Alexios Lekidis

ORCID: 0000-0002-8243-7075
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • IoT and Edge/Fog Computing
  • Smart Grid Security and Resilience
  • Vehicular Ad Hoc Networks (VANETs)
  • Real-Time Systems Scheduling
  • Context-Aware Activity Recognition Systems
  • Smart Grid Energy Management
  • Electric Vehicles and Infrastructure
  • Software System Performance and Reliability
  • Autonomous Vehicle Technology and Safety
  • Network Security and Intrusion Detection
  • Green IT and Sustainability
  • Information and Cyber Security
  • Advanced Data and IoT Technologies
  • Real-time simulation and control systems
  • Privacy-Preserving Technologies in Data
  • Embedded Systems Design Techniques
  • Blockchain Technology Applications and Security
  • Advanced Battery Technologies Research
  • Advanced Neural Network Applications
  • Energy Load and Power Forecasting
  • Advanced Malware Detection Techniques
  • Model-Driven Software Engineering Techniques
  • Machine Fault Diagnosis Techniques
  • Anomaly Detection Techniques and Applications

University of Thessaly
2023-2024

Public Power Corporation (Greece)
2022-2024

National Technical University of Athens
2024

University of Piraeus
2023

Intracom Telecom (Greece)
2021

Aristotle University of Thessaloniki
2018-2021

Polish Academy of Sciences
2021

Tecnológico de Monterrey
2021

National Institute of Technology Kurukshetra
2021

Warsaw University of Technology
2021

10.1016/j.jnca.2019.06.017 article EN Journal of Network and Computer Applications 2019-07-03

The scheduled maintenance of industrial equipment is usually performed with a low frequency, as it leads to unpredicted downtime in business operations. Nevertheless, this confers risk failure individual modules the equipment, which may diminish its performance or even lead breakdown, rendering non-operational. Lately, predictive methods have been considered for systems, such power generation stations, proactive measure preventing failures. Such use data gathered from and Machine Learning...

10.3390/forecast6020014 article EN cc-by Forecasting 2024-03-25

Traditional electricity infrastructure inspections usually have high costs, risks and it takes a long time for specialized personnel to carry them out. Additionally, they also involve scaffolding risks, that lead accident rate in most companies. The recent emergence of Unmanned Aerial Vehicles (UAVs) is gradually leveraged avoid such risks. However, UAVs face Global Positioning System instability issues especially the distant or harsh areas. This requires frequent manual UAV control...

10.1016/j.egyr.2022.07.115 article EN cc-by-nc-nd Energy Reports 2022-08-23

Abstract With the expansion of 5G networks, new business models are arising where multi-tenancy and active infrastructure sharing will be key enablers for them. these opportunities, security risks appearing in form a complex evolving threat landscape being one main challenges mass rollout. In 5G-enabled scenarios, adversaries can exploit vulnerabilities associated with resource to perform lateral movements targeting other tenant resources, as well disturb services offered or even resources....

10.1007/s10922-021-09623-7 article EN cc-by Journal of Network and Systems Management 2021-10-08

The electric vehicle (EV) industry has made significant progress but, in many markets, there are still barriers holding back its advancement. A key issue is the anxiety caused to drivers by limited range of current EV models and inadequate access charging stations long-distance trips, as case on highways. We propose an intuitive multi-criteria approach that optimally places highways (partially) lack such points. approach, which applied iterative fashion dynamically evaluate alternatives,...

10.3390/en15249445 article EN cc-by Energies 2022-12-13

As digital technologies become more pervasive in society and the economy, cyber-security incidents frequent, but also impactful. Based on NIS & NIS2 Directives, EU Member States their Operators of Essential Services (OES) must establish a minimum baseline set capabil- ities while providing cross-border coordination cooperation. But this is only small step towards European cyber resilience. In landscape, preparedness, shared situational awareness, coordinated incident response are essential...

10.1109/csr57506.2023.10224995 article EN 2023-07-31

Smart grids are a promising upgrade to legacy power due enhanced cooperation of involved parties, such as consumers and utility providers.These newer improve the efficiency electricity generation distribution by leveraging communication networks exchange information between those different parties.However, increased connection also expose control grid possibility cyber-attacks.Therefore, research on cybersecurity for smart is crucial ensure safe operation protect privacy consumers.In this...

10.5220/0009187307330741 article EN cc-by-nc-nd 2020-01-01

Summary The design of software for networked systems with nodes running an Internet things operating system faces important challenges due to the heterogeneity interacting and constraints stemming from often limited amount available resources. In this context, it is hard build confidence that a solution fulfills application's requirements. This paper introduces flow web service applications representational state transfer style based on formal modeling language, behaviour, interaction,...

10.1002/spe.2568 article EN Software Practice and Experience 2018-03-06

The inclusion of resource sharing schemes within Network Function Virtualization (NFV) ecosystems allows for optimized usage 5G infrastructure and extended capabilities network slicing services. In such environments, marketplaces are formed to facilitate the exchange NFV services across administrative domains, which may, however, belong untrusted unreliable entities. this work, we propose a novel zero-touch approach cross-domain service assurance, using enterprise blockchain technologies...

10.1109/eucnc/6gsummit51104.2021.9482602 article EN 2021-06-08

The threat landscape of industrial infrastructures has expanded exponentially over the last few years. Such include services such as smart meter data exchange that should have real-time availability. Smart meters constitute main component Advanced Metering Infrastructure, and their measurements are also used historical for forecasting energy demand to avoid load peaks could lead blackouts within specific areas. Hence, a comprehensive Incident Response plan must be in place ensure high...

10.1109/wfcs60972.2024.10540775 article EN 2024-04-17

Modern vehicles are complex safety critical cyber physical systems, that connected to the outside world, with all security implications brings. To enhance vehicle several network intrusion detection systems (NIDS) have been proposed for CAN bus, predominant type of in-vehicle network. The however, is a challenging place do as messages provide very little information; interpreting them requires specific knowledge about implementation not readily available. In this paper we collect how...

10.1109/icves.2019.8906465 article EN 2019-09-01

The fifth generation (5G) of mobile networks is steering the technological evolution many application domains, including demanding automotive scenarios, such as platooning. Such combines softwarization enablers (e.g., Network Function Virtualization (NFV) and Software-Defined Networking (SDN)) with Cellular Vehicle-to-Everything (C-V2X) communication to form end-to-end network slices 5G infrastructure resources. Unlike currently used 802.11p standard, adoption these technologies would...

10.1109/vtc2021-spring51267.2021.9448769 article EN 2021-04-01

Modern vehicles are complex safety critical cyber physical systems, that connected to the outside world, with all security implications it brings. Different network intrusion detection systems (NIDSs) proposed for CAN bus, predominant type of in-vehicle network, improve hard compare due disparate evaluation methods adopted. In this paper we provide means NIDSs on equal footing and evaluate ones detailed in literature. Based observe some limitation existing approaches why setting is...

10.1109/iccve45908.2019.8965028 article EN 2019-11-01

The energy carrier infrastructure, including both electricity and natural gas sources, has evolved begun functioning independently over recent years. Nevertheless, studies are pivoting toward the exploration of a unified architecture for systems that combines Multiple-Energy Carriers into single network, hence moving away from treating these carriers separately. As an outcome, new methodology emerged, integrating electrical, chemical, heating centered around concept Energy Hubs (EHs). EHs...

10.3390/en17122827 article EN cc-by Energies 2024-06-08

The exponential increase in the demands for deployment of large-scale sensor networks, makes efficient development functional applications necessary. Nevertheless, existence scarce resources and derived application complexity, impose significant constraints requires high design expertise. Consequently, probability discovering errors, once is implemented, considerably high. To address these issues, there a need availability early-stage validation, performance evaluation rapid prototyping...

10.1109/sas.2015.7133617 preprint EN 2015-04-01

A major challenge that is currently faced in the design of applications for Internet Things (IoT) concerns with optimal use available energy resources given battery lifetime IoT devices. The derived from heterogeneity devices, terms their hardware and provided functionalities (e.g data processing/communication). In this paper, we propose a novel method (i) characterizing parameters influence consumption (ii) validating devices against system's energy-efficiency requirements (e.g. lifetime)....

10.4204/eptcs.272.3 article EN cc-by-nc-nd arXiv (Cornell University) 2018-06-25

The electrical grid is gradually transitioning towards being an interconnected area of the smart grid, where embedded devices operate in autonomous manner without any human intervention. An important element for this transition energy demand prediction, since needs have substantially increased due to introduction new and heavy consumption sources, such as electric vehicles. Accurate especially short-term durations (i.e., minutes hours), allows operators produce substantial amount needed...

10.3390/en16145435 article EN cc-by Energies 2023-07-17

CANopen is an increasingly popular protocol for the design of networked embedded systems.Nonetheless, large variety communication and network management functionalities supported in can increase significantly systems complexity turn, needs system validation at time.We present hereafter a rigorous method based on formal modeling verification techniques, allowing to provide comprehensive analysis systems.Our uses BIP, framework modeling, implementation real-time, heterogeneous, component-based...

10.1109/wfcs.2014.6837602 preprint EN 2014-05-01

Internet of Things (IoT) systems process and respond to multiple (external) events, while performing computations for a Sense-Compute-Control (SCC) or Sense-Only (SO) goal. Given the limitations interconnected resource-constrained devices, execution environment can be based on an appropriate operating system IoT. The development effort reduced, when applications are built top RESTful web services, which shared reused. However, asynchronous communication between remote nodes is prone event...

10.1109/sies.2015.7185066 preprint EN 2015-06-01

Network slicing is an essential 5G innovation whereby the network partitioned into logical segments, so that Communication Service Providers (CSPs) can offer differentiated services for verticals and use cases. In many cases, requirements vary over time CSPs must dynamically adapt slices to satisfy contractual slice QoS, cooperating using each others' resources, e.g. when resources of a single CSP are not sufficient or suitable maintain all it's current SLAs. While this need dynamic...

10.1109/netsoft51509.2021.9492716 article EN 2021-06-28

A recently proposed direction that is pursued by standardization organizations for 5G Network Function Virtualization (NFV) technologies at the core of next-generation networks (5G and beyond) adoption "Cloud-native" design principles. These principles are catalyzed Platform as a Service (PaaS) solutions allow re-usability common or dedicated Virtual Functions, in order to fulfill diverse vertical requirements network slices. PaaS can also be extended Multi-access Edge Computing environments...

10.1109/eucnc/6gsummit51104.2021.9482438 article EN 2021-06-08
Coming Soon ...