & Security 2024-02-01

Abstract Cyber-attacks on power-related IT and OT infrastructures can have disastrous consequences for individuals, regions, as well whole nations. In order to respond these threats, the cyber security assessment of foster a higher degree safety resilience against cyber-attacks. Therefore, use attack simulations based system architecture models is proposed. To reduce effort creating new graphs each under assessment, domain-specific languages (DSLs) be employed. DSLs codify common logics...

10.1186/s42162-020-00134-4 article EN cc-by Energy Informatics 2020-11-25

Attack simulations are a feasible means of assessing the cyber security various systems. Simulations can replicate steps taken by an attacker to compromise sensitive system assets, and time required for acquisition assets interests be calculated. One widely accepted approach such is modelling attack their dependencies in formal manner using graphs. To reduce effort creating new graphs each given domain, one employ domain-specific attack-modeling languages codify common logic. The Meta...

10.1016/j.cose.2022.102705 article EN cc-by Computers & Security 2022-03-26

Attack simulations are a feasible means to assess the cyber security of systems. The trace steps taken by an attacker compromise sensitive system assets. Moreover, they allow ...

10.5220/0007247901750182 article EN cc-by-nc-nd 2019-01-01

Cyber-attacks on power assets can have disastrous consequences for individuals, regions, and whole nations. In order to respond these threats, the assessment of grids' plants' cyber security foster a higher degree safety infrastructure dependent power. Hitherto, we propose use attack simulations based system architecture models. To reduce effort creating new graphs each given type, domain-specific languages may be employed. They codify common logics considered domain. Previously, MAL (the...

10.1109/edoc.2019.00020 article EN 2019-10-01

IT has evolved over the decades, where its role and impact have transitioned from being a tactical tool to more strategic one for driving business strategies transform organizations.The right alignment between strategy become compelling factor Chief Information Officers Enterprise Architecture (EA) in practice is of approaches this can be achieved.Enterprise Modeling complements EA with models that are composed enterprise components relationships, stored repository.Over time, repository...

10.5220/0011709000003467 article EN cc-by-nc-nd 2023-01-01

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

10.2139/ssrn.4727006 preprint EN 2024-01-01

The complexity of ICT infrastructures is continuously increasing, presenting a formidable challenge in safeguarding them against cyber attacks. In light escalating threats and limited availability expert resources, organizations must explore more efficient approaches to assess their resilience undertake proactive measures. Threat modeling an effective approach for assessing the systems. One method utilize Attack Graphs, which visually represent steps taken by adversaries during attack....

10.2139/ssrn.4547050 preprint EN 2023-01-01
Coming Soon ...