Ariadni Michalitsi-Psarrou

ORCID: 0000-0003-0792-8568
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Cybercrime and Law Enforcement Studies
  • Network Security and Intrusion Detection
  • Human Mobility and Location-Based Analysis
  • Advanced Malware Detection Techniques
  • Context-Aware Activity Recognition Systems
  • Service and Product Innovation
  • Opportunistic and Delay-Tolerant Networks
  • Digital Marketing and Social Media
  • Global Energy and Sustainability Research
  • Machine Learning in Healthcare
  • Energy Load and Power Forecasting
  • Digital and Cyber Forensics
  • Global Energy Security and Policy
  • Data Quality and Management
  • Injury Epidemiology and Prevention
  • Product Development and Customization
  • Migration, Health and Trauma
  • Power System Reliability and Maintenance
  • Mobile Crowdsensing and Crowdsourcing
  • Consumer Market Behavior and Pricing
  • Energy Efficiency and Management
  • Smart Cities and Technologies
  • Information Systems Theories and Implementation
  • E-Government and Public Services

National Technical University of Athens
2016-2024

Recent studies report that cybersecurity breaches noticed in hospitals are associated with low levels of personnel's awareness. This work aims to assess the culture healthcare institutions from middle- low-income EU countries. The evaluation process was designed and performed via anonymous online surveys targeting individually ICT (internet communication technology) departments professionals. study conducted 2019 for a health region Greece, significant number centers, large hospital...

10.3390/healthcare10020327 article EN Healthcare 2022-02-09

The coronavirus pandemic led to an unprecedented crisis affecting all aspects of the concurrent reality. Its consequences vary from political and societal technical economic. These side effects provided fertile ground for a noticeable cyber-crime increase targeting critical infrastructures and, more specifically, health sector; domain suffering most during pandemic. This paper aims assess cybersecurity culture readiness hospitals’ workforce COVID-19 crisis. Towards that end, awareness...

10.3390/healthcare9101335 article EN Healthcare 2021-10-07

The exponential growth of networking capabilities including the Internet Things (IoT), has led to an outburst cyberattacks. Many well-documented cyber-attacks have targeted critical energy infrastructures as well any kind cloud-based IT platforms. Early examination systems' vulnerabilities, previous cyber-security incidents, are utmost importance prevent new ones. A thorough investigation examine context breach can reveal facts about source attack, profile attacker, resources, and skills...

10.1109/bigdata55660.2022.10020208 article EN 2021 IEEE International Conference on Big Data (Big Data) 2022-12-17

The increase of cyber-attacks raised security concerns for critical assets worldwide in the last decade. Leading to more efforts spent towards increasing cyber among companies and countries. For sake enhancing security, representation testing attacks have prime importance understanding system vulnerabilities. One available tools simulating on systems is Meta Attack Language (MAL), which allows representing effects certain cyber-attacks. However, only component vulnerabilities not enough...

10.1145/3465481.3470475 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2021-08-16

Complex brain disorders, including Alzheimer's dementia, sleep and epilepsy, are chronic conditions that have high prevalence individually in combination, increasing mortality risk, contributing to the socioeconomic burden of patients, their families and, communities at large. Although some literature reviews been conducted mentioning available methods tools used for supporting diagnosis complex disorders processing different files, there still limitations. Specifically, these research works...

10.12688/openreseurope.16244.1 article EN cc-by Open Research Europe 2023-09-19

The Energy Sector is highly targeted by cyber threats because of its inherent value and profitability. Recent reported security incidents verify key playing role in the entire economic societal concurrent reality. This paper aims to assess cyber-security culture status European representatives electrical power supply chain during coronavirus pandemic Ukrainian war. An evaluation campaign has been carefully designed held from 3rd March 2022 18th 2022. During that period, participants...

10.1145/3538969.3543813 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2022-08-17

In order to get a deeper understanding of security breaches, their severity, impact and ways mitigate them, many vulnerability databases dictionaries have been developed. However, all that information on vulnerabilities is scattered over the web, which makes locating mitigating an arduous task. This paper introduces Vulnerabilities Manager, tool automates process linking from well-known external data sources. Its goal present enriched report its final users, assisting them in pinpointing...

10.1109/bigdata52589.2021.9672026 article EN 2021 IEEE International Conference on Big Data (Big Data) 2021-12-15

The general idea of the AMBER/Child Alert System is that by broadcasting and distributing information about a missing child to community, public's involvement can trigger critical feedback would have otherwise been ignored. This feedback, in several cases, be proved decisive finding child. Despite efforts at country European level effectively address issue children, number key challenges remain open, including lack location-focused distribution alerts, insufficient capture diffusion...

10.1109/ice.2019.8792679 article EN 2019-06-01

Times of crisis have long been combined with an increase in cybercrime, exploiting the general instability; therefore, such times, systems and infrastructures face greater exposure to vulnerabilities. On top that, COVID-19 has increased our reliance on internet, while working-from-home daily reality for a large proportion population worldwide. Increased cyber-security awareness becomes necessity everyone, starting from more knowledgeable audience; IT professionals, software engineers. In...

10.1145/3538969.3544467 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2022-08-17

Although a plethora of individual and disconnected applications can be found serving the "data exploitation for marine-related applications" profile, there is lack networked initiatives bringing together organisations knowledge from different scientific policy domains, as well geographical areas. The present paper work under European funded research project BigDataOcean <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sup> its main objective...

10.1109/ice.2017.8280008 article EN 2017 International Conference on Engineering, Technology and Innovation (ICE/ITMC) 2017-06-01

AI4EF, Artificial Intelligence for Energy Efficiency, is an advanced, user-centric tool designed to support decision-making in building energy retrofitting and efficiency optimization. Leveraging machine learning (ML) data-driven insights, AI4EF enables stakeholders such as public sector representatives, consultants, owners model, analyze, predict consumption, retrofit costs, environmental impacts of upgrades. Featuring a modular framework, includes customizable retrofitting, photovoltaic...

10.48550/arxiv.2412.04045 preprint EN arXiv (Cornell University) 2024-12-05

Public administrations are an integral part of every state, which is currently changing to gradually correct the weak points past. Data and digital technologies there support this endeavor, yet opportunities they offer not still fully exploited in Europe, despite governments' intentions digitize public administration for smoother more accessible administrative procedures. In parallel, transformation, intensified by exceptional circumstances COVID-19 crisis, both imperative inevitable almost...

10.1109/iisa56318.2022.9904352 article EN 2022-07-18

Although customers become more and vocal in expressing their experiences, demands needs various social networks, companies of any size typically fail to effectively gain insights from such data eventually catch the market realm. This paper introduces Anlzer analytics engine that aims at leveraging "social" deluge help quest for deeper understanding products' perceptions as well emerging trends order early embed them into product design phase. The proposed approach brings together polarity...

10.1109/ares.2016.99 article EN 2016-08-01

Abstract The phenomenon of missing children is complex, further complicated by the specific circumstances unaccompanied migrant minors. Owing to (often forced) migration, these have moved through different countries with diverse legislation and work practices. international nature cases leads confusion about responsibility actors. Additionally, for cases, little data are available. This article critically assesses current practices in EU. It also introduces a new practical solution based on...

10.1057/s41599-021-00958-9 article EN cc-by Humanities and Social Sciences Communications 2021-11-15

Citizen sensing applications need to have a number of users defined that ensures their effectiveness. This is not straightforward task because neither the relationship between size userbase or its effectiveness easily quantified, nor it clear which threshold for would make application ‘effective’. paper presents an approach estimating needed location-based crowdsourcing work successfully, depending on use case, circumstances, and criteria success. It circumvents various issues, ethical...

10.3390/app11146530 article EN cc-by Applied Sciences 2021-07-15
Coming Soon ...