- Information and Cyber Security
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Simulation Techniques and Applications
- Advanced Software Engineering Methodologies
- Software Engineering Research
- Model-Driven Software Engineering Techniques
- Business Process Modeling and Analysis
- User Authentication and Security Systems
- Information Technology Governance and Strategy
- IoT and Edge/Fog Computing
- Cybersecurity and Cyber Warfare Studies
- Digital and Cyber Forensics
- Vehicular Ad Hoc Networks (VANETs)
- Software System Performance and Reliability
- Safety Systems Engineering in Autonomy
- Service-Oriented Architecture and Web Services
- Energy Efficient Wireless Sensor Networks
KTH Royal Institute of Technology
2019-2024
Technical University of Crete
2017
Massive advancements in computing and communication technologies have enabled the ubiquitous presence of interconnected devices all aspects modern life, forming what is typically referred to as "Internet Things". These major changes could not leave industrial environment unaffected, with "smart" deployments gradually becoming a reality; trend that often 4th revolution or Industry 4.0. Nevertheless, direct interaction smart physical world their resource constraints, along strict performance,...
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic fields of study. Still, it is sometimes unclear what research areas included in the categories how they fit into traditional framework. Previous studies have reviewed literature field, but attempts use manual analysis thus fail to provide a comprehensive view domain. To better understand area treated within academia, 537,629 related articles from Scopus database were analyzed. A Python script was used for...
In order to provide a coherent overview of cyber security research, the Scopus academic abstract and citation database was mined create graph 98,373 authors active in field between 1949 early 2020. The Louvain community detection algorithm applied identify existing research communities. analysis discovered twelve top-level communities: access control, authentication, biometrics, cryptography (I & II), cyber-physical systems, information hiding, intrusion detection, malwares, quantum...
The complexity of ICT infrastructures is continuously increasing, presenting a formidable challenge in safeguarding them against cyber attacks. In light escalating threats and limited availability expert resources, organizations must explore more efficient approaches to assess their resilience undertake proactive measures. Threat modeling an effective approach for assessing the systems. One method utilize Attack Graphs, which visually represent steps taken by adversaries during attack....
Abstract Cyber-attacks on power-related IT and OT infrastructures can have disastrous consequences for individuals, regions, as well whole nations. In order to respond these threats, the cyber security assessment of foster a higher degree safety resilience against cyber-attacks. Therefore, use attack simulations based system architecture models is proposed. To reduce effort creating new graphs each under assessment, domain-specific languages (DSLs) be employed. DSLs codify common logics...
Attack simulations are a feasible means of assessing the cyber security various systems. Simulations can replicate steps taken by an attacker to compromise sensitive system assets, and time required for acquisition assets interests be calculated. One widely accepted approach such is modelling attack their dependencies in formal manner using graphs. To reduce effort creating new graphs each given domain, one employ domain-specific attack-modeling languages codify common logic. The Meta...
Attack simulations are a feasible means to assess the cyber security of systems. The trace steps taken by an attacker compromise sensitive system assets. Moreover, they allow ...
Cyber-attacks on power assets can have disastrous consequences for individuals, regions, and whole nations. In order to respond these threats, the assessment of grids' plants' cyber security foster a higher degree safety infrastructure dependent power. Hitherto, we propose use attack simulations based system architecture models. To reduce effort creating new graphs each given type, domain-specific languages may be employed. They codify common logics considered domain. Previously, MAL (the...
IT has evolved over the decades, where its role and impact have transitioned from being a tactical tool to more strategic one for driving business strategies transform organizations.The right alignment between strategy become compelling factor Chief Information Officers Enterprise Architecture (EA) in practice is of approaches this can be achieved.Enterprise Modeling complements EA with models that are composed enterprise components relationships, stored repository.Over time, repository...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
The complexity of ICT infrastructures is continuously increasing, presenting a formidable challenge in safeguarding them against cyber attacks. In light escalating threats and limited availability expert resources, organizations must explore more efficient approaches to assess their resilience undertake proactive measures. Threat modeling an effective approach for assessing the systems. One method utilize Attack Graphs, which visually represent steps taken by adversaries during attack....