Ph.D. Students ongoing supervision
Yagmur Yigit, "Smart Attack Detection and Mitigation for Autonomous Core Networks Using Digital Twin" (Edinburgh Napier University)
Khayal Huseynov, "Digital Twin as a Service for Network Infrastructure Management" (Edinburgh Napier University)
Riyad Jezmawi, "Maturity Assessment Frameworks for Cloud Computing" (De Montfort University)
Ilias Spyridon Efthymiopoulos, "Mitre attack and defend model for APTs" (International Hellenic University)
Vasilis Papaspirou, "Two Factor HoneyToken Authentication" (University of West Attica)
Irw Chatzopoulou, "Validation of a sample of elements that form an integral part of a Cybersecurity Maturity Model" (University of Athens)
Participated in Ph.D. dissertation supervision
Nestoras Houliaras, "Design and development of an ideal educational cyber range"
Giddeon Angafor, "A Framework for Conducting Collaborative Tabletop Incident Response Exercises"
Mark Evans, "Methodologies for information assurance used in the public sector"
Yuanchen Xu, "An Intelligent Decision Support System for Business IT Security Strategy "
Shaimaa Nafea, "Adaptive learning management System using Ontology"
Allan Cook, "Industrial Control System Risk management"
Raphael Riebl, "Performance tests for Vehicular Ad Hoc Networks"
Sadir Fadhil, "Context-aware overtaking assistant system"
Dennis Bohmlander " Innovative crash-sensing architectures"
Adebamigbe (Alex) Fasanmade, "Autonomous Agent Security in mobile and Wireless Network"
Participation in Ph.D. committees
Dimitrios Kosmanos, "A study on Detection and Mitigation of Denial of Service Security Attacks in Wireless Vehicular Networks", University of Thessaly, 11/2020
HAN Xiao, "Mining User Similarity in Online Social Networks:Analysis, Modeling and Applications", Telecom SudParis, 05/2015
Reza Farahbakhsh, "Profiling professional and regular users on popular Internet services based on Implementation of large scale Internet measurement tools", Telecom SudParis, 05/2015
M.Sc. Theses supervised
Amanda Thomson, "Utilizing TLS Fingerprint Enrichment and Similarity Mapping for the Identification of Malicious Domains" (08/2024)
Abdulaziz Gulay, "The Use of Incident Response Management Maturity Levels Snapshots to Prioritise Incidents", (08/2024)
Andrew Thaeler, "Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis" (08/2023)
Devi Patnaik, "Machine Learning using anonymised and distributed methods" (08/2023)
Salko Korac, "Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Systems" (11/2023)
Zohaib Yaqub, PUF based lightweight and authentication scheme with VANET security and privacy requirements (11/2023)
Alexander Magkoutis, "Encryption Algorithms and Their Applications" (10/2023)
Nikhil Konduru, "Federated Deep Learning for Cybersecurity in the IoT" (09/2022)
Sai Kumar Madaram, "Malware Mitigation in Cloud Computing" (09/2022)
Metty Paul, "Digitalization of the Healthcare sector: security and privacy concerns" (09/2022)
Aleksandra Siwik, "Teacher Supply Booking System" (09/2022)
Nithish Velagala, "Secure End-to-End Encryption Chat Application" (05/2022)
Maria Papathanasaki "Authenticators: challenges and security issues" (10/2021)
Athinodoros Dousis, "Critical National Infrastructures and the NISD" (02/2021)
Vasilis Papaspirou, "Two Factor and Multi-Factor Authentication Methods" (05/0221)
George Kittes, "Cyber Ranges and Testbeds for Education, Training, and Research" (02/2021)
Lakshmi Sai Tejaswini Sarnala, "SQL injection attacks and countermeasures" (09/2020)
Santhosh Sundara Moorthy, "Cyber Security in the Banking Sector" (06/2020)
Najmudin Saqib, "The Interplay Between the NIS Directive and the GDPR", (03/2020)
Pooja Patoliya, "CIS and Cyber Security", (01/2020)
Devanshu Patel, "Social Media and other people's privacy", (06/2019)
Charnmongkol Somsup, "A study of concerned perspective towards automated cars", (06/2019)
Yash Soni, "Blockchain based voting system", (06/2019)
Muhammad Ahmed, "Cyber Threats in Healthcare sector", (06/2019)
Virendra Vyas, "Effectiveness of Security measures on Cloud Computing", (06/2019)
Robert Alexander, "Security analysis of smart home entry systems", (07/2016)
Jacqui Cope, "A framework for minimizing Data Leakage from non Production systems", (08/2016)
Steve Harisson, "Security Testing Framework for an HMG Agile Software Development Project", (01/2016)
Rajan Kumar, "Challenges to Cyber Security", (10/2015)
Nickolas Ayres,"The mimetic virus : A vector for Cyber terrorism", (09/2015)
Nasreen Iqbal, "Advancing HRMS with Cloud Cmputing", (08/2015)
Najlaa Almajed, "Prevention of crime in B2C E-Commerce", (06/2015)