Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: George Stergiopoulos
@article{DBLP:journals/ijisec/AdamosSKG24, author = {Konstantinos Adamos and George Stergiopoulos and Michalis Karamousadakis and Dimitris Gritzalis}, title = {Enhancing attack resilience of cyber-physical systems through state dependency graph models}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {1}, pages = {187--198}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00731-w}, doi = {10.1007/S10207-023-00731-W}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AdamosSKG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DedousisSAG23, author = {Panagiotis Dedousis and George Stergiopoulos and George Arampatzis and Dimitris Gritzalis}, title = {Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering}, journal = {{IEEE} Access}, volume = {11}, pages = {106172--106189}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3316028}, doi = {10.1109/ACCESS.2023.3316028}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DedousisSAG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LygerouSVSG23, author = {Irini Lygerou and Shreyas Srinivasa and Emmanouil Vasilomanolakis and George Stergiopoulos and Dimitris Gritzalis}, title = {Correction to: {A} decentralized honeypot for IoT Protocols based on Android devices}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {1}, pages = {303}, year = {2023}, url = {https://doi.org/10.1007/s10207-022-00628-0}, doi = {10.1007/S10207-022-00628-0}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/LygerouSVSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/StergiopoulosKKT23, author = {George Stergiopoulos and Panayiotis Kotzanikolaou and Charalambos Konstantinou and Achilleas Tsoukalis}, title = {Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {2}, pages = {1831--1842}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3236690}, doi = {10.1109/JSYST.2023.3236690}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/StergiopoulosKKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/StergiopoulosDG22, author = {George Stergiopoulos and Panagiotis Dedousis and Dimitris Gritzalis}, title = {Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {1}, pages = {37--59}, year = {2022}, url = {https://doi.org/10.1007/s10207-020-00533-4}, doi = {10.1007/S10207-020-00533-4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/StergiopoulosDG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LygerouSVSG22, author = {Irini Lygerou and Shreyas Srinivasa and Emmanouil Vasilomanolakis and George Stergiopoulos and Dimitris Gritzalis}, title = {A decentralized honeypot for IoT Protocols based on Android devices}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {6}, pages = {1211--1222}, year = {2022}, url = {https://doi.org/10.1007/s10207-022-00605-7}, doi = {10.1007/S10207-022-00605-7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/LygerouSVSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DedousisRSG22, author = {Panagiotis Dedousis and Melina Raptaki and George Stergiopoulos and Dimitris Gritzalis}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards an Automated Business Process Model Risk Assessment: {A} Process Mining Approach}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {35--46}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011135600003283}, doi = {10.5220/0011135600003283}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DedousisRSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MalamasCDSKD21, author = {Vangelis Malamas and Fotis Chantzis and Thomas K. Dasaklis and George Stergiopoulos and Panayiotis Kotzanikolaou and Christos Douligeris}, title = {Risk Assessment Methodologies for the Internet of Medical Things: {A} Survey and Comparative Appraisal}, journal = {{IEEE} Access}, volume = {9}, pages = {40049--40075}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3064682}, doi = {10.1109/ACCESS.2021.3064682}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MalamasCDSKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DedousisSAG21, author = {Panagiotis Dedousis and George Stergiopoulos and George Arampatzis and Dimitris Gritzalis}, title = {A Security-Aware Framework for Designing Industrial Engineering Processes}, journal = {{IEEE} Access}, volume = {9}, pages = {163065--163085}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3134759}, doi = {10.1109/ACCESS.2021.3134759}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/DedousisSAG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StergiopoulosGV21, author = {George Stergiopoulos and Dimitris Gritzalis and Efstratios Vasilellis and Argiro Anagnostopoulou}, title = {Dropping malware through sound injection: {A} comparative analysis on Android operating systems}, journal = {Comput. Secur.}, volume = {105}, pages = {102228}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102228}, doi = {10.1016/J.COSE.2021.102228}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StergiopoulosGV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/XarhoulacosASG21, author = {Constantinos{-}Giovanni Xarhoulacos and Argiro Anagnostopoulou and George Stergiopoulos and Dimitris Gritzalis}, title = {Misinformation vs. Situational Awareness: The Art of Deception and the Need for Cross-Domain Detection}, journal = {Sensors}, volume = {21}, number = {16}, pages = {5496}, year = {2021}, url = {https://doi.org/10.3390/s21165496}, doi = {10.3390/S21165496}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/XarhoulacosASG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DedousisSAG21, author = {Panagiotis Dedousis and George Stergiopoulos and George Arampatzis and Dimitris Gritzalis}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards Integrating Security in Industrial Engineering Design Practices}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {161--172}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010544001610172}, doi = {10.5220/0010544001610172}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DedousisSAG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-14962, author = {Charalambos Konstantinou and George Stergiopoulos and Masood Parvania and Paulo Esteves Ver{\'{\i}}ssimo}, title = {Chaos Engineering for Enhanced Resilience of Cyber-Physical Systems}, journal = {CoRR}, volume = {abs/2106.14962}, year = {2021}, url = {https://arxiv.org/abs/2106.14962}, eprinttype = {arXiv}, eprint = {2106.14962}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-14962.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/StergiopoulosGL20, author = {George Stergiopoulos and Dimitris Gritzalis and Evangelos Limnaios}, title = {Cyber-Attacks on the Oil {\&} Gas Sector: {A} Survey on Incident Assessment and Attack Patterns}, journal = {{IEEE} Access}, volume = {8}, pages = {128440--128475}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3007960}, doi = {10.1109/ACCESS.2020.3007960}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/StergiopoulosGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LykouDSG20, author = {Georgia Lykou and Panagiotis Dedousis and George Stergiopoulos and Dimitris Gritzalis}, title = {Assessing Interdependencies and Congestion Delays in the Aviation Network}, journal = {{IEEE} Access}, volume = {8}, pages = {223234--223254}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3045340}, doi = {10.1109/ACCESS.2020.3045340}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LykouDSG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StergiopoulosDG20, author = {George Stergiopoulos and Panagiotis Dedousis and Dimitris Gritzalis}, title = {Automatic network restructuring and risk mitigation through business process asset dependency analysis}, journal = {Comput. Secur.}, volume = {96}, pages = {101869}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101869}, doi = {10.1016/J.COSE.2020.101869}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StergiopoulosDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/StergiopoulosKV20, author = {George Stergiopoulos and Nick Kapetanas and Efstratios Vasilellis and Dimitris Gritzalis}, title = {Leaking supervisory controls and data acquisition commands over unpadded {TCP/IP} encryption through differential packet size analysis}, journal = {Secur. Priv.}, volume = {3}, number = {4}, year = {2020}, url = {https://doi.org/10.1002/spy2.82}, doi = {10.1002/SPY2.82}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/StergiopoulosKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KoutrasSDKGD20, author = {Dimitris Koutras and George Stergiopoulos and Thomas K. Dasaklis and Panayiotis Kotzanikolaou and Dimitris Glynos and Christos Douligeris}, title = {Security in IoMT Communications: {A} Survey}, journal = {Sensors}, volume = {20}, number = {17}, pages = {4828}, year = {2020}, url = {https://doi.org/10.3390/s20174828}, doi = {10.3390/S20174828}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KoutrasSDKGD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/NomikosPSKPK20, author = {Konstantinos Nomikos and Athanasios Papadimitriou and George Stergiopoulos and Dimitris Koutras and Mihalis Psarakis and Panayiotis Kotzanikolaou}, title = {On a Security-oriented Design Framework for Medical IoT Devices: The Hardware Security Perspective}, booktitle = {23rd Euromicro Conference on Digital System Design, {DSD} 2020, Kranj, Slovenia, August 26-28, 2020}, pages = {301--308}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSD51259.2020.00056}, doi = {10.1109/DSD51259.2020.00056}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/NomikosPSKPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/DedousisSG20, author = {Panagiotis Dedousis and George Stergiopoulos and Dimitris Gritzalis}, editor = {Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday {IT} Systems}, booktitle = {E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, {ICETE} 2020, Online Event, July 8-10, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1484}, pages = {1--23}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-90428-9\_1}, doi = {10.1007/978-3-030-90428-9\_1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/DedousisSG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/StergiopoulosLT20, author = {George Stergiopoulos and Eirini Lygerou and Nikolaos Tsalis and Dimitris Tomaras and Dimitris Gritzalis}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Avoiding Network and Host Detection using Packet Bit-masking}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {52--63}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009591500520063}, doi = {10.5220/0009591500520063}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/StergiopoulosLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/StergiopoulosCB19, author = {George Stergiopoulos and Georgia Chronopoulou and Evangelos Bitsikas and Nikolaos Tsalis and Dimitris Gritzalis}, title = {Using side channel {TCP} features for real-time detection of malware connections}, journal = {J. Comput. Secur.}, volume = {27}, number = {5}, pages = {507--520}, year = {2019}, url = {https://doi.org/10.3233/JCS-191286}, doi = {10.3233/JCS-191286}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/StergiopoulosCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/StergiopoulosVM18, author = {George Stergiopoulos and Evangelos Valvis and Dimitris Mitrodimas and Dimitrios Lekkas and Dimitris Gritzalis}, title = {Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure}, journal = {{IEEE} Access}, volume = {6}, pages = {63823--63832}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2877659}, doi = {10.1109/ACCESS.2018.2877659}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/StergiopoulosVM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/StergiopoulosGK18, author = {George Stergiopoulos and Dimitris Gritzalis and Vasilis Kouktzoglou}, title = {Using formal distributions for threat likelihood estimation in cloud-enabled {IT} risk assessment}, journal = {Comput. Networks}, volume = {134}, pages = {23--45}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.033}, doi = {10.1016/J.COMNET.2018.01.033}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/StergiopoulosGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/LykouASG18, author = {Georgia Lykou and Argiro Anagnostopoulou and George Stergiopoulos and Dimitris Gritzalis}, editor = {Eric A. M. Luiijf and Inga Zutautaite and Bernhard M. H{\"{a}}mmerli}, title = {Cybersecurity Self-assessment Tools: Evaluating the Importance for Securing Industrial Control Systems in Critical Infrastructures}, booktitle = {Critical Information Infrastructures Security - 13th International Conference, {CRITIS} 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11260}, pages = {129--142}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05849-4\_10}, doi = {10.1007/978-3-030-05849-4\_10}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/LykouASG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/StergiopoulosTB18, author = {George Stergiopoulos and Alexander Talavari and Evangelos Bitsikas and Dimitris Gritzalis}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Automatic Detection of Various Malicious Traffic Using Side Channel Features on {TCP} Packets}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {346--362}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_17}, doi = {10.1007/978-3-319-99073-6\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/StergiopoulosTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/TsalisSBGA18, author = {Nikolaos Tsalis and George Stergiopoulos and Evangelos Bitsikas and Dimitris Gritzalis and Theodore K. Apostolopoulos}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Side Channel Attacks over Encrypted {TCP/IP} Modbus Reveal Functionality Leaks}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {219--229}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006832702190229}, doi = {10.5220/0006832702190229}, timestamp = {Wed, 29 Aug 2018 15:17:20 +0200}, biburl = {https://dblp.org/rec/conf/icete/TsalisSBGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StergiopoulosKG17, author = {George Stergiopoulos and Panayiotis Katsaros and Dimitris Gritzalis}, title = {Program analysis with risk-based classification of dynamic invariants for logical error detection}, journal = {Comput. Secur.}, volume = {71}, pages = {36--50}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.02.007}, doi = {10.1016/J.COSE.2017.02.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StergiopoulosKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/StergiopoulosKT17, author = {George Stergiopoulos and Vasilis Kouktzoglou and Marianthi Theocharidou and Dimitris Gritzalis}, title = {A process-based dependency risk analysis methodology for critical infrastructures}, journal = {Int. J. Crit. Infrastructures}, volume = {13}, number = {2/3}, pages = {184--205}, year = {2017}, url = {https://doi.org/10.1504/IJCIS.2017.10009258}, doi = {10.1504/IJCIS.2017.10009258}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/StergiopoulosKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/StergiopoulosVA17, author = {George Stergiopoulos and Evangelos Valvis and Foivos Anagnou{-}Misyris and Nick Bozovic and Dimitris Gritzalis}, title = {Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {45}, number = {2}, pages = {119--124}, year = {2017}, url = {https://doi.org/10.1145/3152042.3152078}, doi = {10.1145/3152042.3152078}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmetrics/StergiopoulosVA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/LykouSPG17, author = {Georgia Lykou and George Stergiopoulos and Antonios Papachrysanthou and Dimitris Gritzalis}, editor = {Mason Rice and Sujeet Shenoi}, title = {Protecting the Transportation Sector from the Negative Impacts of Climate Change}, booktitle = {Critical Infrastructure Protection {XI} - 11th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {512}, pages = {3--21}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70395-4\_1}, doi = {10.1007/978-3-319-70395-4\_1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/LykouSPG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StergiopoulosKT16, author = {George Stergiopoulos and Panayiotis Kotzanikolaou and Marianthi Theocharidou and Georgia Lykou and Dimitris Gritzalis}, title = {Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {12}, pages = {46--60}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2015.12.002}, doi = {10.1016/J.IJCIP.2015.12.002}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/StergiopoulosKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GritzalisSKML16, author = {Dimitris Gritzalis and George Stergiopoulos and Panayiotis Kotzanikolaou and Emmanouil Magkos and Georgia Lykou}, editor = {Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas}, title = {Critical Infrastructure Protection: {A} Holistic Methodology for Greece}, booktitle = {Security of Industrial Control Systems and Cyber-Physical Systems - Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10166}, pages = {19--34}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61437-3\_2}, doi = {10.1007/978-3-319-61437-3\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GritzalisSKML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/StergiopoulosVL16, author = {George Stergiopoulos and Efstratios Vasilellis and Georgia Lykou and Panayiotis Kotzanikolaou and Dimitris Gritzalis}, editor = {Mason Rice and Sujeet Shenoi}, title = {Classification and Comparison of Critical Infrastructure Protection Tools}, booktitle = {Critical Infrastructure Protection {X} - 10th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {485}, pages = {239--255}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48737-3\_14}, doi = {10.1007/978-3-319-48737-3\_14}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/StergiopoulosVL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StergiopoulosKG16, author = {George Stergiopoulos and Panagiotis Katsaros and Dimitris Gritzalis and Theodore K. Apostolopoulos}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {28--40}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005947200280040}, doi = {10.5220/0005947200280040}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/StergiopoulosKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StergiopoulosG15, author = {George Stergiopoulos and Dimitris Gritzalis}, title = {Hacking and Penetration Testing with Low Power Devices}, journal = {Comput. Secur.}, volume = {49}, pages = {274--275}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.01.001}, doi = {10.1016/J.COSE.2015.01.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StergiopoulosG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StergiopoulosKT15, author = {George Stergiopoulos and Panayiotis Kotzanikolaou and Marianthi Theocharidou and Dimitris Gritzalis}, title = {Risk mitigation strategies for critical infrastructures based on graph centrality analysis}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {10}, pages = {34--44}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.05.003}, doi = {10.1016/J.IJCIP.2015.05.003}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/StergiopoulosKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/FailySKG15, author = {Shamal Faily and George Stergiopoulos and Vasilios Katos and Dimitris Gritzalis}, editor = {Erich Rome and Marianthi Theocharidou and Stephen D. Wolthusen}, title = {"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar}, booktitle = {Critical Information Infrastructures Security - 10th International Conference, {CRITIS} 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9578}, pages = {243--246}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-33331-1\_20}, doi = {10.1007/978-3-319-33331-1\_20}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/FailySKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/StergiopoulosTG15, author = {George Stergiopoulos and Marianthi Theocharidou and Dimitris Gritzalis}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Third International Conference, {HAS} 2015, Held as Part of {HCI} International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9190}, pages = {672--683}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20376-8\_60}, doi = {10.1007/978-3-319-20376-8\_60}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hci/StergiopoulosTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/StergiopoulosKG15, author = {George Stergiopoulos and Panagiotis Katsaros and Dimitris Gritzalis}, editor = {Mohammad S. Obaidat and Pascal Lorenz}, title = {Execution Path Classification for Vulnerability Analysis and Detection}, booktitle = {E-Business and Telecommunications - 12th International Joint Conference, {ICETE} 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {585}, pages = {293--317}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30222-5\_14}, doi = {10.1007/978-3-319-30222-5\_14}, timestamp = {Tue, 21 Mar 2023 21:02:06 +0100}, biburl = {https://dblp.org/rec/conf/icete/StergiopoulosKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/StergiopoulosTK15, author = {George Stergiopoulos and Marianthi Theocharidou and Panayiotis Kotzanikolaou and Dimitris Gritzalis}, editor = {Mason Rice and Sujeet Shenoi}, title = {Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {299--314}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_18}, doi = {10.1007/978-3-319-26567-4\_18}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/StergiopoulosTK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StergiopoulosPK15, author = {George Stergiopoulos and Panagiotis Petsanas and Panagiotis Katsaros and Dimitris Gritzalis}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {100--111}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005561101000111}, doi = {10.5220/0005561101000111}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/StergiopoulosPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StergiopoulosG14, author = {George Stergiopoulos and Dimitris Gritzalis}, title = {A Bug Hunter's Diary}, journal = {Comput. Secur.}, volume = {43}, pages = {188}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.001}, doi = {10.1016/J.COSE.2014.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StergiopoulosG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/StergiopoulosKG14, author = {George Stergiopoulos and Panagiotis Katsaros and Dimitris Gritzalis}, editor = {Javier L{\'{o}}pez and Indrajit Ray and Bruno Crispo}, title = {Automated Detection of Logical Errors in Programs}, booktitle = {Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8924}, pages = {35--51}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17127-2\_3}, doi = {10.1007/978-3-319-17127-2\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/StergiopoulosKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/GritzalisSKS14, author = {Dimitris Gritzalis and Vasilis Stavrou and Miltiadis Kandias and George Stergiopoulos}, editor = {Mohamad Badra and Omar Alfandi}, title = {Insider Threat: Enhancing {BPM} through Social Media}, booktitle = {6th International Conference on New Technologies, Mobility and Security, {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NTMS.2014.6814027}, doi = {10.1109/NTMS.2014.6814027}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/GritzalisSKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/StergiopoulosTG13, author = {George Stergiopoulos and Bill Tsoumas and Dimitris Gritzalis}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {On Business Logic Vulnerabilities Hunting: The APP{\_}LogGIC Framework}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {236--249}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_18}, doi = {10.1007/978-3-642-38631-2\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/StergiopoulosTG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StergiopoulosKG13, author = {George Stergiopoulos and Miltiadis Kandias and Dimitris Gritzalis}, editor = {Pierangela Samarati}, title = {Approaching Encryption through Complex Number Logarithms}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {574--579}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223218/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/StergiopoulosKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/StergiopoulosTG12, author = {George Stergiopoulos and Bill Tsoumas and Dimitris Gritzalis}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Hunting Application-Level Logical Errors}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {135--142}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_13}, doi = {10.1007/978-3-642-28166-2\_13}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/essos/StergiopoulosTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.