June 2025: DCOSS-IoT 2025 Conference
May 2025: Applications of Artificial Intelligence in Small and Medium Enterprises
October 2024: IEEE CAMAD workshop
September 2024: InnoHealth forum
May 2024: Conference on Big Data, Cybersecurity & AI
7th International Conference on Big Data, Cybersecurity & AI
Bill Buchanan gave a great talk about Cybersecurity & AI
My talk on end-to-end encryption salvation or curse??
February 2024: WA Cyber Security Showcase
Comparing the Cybersecurity Approach of Australia to the EU --- Invited by Helge Janicke, Deputy CEO and Research Director, CSCRC
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.
May 2023: Conference on Big Data, Cybersecurity and Critical Infrastructure
Critical Infrastructures Protection Current Challenges and Solutions
Around 200 participants
Is it an egg or an eye??
February 2022: Article accepted in IEEE International Conference on Computer Communications (INFOCOM 2022)
In this article we present our novel Secure Node End-2-End Encryption (SNE2EE) mechanism that is under implementation. This mechanism offers both a software and hardware solution by extending encryption technologies and techniques to the end nodes to increase privacy. The SNE2EE mechanism can address the issues concerning spyware and stalkerware at both the individual and community level.
In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.
https://www.mdpi.com/books/pdfview/book/4750
Good News ! Happy to share that I have been featured in the Stanford University's list of world Top 2% scientists again! Source
"Keeping the goods is more difficult than acquiring"
The edited book Cybersecurity Issues in Emerging Technologies offers a thorough and holistic approach to the cybersecurity issues that a variety of technologies face, which will be predominant in our lives in the near future – with some of them quickly becoming part of our everyday transactions.
The various chapters of the Book not only address specific security and privacy issues that these emerging technologies will need to cope with but also provide general approaches to the security problem from human factor issues to ways attacks are orchestrated.
July 2021: IEEE TEM BEST PAPER AWARD WINNER
We have received a notification that our article entitled: DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids has been awarded the best paper award from IEEE Transactions on Engineering Management.
December 2020: Policy document on cybersecurity adopted by IEEE
The Working Group on ICT has completed the development of the EPPC Position Statement on “Cybersecurity for a stronger and more resilient digital Europe” and of a response to the European Commission’s public consultation on the review of the NIS Directive that i was co-leading with Francisco Medeiros and Massimo Pellegrino.
November 2020: Top 2% of scientists!!
Good News ! Happy to share that I have been featured in the Stanford University's list of world Top 2% scientists !
November 05 2020: SMARTTECH Best Student Paper award
Our article that was presented in the 1st First International Conference of Smart Systems and Emerging Technologies (SMARTTECH 2020) that was organized by Prince Sultan University received the best student paper award from the conference committee.
September 2020: Best Guest Editor Award from ICT Express - Elsevier
Just received the award for the best guest editor from Elsevier ICT Express. Congratulations to all Guest Editors for the joint work: Helge Janicke, Athanasios Maglaras, Mohamed Amine FERRAG, Pavlina Fragkou, Tiago Cruz, Artemios Vogiatzis, Ki-Hyung Kim.
July 2020: Elsevier Interview "Securing a dynamic wireless charging system for electric vehicles"
In recent years, electric vehicles have become more common on our roads, due to technological improvements and a greater focus on clean energy. There are however two significant issues that inhibit their uptake, namely the limited driving range between charges and the lack of a charging infrastructure.
Elsevier has interviewed us for our recent research on RF Jamming derection on DWC systems.
Elsevier Interview
March 2020: Special Issue "Cyber Security of Critical Infrastructures"
Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cyber security of critical infrastructures has become an agenda item for academics, practitioners, and policy makers.
In this Special Issue, both research and practical aspects of cyber security considerations in critical infrastructures are of interest. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry are welcome to contribute.
https://www.mdpi.com/journal/applsci/special_issues/Cyber_Security_Critical_Infrastructures
October 2019: Greece hits the 1st place in the NCSI index
The NCSI index measures the preparedness of countries to prevent cyber threats and manage cyber incidents and is good measure of the maturity of a nation in terms of cybersecurity. During my deputy as Director of National Cyber Security Authority (from September of 2017 to November of 2019), Greece issued a Ministerial Decree that established the National Cyber Security Authority (07/2017), the National Cybersecurity strategy (03/2018), the NIS National Law (12/2018) and a Ministerial Decree (10/2019) that helped establish a cybersecurity framework for the public sector and the critical infrastructures that reside in Greece. This structured effort led to the achievement of gaining the 1st position in the prestigious NCSI index for Greece from October 2019 and onwards amongst 160 countries.
September 2019: Our Policy Paper about cyber Peacekeeping was published.
The upsurge of cyber warfare has ushered voluminous research to its characterization and conduct. Although this research is critical, it is imbued with significant gaps in the knowledge, especially pertaining to the restoration of peace and security in the aftermath. In this article, we introduce the concept of cyber peacekeeping with emphasis on protecting civilians and restoring peace post cyber warfare. This work outlines why cyber peacekeeping is essential, the opportunities and challenges it presents, and provide pointers to significantly related research articles. The article concludes with some of the key findings from the literature and suggests avenues for future research efforts.
September 2019: Our article was selected as the cover for the latest issue of MDPI Computers.
Our latest paper entitled "DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services" was selected by the editors of MDPI Computers as the cover of the forthcoming issue. In this paper, an intrusion detection system (IDS) and Blockchain-based delivery framework, entitled DeliveryCoin, is introduced. The proposed Blockchain-based delivery framework facilitates package delivery among self-driving nodes. In order to achieve privacy preservation, the proposed scheme employs hash functions and short signatures without random oracles and the strong Diffie–Hellman (SDH) assumption in bilinear groups. The article also introduces a novel UAV-aided forwarding mechanism, named pBFTF, that UAVs use in order to achieve consensus inside the Blockchain-based delivery platform. Finally, the article proposes an IDS system in each macro-eNB (5G) for detecting self-driving network attacks as well as false transactions between self-driving nodes. This is the first study that combines Blockchain technology with an IDS system into one architecturally-secure framework for a UAV-based delivery system.
June 10 2019: Secriot Best Paper award
Our article that was presented in the 1st International Workshop on Security and Reliability of IoT Systems (SecRIoT 2019) that was held in Santorini received the best paper award from the conference committee.
May 2019: Selected to serve as a member of the IEEE EPPC Working Group on ICT in 2019 and 2020
In 2014, the IEEE European Public Policy Initiative created two working groups on Energy and ICT. The ICT Working Group is comprised of leading engineers from all walks of life, including academia, industry, and former government officials. The group meets virtually on a monthly basis and in person several times a year to develop technical policy statements and other documents (e.g., white papers, responses to consultations, etc.) on a wide range of issues with the aim of informing policy makers at the technical level on key topics in the ICT realm.
https://www.ieee.org/about/ieee-europe/europe-ict.html
April 4 2019: Article accepted in IEEE International Workshop on Security and Reliability of IoT Systems
In recent years cyber attacks, especially those targeting systems that keep or process sensitive information are becoming more sophisticated. Critical National Infrastructures are main targets of cyber attacks, since essential information or services depend on their systems and their protection becomes a significant issue that is concerning both organizations and nations. Along with other preventive security mechanisms, such as access control and authentication, intrusion detection systems (IDS) are deployed as a second line of defense. This paper proposes a novel intrusion detection system (IDS) that combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm and Forest PA. The evaluation using a real traffic data set 'CICIDS2017' showed that our hierarchical model outperformed different well known and recent machine learning models.
March 29 2019: Meeting with the Director of the European Commission for Cybersecurity
We had a meeting with the Director of the European Commission for Digital Society, Trust and Cybersecurity, Ms Despina Spanou and discussed about the NIS directive, Cybersecurity competence centre, certification and our participation at Concordia pilot project.
March 22 2019: SAINT Workshop
On Friday March 22, SAINT consortium organised the second workshop that was held in the premises of the coordinator of the project, NCSR “Demokritos”, in Athens. The highly successful workshop welcomed a significant number of notable speakers and organisations initiating the dialogue about the cybersecurity status in Europe, issues and recommendations. More than 30 people attended this only-by-invitation workshop. I gave a presentation on the cybersecurity strategy that the Greek Government has implemented.
February 07 2019: OSCE sub regional training co organized by NCSA
On the 7th and 8th of February, NCSA (Ministry of Digital Policy, Telecommunications & Media - General Secretariat of Digital Policy) hosted OSCE's Sub-regional Training on the Role of information and communication technologies (ICT's) in the context of regional and international security.
Most States rely on ICTs to drive economic and social growth and to enable most critical systems. However, ICTs have also created vulnerabilities and complexity in international relations, fostering doubt, speculation, ambiguity, and tensions as States grapple with questions of intent, attribution, rules and norms.
The training on 7 – 8 February in Athens primarily focused on introducing practical measures to reduce the risks of conflict stemming from the use of ICTs by States following high threshold cyber-attacks, in particular, OSCE cyber/ICT CBMs. Further, it explored themes of national, regional and international cyber/ICT security mechanisms and developments, facilitate information exchanges between OSCE participating States and Mediterranean Partners for Co-operation and stage a practical scenario-based discussion related to a fictitious ICT incident.
January 28 2019: H2020 CONCORDIA kick-off meeting takes place in Munich
As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation Moreover the synergy between the ICS and the IoT has emerged bringing new security challenges . Modern smart societies face new challenges in the area of cyber security, and EU is struggling to strengthen Critical Infrastructures by publishing new directives and regulations.
CONCORDIA (2019-2022 H2020 project) positions the CONCORDIA ecosystem, a Cybersecurity Competence Network with leading research, technology, industrial and public competences to build the European Secure, Resilient and Trusted Ecosystem, with the CODE research institute in Munich to act as the coordinating center.
National Cyber Security Authority (NCSA) of Greece is a member of the project, contributing to the CONCORDIA project by providing advice and expertise on the legislation behind EU and National policies related to security and privacy
December 5 2018: Article accepted in Elsevier Government Information Quarterly Journal
Cyber peacekeeping is an emerging and multidisciplinary field of research, touching upon technical, political, governmental and societal domains of thought. In this article we build upon previous works by developing the cyber peacekeeping activity of observation, monitoring and reporting. We take a practical approach: describing a scenario in which two governments request UN support in drawing up and overseeing a ceasefire which includes cyber terms. We explore how a cyber peacekeeping operation could start up and discuss the challenges it will face. The article makes a number of proposals, including the use of a virtual collaborative environment to bring multiple benefits. We conclude by summarising our findings, and describing where further work lies.
December 3 2018: NIS National Greek Law is issued
NIS National Law has been approved by the Greek Parliament on the 21st of November. On the 3rd of December the Official Goverment Gazzete issue (ΦΕΚ 199/Α/3-12-2018) that includes the National Law was published. The Law designates the competent authorities that will be responsible for the implementation of the NIS law in Greece. The National Cyber Security Authority that is established in the Ministry of Digital Policy, Telecommunications and Media/General Secretariat of Digital Policy and the CSIRT that is established in the Cyber Defence Directorate in the Ministry of Defence.
https://bit.ly/2QAJCbD
November 19 2018: Article accepted in IEEE Internet of Things (IoT) Journal
This article presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we provide an overview of the application domains of blockchain technologies in IoT, e.g, Internet of Vehicles, Internet of Energy, Internet of Cloud, \uline{Edge computing}, etc. Moreover, we provide a classification of threat models, which are considered by blockchain protocols in IoT networks, into five main categories, namely, identity-based attacks, manipulation-based attacks, cryptanalytic attacks, reputation-based attacks, and service-based attacks. In addition, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods towards secure and privacy-preserving blockchain technologies with respect to the blockchain model, specific security goals, performance, limitations, computation complexity, and communication overhead. Based on the current survey, we highlight open research challenges and discuss possible future research directions in the blockchain technologies for IoT.
https://ieeexplore.ieee.org/document/8543246
October 17 2018: Article published in EAI Transactions on Security and Safety
As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation. Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace. In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are classified according to legal, technical, organizational, capacity building, and cooperation aspects. Finally we provide an overview of current methods and practices regarding cyber attribution and cyber peace keeping.
October 15 2018: 15th Issue of EAI Endorsed Transactions on Security and Safety published
Happy to announce that the 15th issue of our journal, EAI Endorsed Transactions on Security and Safety has just been published. Dealing with hot areas of research, such as kernel-level intrusion detection and prevention frameworks, predictive risk models, multi-connection encryption algorithms, Cryptoprocessors and software based keyloggers, this issue constitutes a very good collection of selected articles. You are all welcome to submit highly quality work to our journal. Articles can be found here: http://eudl.eu/issue/sesa/5/15
October 11 2018: ICSIMAT program published - Track co-chairing on 18/10/2018.
The program for ICSIMAT is finalzed. I am co-chairing, along with Professor Patrikakis, the track "Information and Internet of Things to Marketing, Management and Tourism - Cyber Security of Critical Infrastructures and Data Protection" on Thursday the 18th of October. The track has 10 articles that cover several ICT aspects related to the topics of the conference.
http://icsimat.com/wp-content/uploads/2018/10/PROGRAMME-ICSIMAT-WITH-SOCIAL-ACTIVITIES-AND-EXCURSIONS-3-logo.pdf
October 2 2018: Opening panel at CS4CA
I participated at the opening panel of CS4CA Europe that took place at London, with Paul Timmers, Marc Henauer and Alex Campbell. Main topic was the reviewing of the European posture towards CyberSecuring its critical infrastructure. We tried to answer the main question which was "Are we doing enough?" giving both a Strategic\Governmental and Research perspective.
September 28 2018: Article accepted in IEEE International Conference on Smart Communications in Network Technologies (SACONET’18)
The article entilted "Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges " is accepted for oral presentation during (SACONET’18). In this article , we provide major attacks and threats and, through extensive research and analysis, we are able to classify privacy-preserving models for fog-based IoT applications.
September 24 2018: Keynote speech at NIS Summer School co-organized by ENISA and FORTH
In this talk, entitled "Cyber security: From Regulations\Policies to Practice", I presented the current posture regarding EU regulations and policies that may be used to tackle cyber attacks to CNIs along with practical measures that need to be taken in order for these regulations to be effective. Attribution of cyber attacks, especially when these originate from another nation, is questionable regarding which country or law enforcement agency has the authority to investigate and prosecute the penetrators.