- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Information and Cyber Security
- Context-Aware Activity Recognition Systems
- Advanced Malware Detection Techniques
- Access Control and Trust
- Vehicular Ad Hoc Networks (VANETs)
- Service-Oriented Architecture and Web Services
- Smart Grid Security and Resilience
- Security and Verification in Computing
- Software-Defined Networks and 5G
- Cryptographic Implementations and Security
- Software System Performance and Reliability
- Digital and Cyber Forensics
- Cloud Data Security Solutions
- Chaos-based Image/Signal Encryption
- Modular Robots and Swarm Intelligence
- Advanced Software Engineering Methodologies
- Blockchain Technology Applications and Security
- Energy Efficient Wireless Sensor Networks
- Distributed systems and fault tolerance
- Green IT and Sustainability
- Security in Wireless Sensor Networks
- Sustainable Supply Chain Management
- Insect Pheromone Research and Control
Cyprus Research and Innovation Center (Cyprus)
2023
Foundation for Research and Technology Hellas
2016-2020
FORTH Institute of Computer Science
2018
Technical University of Crete
2014-2017
Technological Educational Institute of Eastern Macedonia and Thrace
2014
University of Crete
2013
Hellenic Mediterranean University
2012
Pervasive computing constitutes a growing trend, aiming to embed smart devices into everyday objects. The limited resources of these and the ever-present need for lower production costs, lead research development lightweight cryptographic mechanisms. Block ciphers, main symmetric key cryptosystems, perform well in this field. Nevertheless, stream ciphers are also relevant ubiquitous applications, as they can be used secure communication applications where plaintext length is either unknown...
Massive advancements in computing and communication technologies have enabled the ubiquitous presence of interconnected devices all aspects modern life, forming what is typically referred to as "Internet Things". These major changes could not leave industrial environment unaffected, with "smart" deployments gradually becoming a reality; trend that often 4th revolution or Industry 4.0. Nevertheless, direct interaction smart physical world their resource constraints, along strict performance,...
Computing devices already permeate working and living environments, while researchers engineers aim to exploit the potential of pervasive systems in order introduce new types services address inveterate emerging problems. This process will lead us eventually era urban computing Internet Things (IoT). However, long-promised improvements require overcoming some significant obstacles introduced by these technological advancements. One such obstacle is lack interoperable solutions, facilitate...
Monitoring traps are important components of integrated pest management applied against fruit fly pests, including Bactrocera oleae (Gmelin) and Ceratitis capitata (Widemann), Diptera the Tephritidae family, which effect a crop-loss/per year calculated in billions euros worldwide. Pests can be controlled with ground pesticide sprays, efficiency depends on knowing time, location extent infestations as early possible. Trap inspection is currently carried out manually, using McPhail trap, mass...
Eco-friendly systems are necessitated nowadays, as the global consumption is increasing. A data-driven aspect prominent, involving Internet of Things (IoT) main enabler a Circular Economy (CE). Henceforth, IoT equipment records system’s functionality, with machine learning (ML) optimizing green computing operations. Entities exchange and reuse CE assets. Transparency vital beneficiaries must track assets’ history. This article proposes framework where blockchaining administrates cooperative...
ABSTRACT Security awareness is an important element of every security infrastructure, especially since the human factor often proves to be weakest link. Companies and organizations have developed programs that seek promote enhance users' perception importance exercising security. As raising awareness, however, on-going effort, campaign has regularly evaluated so corrective actions can taken in order achieve best results. This paper addresses evaluating organization's program provides...
Certain insects affect cultivations in a detrimental way. A notable case is the olive fruit fly (Bactrocera oleae (Rossi)), that Europe alone causes billions of euros crop-loss/per year. Pests can be controlled with aerial and ground bait pesticide sprays, efficiency which depends on knowing time location insect infestations as early possible. The inspection traps currently carried out manually. Automatic monitoring enhance efficient flying pests by identifying counting targeted they enter...
This paper presents an overview of the interoperability concepts along with challenges for IoT domain and upcoming Web 3.0. We identify four levels relevant solutions accomplishing vertical horizontal compatibility between various layers a modern ecosystem, referred to as: technological, syntactic, semantic, organizational interoperability. The goal is achieve cross-domain interaction facilitate proper usage management provided services applications. An framework also proposed where involved...
As digital technologies become more pervasive in society and the economy, cyber-security incidents frequent, but also impactful. Based on NIS & NIS2 Directives, EU Member States their Operators of Essential Services (OES) must establish a minimum baseline set capabil- ities while providing cross-border coordination cooperation. But this is only small step towards European cyber resilience. In landscape, preparedness, shared situational awareness, coordinated incident response are essential...
The threat landscape of industrial infrastructures has expanded exponentially over the last few years. Such include services such as smart meter data exchange that should have real-time availability. Smart meters constitute main component Advanced Metering Infrastructure, and their measurements are also used historical for forecasting energy demand to avoid load peaks could lead blackouts within specific areas. Hence, a comprehensive Incident Response plan must be in place ensure high...
The intelligence being built into various vehicle types will not only improve their safety and comfort, but also enable new modes of transportation services create markets accordingly. In all cases, it be important to able monitor, preferably in real-time, parameters the smart vehicles' condition. This work introduces Real-Time Vehicle Management Framework (RtVMF), a holistic framework that enables secure management modern vehicles. By monitoring operational parameters-which are assessed...
The increase in the world's population has led to a massive rise human consumption of planet's natural resources, well beyond their replacement rate. Traditional recycling concepts and methods are not enough counter such effects. In this context, circular economy (CE), that is, restorative regenerative by-design economy, can reform today's "take-make-dispose" economic model. On other hand, Internet Things (IoT) continues gradually transform our everyday lives, allowing for introduction novel...
Next generation networks, as the Internet of Things (IoT), aim to create open and global networks for connecting smart objects, network elements, applications, web services end-users. Research industry attempt integrate this evolving technology exponential growth IoT by overcoming significant hurdles such dynamicity, scalability, heterogeneity end-to-end security privacy. Motivated above, SEMIoTICS proposes development a pattern-driven framework, built upon existing platforms, enable...
Abstract The innovative application of fifth‐generation core technologies, ie, software‐defined networking (SDN) and network function virtualization, can help reduce capital operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface communication infrastructure, thus necessitating introduction additional security mechanisms. These major changes could not leave environment unaffected, with smart deployments gradually becoming a reality, trend that is often...
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet Things (IoT)/Industrial IoT (IIoT) devices associated novel applications services. In this context, patterns, which are constructs encoding re-usable solutions common problems building blocks architectures, can be an asset in alleviating said barrier. More specifically, patterns used encode dependencies between SP properties individual smart objects corresponding orchestrations...
The vast amount of connected devices on the Internet Things (IoT) creates an enormous potential for new applications, by leveraging synergies arising through convergence consumer, business and industrial Internet, creating open, global networks connecting people, data, "things". In this context, SEMIoTICS project aims to develop a pattern-driven framework, built upon existing IoT platforms, enable guarantee secure dependable actuation semi-autonomic behaviour in IoT/Industrial applications....
Interconnected computing systems, in various forms, are expected to permeate our lives, realizing the vision of Internet Things (IoT) and allowing us enjoy novel, enhanced services that promise improve everyday lives. Nevertheless, this new reality also introduces significant challenges terms performance, scaling, usability interoperability. Leveraging benefits Service Oriented Architectures (SOAs) can help alleviate many issues developers, implementers end-users have face context IoT. This...
The railway transport system is critical infrastructure that exposed to numerous man-made and natural threats, thus protecting this physical asset imperative. Cyber security, privacy, dependability (SPD) are also important, as the operation relies on cyber-physical systems (CPS) systems. This work presents SPD-Safe—an administration framework for CPS, leveraging artificial intelligence monitoring managing in real-time. network layer protections integrated provide core security properties of...