- Software-Defined Networks and 5G
- IoT and Edge/Fog Computing
- Smart Grid Security and Resilience
- Vehicular Ad Hoc Networks (VANETs)
- Real-Time Systems Scheduling
- Context-Aware Activity Recognition Systems
- Smart Grid Energy Management
- Electric Vehicles and Infrastructure
- Software System Performance and Reliability
- Autonomous Vehicle Technology and Safety
- Network Security and Intrusion Detection
- Green IT and Sustainability
- Information and Cyber Security
- Advanced Data and IoT Technologies
- Real-time simulation and control systems
- Privacy-Preserving Technologies in Data
- Embedded Systems Design Techniques
- Blockchain Technology Applications and Security
- Advanced Battery Technologies Research
- Advanced Neural Network Applications
- Energy Load and Power Forecasting
- Advanced Malware Detection Techniques
- Model-Driven Software Engineering Techniques
- Machine Fault Diagnosis Techniques
- Anomaly Detection Techniques and Applications
University of Thessaly
2023-2024
Public Power Corporation (Greece)
2022-2024
National Technical University of Athens
2024
University of Piraeus
2023
Intracom Telecom (Greece)
2021
Aristotle University of Thessaloniki
2018-2021
Polish Academy of Sciences
2021
Tecnológico de Monterrey
2021
National Institute of Technology Kurukshetra
2021
Warsaw University of Technology
2021
The scheduled maintenance of industrial equipment is usually performed with a low frequency, as it leads to unpredicted downtime in business operations. Nevertheless, this confers risk failure individual modules the equipment, which may diminish its performance or even lead breakdown, rendering non-operational. Lately, predictive methods have been considered for systems, such power generation stations, proactive measure preventing failures. Such use data gathered from and Machine Learning...
Traditional electricity infrastructure inspections usually have high costs, risks and it takes a long time for specialized personnel to carry them out. Additionally, they also involve scaffolding risks, that lead accident rate in most companies. The recent emergence of Unmanned Aerial Vehicles (UAVs) is gradually leveraged avoid such risks. However, UAVs face Global Positioning System instability issues especially the distant or harsh areas. This requires frequent manual UAV control...
Abstract With the expansion of 5G networks, new business models are arising where multi-tenancy and active infrastructure sharing will be key enablers for them. these opportunities, security risks appearing in form a complex evolving threat landscape being one main challenges mass rollout. In 5G-enabled scenarios, adversaries can exploit vulnerabilities associated with resource to perform lateral movements targeting other tenant resources, as well disturb services offered or even resources....
The electric vehicle (EV) industry has made significant progress but, in many markets, there are still barriers holding back its advancement. A key issue is the anxiety caused to drivers by limited range of current EV models and inadequate access charging stations long-distance trips, as case on highways. We propose an intuitive multi-criteria approach that optimally places highways (partially) lack such points. approach, which applied iterative fashion dynamically evaluate alternatives,...
As digital technologies become more pervasive in society and the economy, cyber-security incidents frequent, but also impactful. Based on NIS & NIS2 Directives, EU Member States their Operators of Essential Services (OES) must establish a minimum baseline set capabil- ities while providing cross-border coordination cooperation. But this is only small step towards European cyber resilience. In landscape, preparedness, shared situational awareness, coordinated incident response are essential...
Smart grids are a promising upgrade to legacy power due enhanced cooperation of involved parties, such as consumers and utility providers.These newer improve the efficiency electricity generation distribution by leveraging communication networks exchange information between those different parties.However, increased connection also expose control grid possibility cyber-attacks.Therefore, research on cybersecurity for smart is crucial ensure safe operation protect privacy consumers.In this...
Summary The design of software for networked systems with nodes running an Internet things operating system faces important challenges due to the heterogeneity interacting and constraints stemming from often limited amount available resources. In this context, it is hard build confidence that a solution fulfills application's requirements. This paper introduces flow web service applications representational state transfer style based on formal modeling language, behaviour, interaction,...
The inclusion of resource sharing schemes within Network Function Virtualization (NFV) ecosystems allows for optimized usage 5G infrastructure and extended capabilities network slicing services. In such environments, marketplaces are formed to facilitate the exchange NFV services across administrative domains, which may, however, belong untrusted unreliable entities. this work, we propose a novel zero-touch approach cross-domain service assurance, using enterprise blockchain technologies...
The threat landscape of industrial infrastructures has expanded exponentially over the last few years. Such include services such as smart meter data exchange that should have real-time availability. Smart meters constitute main component Advanced Metering Infrastructure, and their measurements are also used historical for forecasting energy demand to avoid load peaks could lead blackouts within specific areas. Hence, a comprehensive Incident Response plan must be in place ensure high...
Modern vehicles are complex safety critical cyber physical systems, that connected to the outside world, with all security implications brings. To enhance vehicle several network intrusion detection systems (NIDS) have been proposed for CAN bus, predominant type of in-vehicle network. The however, is a challenging place do as messages provide very little information; interpreting them requires specific knowledge about implementation not readily available. In this paper we collect how...
The fifth generation (5G) of mobile networks is steering the technological evolution many application domains, including demanding automotive scenarios, such as platooning. Such combines softwarization enablers (e.g., Network Function Virtualization (NFV) and Software-Defined Networking (SDN)) with Cellular Vehicle-to-Everything (C-V2X) communication to form end-to-end network slices 5G infrastructure resources. Unlike currently used 802.11p standard, adoption these technologies would...
Modern vehicles are complex safety critical cyber physical systems, that connected to the outside world, with all security implications it brings. Different network intrusion detection systems (NIDSs) proposed for CAN bus, predominant type of in-vehicle network, improve hard compare due disparate evaluation methods adopted. In this paper we provide means NIDSs on equal footing and evaluate ones detailed in literature. Based observe some limitation existing approaches why setting is...
The energy carrier infrastructure, including both electricity and natural gas sources, has evolved begun functioning independently over recent years. Nevertheless, studies are pivoting toward the exploration of a unified architecture for systems that combines Multiple-Energy Carriers into single network, hence moving away from treating these carriers separately. As an outcome, new methodology emerged, integrating electrical, chemical, heating centered around concept Energy Hubs (EHs). EHs...
The exponential increase in the demands for deployment of large-scale sensor networks, makes efficient development functional applications necessary. Nevertheless, existence scarce resources and derived application complexity, impose significant constraints requires high design expertise. Consequently, probability discovering errors, once is implemented, considerably high. To address these issues, there a need availability early-stage validation, performance evaluation rapid prototyping...
A major challenge that is currently faced in the design of applications for Internet Things (IoT) concerns with optimal use available energy resources given battery lifetime IoT devices. The derived from heterogeneity devices, terms their hardware and provided functionalities (e.g data processing/communication). In this paper, we propose a novel method (i) characterizing parameters influence consumption (ii) validating devices against system's energy-efficiency requirements (e.g. lifetime)....
The electrical grid is gradually transitioning towards being an interconnected area of the smart grid, where embedded devices operate in autonomous manner without any human intervention. An important element for this transition energy demand prediction, since needs have substantially increased due to introduction new and heavy consumption sources, such as electric vehicles. Accurate especially short-term durations (i.e., minutes hours), allows operators produce substantial amount needed...
CANopen is an increasingly popular protocol for the design of networked embedded systems.Nonetheless, large variety communication and network management functionalities supported in can increase significantly systems complexity turn, needs system validation at time.We present hereafter a rigorous method based on formal modeling verification techniques, allowing to provide comprehensive analysis systems.Our uses BIP, framework modeling, implementation real-time, heterogeneous, component-based...
Internet of Things (IoT) systems process and respond to multiple (external) events, while performing computations for a Sense-Compute-Control (SCC) or Sense-Only (SO) goal. Given the limitations interconnected resource-constrained devices, execution environment can be based on an appropriate operating system IoT. The development effort reduced, when applications are built top RESTful web services, which shared reused. However, asynchronous communication between remote nodes is prone event...
Network slicing is an essential 5G innovation whereby the network partitioned into logical segments, so that Communication Service Providers (CSPs) can offer differentiated services for verticals and use cases. In many cases, requirements vary over time CSPs must dynamically adapt slices to satisfy contractual slice QoS, cooperating using each others' resources, e.g. when resources of a single CSP are not sufficient or suitable maintain all it's current SLAs. While this need dynamic...
A recently proposed direction that is pursued by standardization organizations for 5G Network Function Virtualization (NFV) technologies at the core of next-generation networks (5G and beyond) adoption "Cloud-native" design principles. These principles are catalyzed Platform as a Service (PaaS) solutions allow re-usability common or dedicated Virtual Functions, in order to fulfill diverse vertical requirements network slices. PaaS can also be extended Multi-access Edge Computing environments...