Othonas Soultatos

ORCID: 0000-0002-3309-3202
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Context-Aware Activity Recognition Systems
  • Semantic Web and Ontologies
  • Advanced Malware Detection Techniques
  • Access Control and Trust
  • Service-Oriented Architecture and Web Services
  • Network Security and Intrusion Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • IoT Networks and Protocols
  • Cloud Data Security Solutions
  • Information and Cyber Security
  • Internet Traffic Analysis and Secure E-voting
  • Web Application Security Vulnerabilities
  • Wireless Body Area Networks
  • Advanced Software Engineering Methodologies
  • Distributed systems and fault tolerance
  • Modular Robots and Swarm Intelligence
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Robotics and Automated Systems
  • Embedded Systems Design Techniques
  • Business Process Modeling and Analysis
  • Security and Verification in Computing

Foundation for Research and Technology Hellas
2019-2020

City, University of London
2018-2020

FORTH Institute of Computer Science
2018-2019

Technical University of Crete
2016

University of Crete
2015

Day-by-day modern circular economy (CE) models gain ground and penetrate the traditional business sectors. The Internet of Medical Things (IoMT) is main enabler for this interplay CE with healthcare. Novel services, like remote sensing, assisting elder people, e-visit, enhance people's health convenience, while reducing per-patient cost medical institutions. However, rise mobile, wearable, telemedicine solutions means that security can no longer be examined within neat, physical walls as it...

10.1109/dcoss.2019.00091 article EN 2019-05-01

Computing devices already permeate working and living environments, while researchers engineers aim to exploit the potential of pervasive systems in order introduce new types services address inveterate emerging problems. This process will lead us eventually era urban computing Internet Things (IoT). However, long-promised improvements require overcoming some significant obstacles introduced by these technological advancements. One such obstacle is lack interoperable solutions, facilitate...

10.1109/glocom.2016.7842383 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of Internet Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover large operational area. However, these systems fail capture some inherent properties VANETs, as fast ephemeral interaction, making robust evaluation crowdsourcing challenging. this article, we...

10.1145/3364181 article EN ACM Transactions on Cyber-Physical Systems 2020-03-12

The vast amount of connected devices on the Internet Things (IoT) creates an enormous potential for new applications, by leveraging synergies arising through convergence consumer, business and industrial Internet, creating open, global networks connecting people, data, "things". In this context, SEMIoTICS project aims to develop a pattern-driven framework, built upon existing IoT platforms, enable guarantee secure dependable actuation semi-autonomic behaviour in IoT/Industrial applications....

10.1109/giots.2019.8766425 article EN 2019-06-01

Semantic interoperability is the designed property where various systems can interact with each other and exchange data unambiguous, shared meaning. This enables knowledge discovery, machine computable reasoning federation of different information systems. Traditionally, technologies from Web are adapted in order to capture inherited properties Internet Things (IoT) domain. Such provide common description representation services; they characterize things their capabilities, deal semantic...

10.1109/camad.2019.8858501 article EN 2019-09-01

Botnets constitute nowadays one of the most dangerous security threats worldwide. High volumes infected machines are controlled by a malicious entity and perform coordinated cyber-attacks. The problem will become even worse in era Internet Things (IoT) as number insecure devices is going to be exponentially increased. This paper presents WARDOG - an awareness digital forensic system that informs end-user botnet's infection, exposes botnet infrastructure, captures verifiable data can utilized...

10.1109/tsusc.2019.2914917 article EN IEEE Transactions on Sustainable Computing 2019-05-15

Achieving Security, Privacy, Dependability and Interoperability (SPDI) is of paramount importance for the ubiquitous deployment impact maximization Internet Things (IoT) applications. Nevertheless, said requirements are not only difficult to achieve at system initialization, but also hard prove maintain run-time. This paper highlights an approach tackling above challenges, through definition pattern language a framework that can guarantee SPDI in IoT orchestrations. By integrating reasoning...

10.1109/camad.2019.8858429 article EN 2019-09-01

Interoperability stands for the capacity of a system to interact with units another entity. Although it is quite easy accomplish this within products same brand, not facile provide compatibility whole spectrum Internet-of-Things (IoT) and Linked Data (LD) world. Currently, different applications devices operate in their own cloud/platform, without supporting sufficient interaction vendor-products. As concerns meaning data, which main focus paper, semantics can settle commonly agreed...

10.1109/globecom38437.2019.9013147 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2019-12-01

A popular application of ambient intelligence systems constitutes assisting living services on smart buildings. As is imported in embedded equipment, the system becomes able to provide (e.g. control lights, airconditioning, energy management etc.). IoT main enabler such environments. However, interconnection these cyber-physical and processing personal data raise serious security privacy issues. In this paper we present a framework that can guarantee Security, Privacy, Dependability...

10.1109/camad.2018.8514937 article EN 2018-09-01
Coming Soon ...