Supervision

Ph.D. Students ongoing supervision

Yagmur Yigit, "Smart Attack Detection and Mitigation for Autonomous Core Networks Using Digital Twin"  

Khayal Huseynov, "Digital Twin as a Service for Network Infrastructure Management"

Riyad Jezmawi, "Maturity Assessment Frameworks for Cloud Computing"

Ilias Spyridon Efthymiopoulos, "Mitre attack and defend model for APTs" 

Vasilis Papaspirou, "Two Factor HoneyToken Authentication"  

Irw Chatzopoulou, "Validation of a sample of elements that form an integral part of a Cybersecurity Maturity Model"

Participated in Ph.D. dissertation supervision

Nestoras Houliaras, "Design and development of an ideal educational cyber range"  

Giddeon Angafor, "A Framework for Conducting Collaborative Tabletop Incident Response Exercises"  

Mark Evans, "Methodologies for information assurance used in the public sector"

Yuanchen Xu, "An Intelligent Decision Support System for Business IT Security Strategy " 

Shaimaa Nafea, "Adaptive learning management System using Ontology"

Allan Cook, "Industrial Control System Risk management"

Raphael Riebl, "Performance tests for Vehicular Ad Hoc Networks"

Sadir Fadhil, "Context-aware overtaking assistant system"

Dennis Bohmlander " Innovative crash-sensing architectures"

Adebamigbe (Alex) Fasanmade, "Autonomous Agent Security in mobile and Wireless Network"


Participation in Ph.D. committees

Dimitrios Kosmanos, "A study on Detection and Mitigation of Denial of Service Security Attacks in Wireless Vehicular Networks", University of Thessaly, 11/2020

HAN Xiao, "Mining User Similarity in Online Social Networks:Analysis, Modeling and Applications", Telecom SudParis, 05/2015

Reza Farahbakhsh, "Profiling professional and regular users on popular Internet services based on Implementation of large scale Internet measurement tools", Telecom SudParis, 05/2015


M.Sc. Theses supervised

Andrew Thaeler, "Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis" (08/2023)

Devi Patnaik, "Machine Learning using anonymised and distributed methods" (08/2023)

Salko Korac, "Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Systems" (11/2023)

Zohaib Yaqub, PUF based lightweight and authentication scheme with VANET security and privacy requirements (11/2023)

Alexander Magkoutis, "Encryption Algorithms and Their Applications" (10/2023)

Nikhil Konduru, "Federated Deep Learning for Cybersecurity in the IoT" (09/2022)

Sai Kumar Madaram, "Malware Mitigation in Cloud Computing" (09/2022)

Metty Paul, "Digitalization of the Healthcare sector: security and privacy concerns" (09/2022)

Aleksandra Siwik, "Teacher Supply Booking System" (09/2022)

Nithish Velagala, "Secure End-to-End Encryption Chat Application" (05/2022)

Maria Papathanasaki "Authenticators: challenges and security issues" (10/2021)

Athinodoros Dousis, "Critical National Infrastructures and the NISD" (02/2021)

Vasilis Papaspirou, "Two Factor and Multi-Factor Authentication Methods" (05/0221)

George Kittes, "Cyber Ranges and Testbeds for Education, Training, and Research" (02/2021)

Lakshmi Sai Tejaswini Sarnala, "SQL injection attacks and countermeasures" (09/2020)

Santhosh Sundara Moorthy, "Cyber Security in the Banking Sector" (06/2020)

Najmudin Saqib, "The Interplay Between the NIS Directive and the GDPR", (03/2020)

Pooja Patoliya, "CIS and Cyber Security", (01/2020)

Devanshu Patel, "Social Media and other people's privacy", (06/2019)

Charnmongkol Somsup,  "A study of concerned perspective towards automated cars", (06/2019) 

Yash Soni, "Blockchain based voting system", (06/2019)

Muhammad Ahmed, "Cyber Threats in Healthcare sector", (06/2019)

Virendra Vyas, "Effectiveness of Security measures on Cloud Computing", (06/2019)

Robert Alexander, "Security analysis of smart home entry systems", (07/2016)

Jacqui Cope, "A framework for minimizing Data Leakage from non Production systems", (08/2016)

Steve Harisson, "Security Testing Framework for an HMG Agile Software Development Project", (01/2016)

Rajan Kumar, "Challenges to Cyber Security", (10/2015)

Nickolas Ayres,"The mimetic virus : A vector for Cyber terrorism", (09/2015)

Nasreen Iqbal, "Advancing HRMS with Cloud Cmputing", (08/2015)

Najlaa Almajed, "Prevention of crime in B2C E-Commerce", (06/2015)