BibTeX records: George Stergiopoulos

download as .bib file

@article{DBLP:journals/ijisec/AdamosSKG24,
  author       = {Konstantinos Adamos and
                  George Stergiopoulos and
                  Michalis Karamousadakis and
                  Dimitris Gritzalis},
  title        = {Enhancing attack resilience of cyber-physical systems through state
                  dependency graph models},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {1},
  pages        = {187--198},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00731-w},
  doi          = {10.1007/S10207-023-00731-W},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AdamosSKG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DedousisSAG23,
  author       = {Panagiotis Dedousis and
                  George Stergiopoulos and
                  George Arampatzis and
                  Dimitris Gritzalis},
  title        = {Enhancing Operational Resilience of Critical Infrastructure Processes
                  Through Chaos Engineering},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {106172--106189},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3316028},
  doi          = {10.1109/ACCESS.2023.3316028},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DedousisSAG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LygerouSVSG23,
  author       = {Irini Lygerou and
                  Shreyas Srinivasa and
                  Emmanouil Vasilomanolakis and
                  George Stergiopoulos and
                  Dimitris Gritzalis},
  title        = {Correction to: {A} decentralized honeypot for IoT Protocols based
                  on Android devices},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {1},
  pages        = {303},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-022-00628-0},
  doi          = {10.1007/S10207-022-00628-0},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/LygerouSVSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/StergiopoulosKKT23,
  author       = {George Stergiopoulos and
                  Panayiotis Kotzanikolaou and
                  Charalambos Konstantinou and
                  Achilleas Tsoukalis},
  title        = {Process-Aware Attacks on Medication Control of Type-I Diabetics Using
                  Infusion Pumps},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {2},
  pages        = {1831--1842},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3236690},
  doi          = {10.1109/JSYST.2023.3236690},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/StergiopoulosKKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/StergiopoulosDG22,
  author       = {George Stergiopoulos and
                  Panagiotis Dedousis and
                  Dimitris Gritzalis},
  title        = {Automatic analysis of attack graphs for risk mitigation and prioritization
                  on large-scale and complex networks in Industry 4.0},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {1},
  pages        = {37--59},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-020-00533-4},
  doi          = {10.1007/S10207-020-00533-4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/StergiopoulosDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LygerouSVSG22,
  author       = {Irini Lygerou and
                  Shreyas Srinivasa and
                  Emmanouil Vasilomanolakis and
                  George Stergiopoulos and
                  Dimitris Gritzalis},
  title        = {A decentralized honeypot for IoT Protocols based on Android devices},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {6},
  pages        = {1211--1222},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-022-00605-7},
  doi          = {10.1007/S10207-022-00605-7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/LygerouSVSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DedousisRSG22,
  author       = {Panagiotis Dedousis and
                  Melina Raptaki and
                  George Stergiopoulos and
                  Dimitris Gritzalis},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Towards an Automated Business Process Model Risk Assessment: {A} Process
                  Mining Approach},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {35--46},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011135600003283},
  doi          = {10.5220/0011135600003283},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DedousisRSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MalamasCDSKD21,
  author       = {Vangelis Malamas and
                  Fotis Chantzis and
                  Thomas K. Dasaklis and
                  George Stergiopoulos and
                  Panayiotis Kotzanikolaou and
                  Christos Douligeris},
  title        = {Risk Assessment Methodologies for the Internet of Medical Things:
                  {A} Survey and Comparative Appraisal},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {40049--40075},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3064682},
  doi          = {10.1109/ACCESS.2021.3064682},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MalamasCDSKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DedousisSAG21,
  author       = {Panagiotis Dedousis and
                  George Stergiopoulos and
                  George Arampatzis and
                  Dimitris Gritzalis},
  title        = {A Security-Aware Framework for Designing Industrial Engineering Processes},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {163065--163085},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3134759},
  doi          = {10.1109/ACCESS.2021.3134759},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/DedousisSAG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StergiopoulosGV21,
  author       = {George Stergiopoulos and
                  Dimitris Gritzalis and
                  Efstratios Vasilellis and
                  Argiro Anagnostopoulou},
  title        = {Dropping malware through sound injection: {A} comparative analysis
                  on Android operating systems},
  journal      = {Comput. Secur.},
  volume       = {105},
  pages        = {102228},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102228},
  doi          = {10.1016/J.COSE.2021.102228},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StergiopoulosGV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/XarhoulacosASG21,
  author       = {Constantinos{-}Giovanni Xarhoulacos and
                  Argiro Anagnostopoulou and
                  George Stergiopoulos and
                  Dimitris Gritzalis},
  title        = {Misinformation vs. Situational Awareness: The Art of Deception and
                  the Need for Cross-Domain Detection},
  journal      = {Sensors},
  volume       = {21},
  number       = {16},
  pages        = {5496},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21165496},
  doi          = {10.3390/S21165496},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/XarhoulacosASG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DedousisSAG21,
  author       = {Panagiotis Dedousis and
                  George Stergiopoulos and
                  George Arampatzis and
                  Dimitris Gritzalis},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Towards Integrating Security in Industrial Engineering Design Practices},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {161--172},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010544001610172},
  doi          = {10.5220/0010544001610172},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DedousisSAG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-14962,
  author       = {Charalambos Konstantinou and
                  George Stergiopoulos and
                  Masood Parvania and
                  Paulo Esteves Ver{\'{\i}}ssimo},
  title        = {Chaos Engineering for Enhanced Resilience of Cyber-Physical Systems},
  journal      = {CoRR},
  volume       = {abs/2106.14962},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.14962},
  eprinttype    = {arXiv},
  eprint       = {2106.14962},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-14962.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/StergiopoulosGL20,
  author       = {George Stergiopoulos and
                  Dimitris Gritzalis and
                  Evangelos Limnaios},
  title        = {Cyber-Attacks on the Oil {\&} Gas Sector: {A} Survey on Incident
                  Assessment and Attack Patterns},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {128440--128475},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3007960},
  doi          = {10.1109/ACCESS.2020.3007960},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/StergiopoulosGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LykouDSG20,
  author       = {Georgia Lykou and
                  Panagiotis Dedousis and
                  George Stergiopoulos and
                  Dimitris Gritzalis},
  title        = {Assessing Interdependencies and Congestion Delays in the Aviation
                  Network},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {223234--223254},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3045340},
  doi          = {10.1109/ACCESS.2020.3045340},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LykouDSG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StergiopoulosDG20,
  author       = {George Stergiopoulos and
                  Panagiotis Dedousis and
                  Dimitris Gritzalis},
  title        = {Automatic network restructuring and risk mitigation through business
                  process asset dependency analysis},
  journal      = {Comput. Secur.},
  volume       = {96},
  pages        = {101869},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101869},
  doi          = {10.1016/J.COSE.2020.101869},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StergiopoulosDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/StergiopoulosKV20,
  author       = {George Stergiopoulos and
                  Nick Kapetanas and
                  Efstratios Vasilellis and
                  Dimitris Gritzalis},
  title        = {Leaking supervisory controls and data acquisition commands over unpadded
                  {TCP/IP} encryption through differential packet size analysis},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.82},
  doi          = {10.1002/SPY2.82},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/StergiopoulosKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KoutrasSDKGD20,
  author       = {Dimitris Koutras and
                  George Stergiopoulos and
                  Thomas K. Dasaklis and
                  Panayiotis Kotzanikolaou and
                  Dimitris Glynos and
                  Christos Douligeris},
  title        = {Security in IoMT Communications: {A} Survey},
  journal      = {Sensors},
  volume       = {20},
  number       = {17},
  pages        = {4828},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20174828},
  doi          = {10.3390/S20174828},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KoutrasSDKGD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/NomikosPSKPK20,
  author       = {Konstantinos Nomikos and
                  Athanasios Papadimitriou and
                  George Stergiopoulos and
                  Dimitris Koutras and
                  Mihalis Psarakis and
                  Panayiotis Kotzanikolaou},
  title        = {On a Security-oriented Design Framework for Medical IoT Devices: The
                  Hardware Security Perspective},
  booktitle    = {23rd Euromicro Conference on Digital System Design, {DSD} 2020, Kranj,
                  Slovenia, August 26-28, 2020},
  pages        = {301--308},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSD51259.2020.00056},
  doi          = {10.1109/DSD51259.2020.00056},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/NomikosPSKPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/DedousisSG20,
  author       = {Panagiotis Dedousis and
                  George Stergiopoulos and
                  Dimitris Gritzalis},
  editor       = {Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {An Improved Bit Masking Technique to Enhance Covert Channel Attacks
                  in Everyday {IT} Systems},
  booktitle    = {E-Business and Telecommunications - 17th International Conference
                  on E-Business and Telecommunications, {ICETE} 2020, Online Event,
                  July 8-10, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1484},
  pages        = {1--23},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-90428-9\_1},
  doi          = {10.1007/978-3-030-90428-9\_1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/DedousisSG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/StergiopoulosLT20,
  author       = {George Stergiopoulos and
                  Eirini Lygerou and
                  Nikolaos Tsalis and
                  Dimitris Tomaras and
                  Dimitris Gritzalis},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {Avoiding Network and Host Detection using Packet Bit-masking},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {52--63},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009591500520063},
  doi          = {10.5220/0009591500520063},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/StergiopoulosLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/StergiopoulosCB19,
  author       = {George Stergiopoulos and
                  Georgia Chronopoulou and
                  Evangelos Bitsikas and
                  Nikolaos Tsalis and
                  Dimitris Gritzalis},
  title        = {Using side channel {TCP} features for real-time detection of malware
                  connections},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {5},
  pages        = {507--520},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-191286},
  doi          = {10.3233/JCS-191286},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/StergiopoulosCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/StergiopoulosVM18,
  author       = {George Stergiopoulos and
                  Evangelos Valvis and
                  Dimitris Mitrodimas and
                  Dimitrios Lekkas and
                  Dimitris Gritzalis},
  title        = {Analyzing Congestion Interdependencies of Ports and Container Ship
                  Routes in the Maritime Network Infrastructure},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {63823--63832},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2877659},
  doi          = {10.1109/ACCESS.2018.2877659},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/StergiopoulosVM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/StergiopoulosGK18,
  author       = {George Stergiopoulos and
                  Dimitris Gritzalis and
                  Vasilis Kouktzoglou},
  title        = {Using formal distributions for threat likelihood estimation in cloud-enabled
                  {IT} risk assessment},
  journal      = {Comput. Networks},
  volume       = {134},
  pages        = {23--45},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.033},
  doi          = {10.1016/J.COMNET.2018.01.033},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/StergiopoulosGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/LykouASG18,
  author       = {Georgia Lykou and
                  Argiro Anagnostopoulou and
                  George Stergiopoulos and
                  Dimitris Gritzalis},
  editor       = {Eric A. M. Luiijf and
                  Inga Zutautaite and
                  Bernhard M. H{\"{a}}mmerli},
  title        = {Cybersecurity Self-assessment Tools: Evaluating the Importance for
                  Securing Industrial Control Systems in Critical Infrastructures},
  booktitle    = {Critical Information Infrastructures Security - 13th International
                  Conference, {CRITIS} 2018, Kaunas, Lithuania, September 24-26, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11260},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05849-4\_10},
  doi          = {10.1007/978-3-030-05849-4\_10},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/critis/LykouASG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/StergiopoulosTB18,
  author       = {George Stergiopoulos and
                  Alexander Talavari and
                  Evangelos Bitsikas and
                  Dimitris Gritzalis},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Automatic Detection of Various Malicious Traffic Using Side Channel
                  Features on {TCP} Packets},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {346--362},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_17},
  doi          = {10.1007/978-3-319-99073-6\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/StergiopoulosTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/TsalisSBGA18,
  author       = {Nikolaos Tsalis and
                  George Stergiopoulos and
                  Evangelos Bitsikas and
                  Dimitris Gritzalis and
                  Theodore K. Apostolopoulos},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Side Channel Attacks over Encrypted {TCP/IP} Modbus Reveal Functionality
                  Leaks},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {219--229},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006832702190229},
  doi          = {10.5220/0006832702190229},
  timestamp    = {Wed, 29 Aug 2018 15:17:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/TsalisSBGA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StergiopoulosKG17,
  author       = {George Stergiopoulos and
                  Panayiotis Katsaros and
                  Dimitris Gritzalis},
  title        = {Program analysis with risk-based classification of dynamic invariants
                  for logical error detection},
  journal      = {Comput. Secur.},
  volume       = {71},
  pages        = {36--50},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.02.007},
  doi          = {10.1016/J.COSE.2017.02.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StergiopoulosKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/StergiopoulosKT17,
  author       = {George Stergiopoulos and
                  Vasilis Kouktzoglou and
                  Marianthi Theocharidou and
                  Dimitris Gritzalis},
  title        = {A process-based dependency risk analysis methodology for critical
                  infrastructures},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {13},
  number       = {2/3},
  pages        = {184--205},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJCIS.2017.10009258},
  doi          = {10.1504/IJCIS.2017.10009258},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/StergiopoulosKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/StergiopoulosVA17,
  author       = {George Stergiopoulos and
                  Evangelos Valvis and
                  Foivos Anagnou{-}Misyris and
                  Nick Bozovic and
                  Dimitris Gritzalis},
  title        = {Interdependency analysis of junctions for congestion mitigation in
                  Transportation Infrastructures},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {45},
  number       = {2},
  pages        = {119--124},
  year         = {2017},
  url          = {https://doi.org/10.1145/3152042.3152078},
  doi          = {10.1145/3152042.3152078},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/StergiopoulosVA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/LykouSPG17,
  author       = {Georgia Lykou and
                  George Stergiopoulos and
                  Antonios Papachrysanthou and
                  Dimitris Gritzalis},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Protecting the Transportation Sector from the Negative Impacts of
                  Climate Change},
  booktitle    = {Critical Infrastructure Protection {XI} - 11th {IFIP} {WG} 11.10 International
                  Conference, {ICCIP} 2017, Arlington, VA, USA, March 13-15, 2017, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {512},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70395-4\_1},
  doi          = {10.1007/978-3-319-70395-4\_1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/LykouSPG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StergiopoulosKT16,
  author       = {George Stergiopoulos and
                  Panayiotis Kotzanikolaou and
                  Marianthi Theocharidou and
                  Georgia Lykou and
                  Dimitris Gritzalis},
  title        = {Time-based critical infrastructure dependency analysis for large-scale
                  and cross-sectoral failures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {12},
  pages        = {46--60},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2015.12.002},
  doi          = {10.1016/J.IJCIP.2015.12.002},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/StergiopoulosKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GritzalisSKML16,
  author       = {Dimitris Gritzalis and
                  George Stergiopoulos and
                  Panayiotis Kotzanikolaou and
                  Emmanouil Magkos and
                  Georgia Lykou},
  editor       = {Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas},
  title        = {Critical Infrastructure Protection: {A} Holistic Methodology for Greece},
  booktitle    = {Security of Industrial Control Systems and Cyber-Physical Systems
                  - Second International Workshop, CyberICPS 2016, Heraklion, Crete,
                  Greece, September 26-30, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10166},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61437-3\_2},
  doi          = {10.1007/978-3-319-61437-3\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GritzalisSKML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/StergiopoulosVL16,
  author       = {George Stergiopoulos and
                  Efstratios Vasilellis and
                  Georgia Lykou and
                  Panayiotis Kotzanikolaou and
                  Dimitris Gritzalis},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Classification and Comparison of Critical Infrastructure Protection
                  Tools},
  booktitle    = {Critical Infrastructure Protection {X} - 10th {IFIP} {WG} 11.10 International
                  Conference, {ICCIP} 2016, Arlington, VA, USA, March 14-16, 2016, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {485},
  pages        = {239--255},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48737-3\_14},
  doi          = {10.1007/978-3-319-48737-3\_14},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/StergiopoulosVL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/StergiopoulosKG16,
  author       = {George Stergiopoulos and
                  Panagiotis Katsaros and
                  Dimitris Gritzalis and
                  Theodore K. Apostolopoulos},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Combining Invariant Violation with Execution Path Classification for
                  Detecting Multiple Types of Logical Errors and Race Conditions},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {28--40},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005947200280040},
  doi          = {10.5220/0005947200280040},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/StergiopoulosKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StergiopoulosG15,
  author       = {George Stergiopoulos and
                  Dimitris Gritzalis},
  title        = {Hacking and Penetration Testing with Low Power Devices},
  journal      = {Comput. Secur.},
  volume       = {49},
  pages        = {274--275},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.01.001},
  doi          = {10.1016/J.COSE.2015.01.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StergiopoulosG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StergiopoulosKT15,
  author       = {George Stergiopoulos and
                  Panayiotis Kotzanikolaou and
                  Marianthi Theocharidou and
                  Dimitris Gritzalis},
  title        = {Risk mitigation strategies for critical infrastructures based on graph
                  centrality analysis},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {10},
  pages        = {34--44},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.05.003},
  doi          = {10.1016/J.IJCIP.2015.05.003},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/StergiopoulosKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/FailySKG15,
  author       = {Shamal Faily and
                  George Stergiopoulos and
                  Vasilios Katos and
                  Dimitris Gritzalis},
  editor       = {Erich Rome and
                  Marianthi Theocharidou and
                  Stephen D. Wolthusen},
  title        = {"Water, Water, Every Where": Nuances for a Water Industry
                  Critical Infrastructure Specification Exemplar},
  booktitle    = {Critical Information Infrastructures Security - 10th International
                  Conference, {CRITIS} 2015, Berlin, Germany, October 5-7, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9578},
  pages        = {243--246},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-33331-1\_20},
  doi          = {10.1007/978-3-319-33331-1\_20},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/critis/FailySKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/StergiopoulosTG15,
  author       = {George Stergiopoulos and
                  Marianthi Theocharidou and
                  Dimitris Gritzalis},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {Using Logical Error Detection in Software Controlling Remote-Terminal
                  Units to Predict Critical Information Infrastructures Failures},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Third
                  International Conference, {HAS} 2015, Held as Part of {HCI} International
                  2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9190},
  pages        = {672--683},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20376-8\_60},
  doi          = {10.1007/978-3-319-20376-8\_60},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hci/StergiopoulosTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/StergiopoulosKG15,
  author       = {George Stergiopoulos and
                  Panagiotis Katsaros and
                  Dimitris Gritzalis},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz},
  title        = {Execution Path Classification for Vulnerability Analysis and Detection},
  booktitle    = {E-Business and Telecommunications - 12th International Joint Conference,
                  {ICETE} 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {585},
  pages        = {293--317},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30222-5\_14},
  doi          = {10.1007/978-3-319-30222-5\_14},
  timestamp    = {Tue, 21 Mar 2023 21:02:06 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/StergiopoulosKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/StergiopoulosTK15,
  author       = {George Stergiopoulos and
                  Marianthi Theocharidou and
                  Panayiotis Kotzanikolaou and
                  Dimitris Gritzalis},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Using Centrality Measures in Dependency Risk Graphs for Efficient
                  Risk Mitigation},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {299--314},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_18},
  doi          = {10.1007/978-3-319-26567-4\_18},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/StergiopoulosTK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/StergiopoulosPK15,
  author       = {George Stergiopoulos and
                  Panagiotis Petsanas and
                  Panagiotis Katsaros and
                  Dimitris Gritzalis},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Automated Exploit Detection using Path Profiling - The Disposition
                  Should Matter, Not the Position},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {100--111},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005561101000111},
  doi          = {10.5220/0005561101000111},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/StergiopoulosPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StergiopoulosG14,
  author       = {George Stergiopoulos and
                  Dimitris Gritzalis},
  title        = {A Bug Hunter's Diary},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {188},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.001},
  doi          = {10.1016/J.COSE.2014.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StergiopoulosG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/StergiopoulosKG14,
  author       = {George Stergiopoulos and
                  Panagiotis Katsaros and
                  Dimitris Gritzalis},
  editor       = {Javier L{\'{o}}pez and
                  Indrajit Ray and
                  Bruno Crispo},
  title        = {Automated Detection of Logical Errors in Programs},
  booktitle    = {Risks and Security of Internet and Systems - 9th International Conference,
                  CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8924},
  pages        = {35--51},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17127-2\_3},
  doi          = {10.1007/978-3-319-17127-2\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/StergiopoulosKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/GritzalisSKS14,
  author       = {Dimitris Gritzalis and
                  Vasilis Stavrou and
                  Miltiadis Kandias and
                  George Stergiopoulos},
  editor       = {Mohamad Badra and
                  Omar Alfandi},
  title        = {Insider Threat: Enhancing {BPM} through Social Media},
  booktitle    = {6th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NTMS.2014.6814027},
  doi          = {10.1109/NTMS.2014.6814027},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ntms/GritzalisSKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/StergiopoulosTG13,
  author       = {George Stergiopoulos and
                  Bill Tsoumas and
                  Dimitris Gritzalis},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {On Business Logic Vulnerabilities Hunting: The APP{\_}LogGIC Framework},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {236--249},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_18},
  doi          = {10.1007/978-3-642-38631-2\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/StergiopoulosTG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/StergiopoulosKG13,
  author       = {George Stergiopoulos and
                  Miltiadis Kandias and
                  Dimitris Gritzalis},
  editor       = {Pierangela Samarati},
  title        = {Approaching Encryption through Complex Number Logarithms},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {574--579},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223218/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/StergiopoulosKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/StergiopoulosTG12,
  author       = {George Stergiopoulos and
                  Bill Tsoumas and
                  Dimitris Gritzalis},
  editor       = {Gilles Barthe and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {Hunting Application-Level Logical Errors},
  booktitle    = {Engineering Secure Software and Systems - 4th International Symposium,
                  ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7159},
  pages        = {135--142},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28166-2\_13},
  doi          = {10.1007/978-3-642-28166-2\_13},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/essos/StergiopoulosTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics