default search action
Vasilios Katos
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Rajiv Shah, Deniz Cemiloglu, Cagatay Yucel, Raian Ali, Vasilis Katos:
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices. Int. J. Inf. Sec. 23(3): 1913-1926 (2024) - [j52]Alexandros Zacharis, Vasilios Katos, Constantinos Patsakis:
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle. Int. J. Inf. Sec. 23(4): 2691-2710 (2024) - [c58]Rabab Ali Abumalloh, Selin Gurgun, Muaadh Noman, Keith Phalp, Osama Halabi, Vasilis Katos, Raian Ali:
Empathy vs Reluctance to Challenge Misinformation: The Mediating Role of Relationship Costs, Perspective Taking, and Need for Cognition. RCIS (1) 2024: 376-392 - 2023
- [j51]Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer, Vasilis Katos:
Investigating IPTV Malware in the Wild. Future Internet 15(10): 325 (2023) - [j50]Ge Zheng, Wei Koong Chai, Jing-Lin Duanmu, Vasilis Katos:
Hybrid deep learning models for traffic prediction in large-scale road networks. Inf. Fusion 92: 93-114 (2023) - [j49]Ge Zheng, Wei Koong Chai, Jiankang Zhang, Vasilis Katos:
VDGCNeT: A novel network-wide Virtual Dynamic Graph Convolution Neural network and Transformer-based traffic prediction model. Knowl. Based Syst. 275: 110676 (2023) - [c57]Alexandros Papanikolaou, Christos Ilioudis, Vasilis Katos:
Introducing responsibly self-healing into the incident management lifecycle. PETRA 2023: 335-337 - [c56]Alexandros Papanikolaou, Christos Ilioudis, Vasilis Katos:
Cyber-pi: Intelligent cyberthreat detection and supervised response. RCIS (Research Projects) 2023 - [i5]Ioannis Nasios, Konstantinos Vogklis, Avleen Malhi, Anastasia Vayona, Panos Chatziadam, Vasilis Katos:
Citizen participation: crowd-sensed sustainable indoor location services. CoRR abs/2310.16496 (2023) - 2022
- [j48]Jensen Deutrom, Vasilis Katos, Raian Ali:
Loneliness, life satisfaction, problematic internet use and security behaviours: re-examining the relationships when working from home during COVID-19. Behav. Inf. Technol. 41(14): 3161-3175 (2022) - [j47]Paul-David Jarvis, Amalia Damianou, Cosmin Ciobanu, Vasilis Katos:
Vulnerability Exposure Driven Intelligence in Smart, Circular Cities. DTRAP 3(4): 40:1-40:18 (2022) - [j46]Ge Zheng, Wei Koong Chai, Vasilis Katos:
A dynamic spatial-temporal deep learning framework for traffic speed prediction on large-scale road networks. Expert Syst. Appl. 195: 116585 (2022) - [c55]Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilios Katos, Stefanos Vrochidis, Ioannis Kompatsiaris:
Web Bot Detection Evasion Using Deep Reinforcement Learning. ARES 2022: 15:1-15:10 - 2021
- [j45]Fran Casino, Nikolaos Lykousas, Vasilios Katos, Constantinos Patsakis:
Unearthing malicious campaigns and actors from the blockchain DNS ecosystem. Comput. Commun. 179: 217-230 (2021) - [j44]Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Ioannis Kompatsiaris:
Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics. DTRAP 2(3): 24:1-24:26 (2021) - [j43]Theodoros Apostolopoulos, Vasilios Katos, Kim-Kwang Raymond Choo, Constantinos Patsakis:
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks. Future Gener. Comput. Syst. 116: 393-405 (2021) - [j42]Ge Zheng, Wei Koong Chai, Vasilis Katos, Michael Walton:
A joint temporal-spatial ensemble model for short-term traffic prediction. Neurocomputing 457: 26-39 (2021) - [j41]George Hatzivasilis, Othonas Soultatos, Panos Chatziadam, Konstantinos Fysarakis, Ioannis G. Askoxylakis, Sotiris Ioannidis, George Alexandris, Vasilios Katos, George Spanoudakis:
WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device. IEEE Trans. Sustain. Comput. 6(1): 4-18 (2021) - [c54]Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Ioannis Kompatsiaris:
Web Bot Detection Evasion Using Generative Adversarial Networks. CSR 2021: 115-120 - [c53]Amalia Damianou, M. Amir Khan, Constantinos Marios Angelopoulos, Vasilios Katos:
Threat Modelling of IoT Systems Using Distributed Ledger Technologies and IOTA. DCOSS 2021: 404-413 - [c52]Dimitrios Mallis, Constantinos Marios Angelopoulos, Vasilios Katos, Konstantinos Vogklis:
ISUMS: Indoor Space Usage Monitoring System for Sustainable Built Environment Using LoRaWAN. DCOSS 2021: 473-482 - [c51]Abigael Okikijesu Bada, Amalia Damianou, Constantinos Marios Angelopoulos, Vasilios Katos:
Towards a Green Blockchain: A Review of Consensus Mechanisms and their Energy Consumption. DCOSS 2021: 503-511 - [c50]Sophia McCall, Cagatay Yucel, Vasilios Katos:
Education in Cyber Physical Systems Security: The Case of Connected Autonomous Vehicles. EDUCON 2021: 1379-1385 - [c49]Ge Zheng, Wei Koong Chai, Vasilis Katos:
The Sequence-to-Sequence Architecture with An Embedded Module for Long-Term Traffic Speed Forecasting with Missing Data. ICAC 2021: 1-6 - 2020
- [j40]Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos:
Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS. IEEE Access 8: 118559-118571 (2020) - [j39]Constantinos Patsakis, Fran Casino, Vasilios Katos:
Encrypted and covert DNS queries for botnets: Challenges and countermeasures. Comput. Secur. 88 (2020) - [j38]Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis, Vasilios Katos:
Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem. Comput. 9(1): 18 (2020) - [j37]Mohammed Al Qurashi, Constantinos Marios Angelopoulos, Vasilios Katos:
An architecture for resilient intrusion detection in ad-hoc networks. J. Inf. Secur. Appl. 53: 102530 (2020) - [j36]George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, George Spanoudakis, Vasilios Katos, Giorgos Demetriou:
MobileTrust: Secure Knowledge Integration in VANETs. ACM Trans. Cyber Phys. Syst. 4(3): 33:1-33:25 (2020) - [j35]Ioannis Tsimperidis, Paul D. Yoo, Kamal Taha, Alexios Mylonas, Vasilis Katos:
R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification. IEEE Trans. Cybern. 50(2): 525-535 (2020) - [j34]Andreas I. Miaoudakis, Konstantinos Fysarakis, Nikolaos E. Petroulakis, Sofia Alexaki, George Alexandirs, Sotiris Ioannidis, George Spanoudakis, Vasilis Katos, Christos V. Verikoukis:
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets? IEEE Veh. Technol. Mag. 15(3): 20-31 (2020) - [c48]Vasiliki Danilatou, Despoina Antonakaki, Christos Tzagkarakis, Alexandros Kanterakis, Vasilios Katos, Theodoros Kostoulas:
Automated Mortality Prediction in Critically-ill Patients with Thrombosis using Machine Learning. BIBE 2020: 247-254 - [c47]Mohammed Al Qurashi, Constantinos Marios Angelopoulos, Vasilios Katos:
An Architecture for Resilient Intrusion Detection in IoT Networks. ICC 2020: 1-7 - [c46]Shahin Rostami, Agnieszka Kleszcz, Daniel Dimanov, Vasilios Katos:
A Machine Learning Approach to Dataset Imputation for Software Vulnerabilities. MCSS 2020: 25-36 - [c45]Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Evangelos Karagiannis, Deniz Cetinkaya, Vasilios Katos:
On the Assessment of Completeness and Timeliness of Actionable Cyber Threat Intelligence Artefacts. MCSS 2020: 51-66 - [i4]Constantinos Marios Angelopoulos, Amalia Damianou, Vasilios Katos:
DHP Framework: Digital Health Passports Using Blockchain - Use case on international tourism during the COVID-19 pandemic. CoRR abs/2005.08922 (2020)
2010 – 2019
- 2019
- [j33]Marcus Walshe, Gregory Epiphaniou, Haider M. Al-Khateeb, Mohammad Hammoudeh, Vasilios Katos, Ali Dehghantanha:
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks 95 (2019) - [j32]Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios A. Baltatzis, George Pangalos:
Improving Forensic Triage Efficiency through Cyber Threat Intelligence. Future Internet 11(7): 162 (2019) - [j31]Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios A. Baltatzis, George J. Pangalos:
Actionable threat intelligence for digital forensics readiness. Inf. Comput. Secur. 27(2): 273-291 (2019) - [j30]Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis, Vasilios Katos:
A framework for designing cloud forensic-enabled services (CFeS). Requir. Eng. 24(3): 403-430 (2019) - [j29]Anastasios Valkanis, Athanasios C. Iossifides, Periklis Chatzimisios, Marios Angelopoulos, Vasilis Katos:
IEEE 802.11ax Spatial Reuse Improvement: An Interference-Based Channel-Access Algorithm. IEEE Veh. Technol. Mag. 14(2): 78-84 (2019) - [c44]Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Yiannis Kompatsiaris:
Towards a framework for detecting advanced Web bots. ARES 2019: 18:1-18:10 - [c43]Constantinos Marios Angelopoulos, Vasilios Katos, Theodoros Kostoulas, Andreas I. Miaoudakis, Nikolaos E. Petroulakis, George Alexandris, Giorgos Demetriou, Giuditta Morandi, Urszula Rak, Karolina Waledzik, Marios Panayiotou, Christos Iraklis Tsatsoulis:
IDEAL-CITIES - A Trustworthy and Sustainable Framework for Circular Smart Cities. DCOSS 2019: 443-450 - [c42]Amalia Damianou, Constantinos Marios Angelopoulos, Vasilis Katos:
An Architecture for Blockchain over Edge-enabled IoT for Smart Circular Cities. DCOSS 2019: 465-472 - [c41]Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis, Vasilis Katos:
A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services. e-Democracy 2019: 161-177 - [c40]Mohammad Heydari, Alexios Mylonas, Vasilis Katos, Emili Balaguer-Ballester, Amna Altaf, Vahid Heydari Fami Tafreshi:
Uncertainty-Aware Authentication Model for IoT. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 224-237 - [c39]Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
Uncertainty-Aware Authentication Model for Fog Computing in IoT. FMEC 2019: 52-59 - [c38]Ge Zheng, Wei Koong Chai, Vasilis Katos:
An Ensemble Model for Short-Term Traffic Prediction in Smart City Transportation System. GLOBECOM 2019: 1-6 - [c37]Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
A Location-Aware Authentication Model to Handle Uncertainty in IoT. IoTSMS 2019: 43-50 - [p1]Mohammad Heydari, Alexios Mylonas, Vasileios Katos, Dimitris Gritzalis:
Towards Indeterminacy-Tolerant Access Control in IoT. Handbook of Big Data and IoT Security 2019: 53-71 - [i3]Constantinos Marios Angelopoulos, Vasilios Katos, Theodoros Kostoulas, Andreas I. Miaoudakis, Nikolaos E. Petroulakis, George Alexandris, Giorgos Demetriou, Giuditta Morandi, Karolina Waledzik, Urszula Rak, Marios Panayiotou, Christos Iraklis Tsatsoulis:
IDEAL-CITIES: A Trustworthy and Sustainable Framework for Circular Smart Cities. CoRR abs/1907.11042 (2019) - [i2]Constantinos Patsakis, Fran Casino, Vasilios Katos:
Encrypted and Covert DNS Queries for Botnets: Challenges and Countermeasures. CoRR abs/1909.07099 (2019) - [i1]Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos:
Unravelling Ariadne's Thread: Exploring the Threats of Decentalised DNS. CoRR abs/1912.03552 (2019) - 2018
- [j28]Antonia Nisioti, Alexios Mylonas, Paul D. Yoo, Vasilios Katos:
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods. IEEE Commun. Surv. Tutorials 20(4): 3369-3388 (2018) - [c36]Sofia Alexaki, George Alexandris, Vasilis Katos, Nikolaos E. Petroulakis:
Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions. CAMAD 2018: 1-6 - [c35]George Alexandris, Vasilis Katos, Sofia Alexaki, George Hatzivasilis:
Blockchains as Enablers for Auditing Cooperative Circular Economy Networks. CAMAD 2018: 1-7 - 2017
- [j27]Nikolaos Tsalis, Alexios Mylonas, Antonia Nisioti, Dimitris Gritzalis, Vasilios Katos:
Exploring the protection of private browsing in desktop browsers. Comput. Secur. 67: 181-197 (2017) - [j26]Sofia-Anna Menesidou, Vasilios Katos, Georgios Kambourakis:
Cryptographic Key Management in Delay Tolerant Networks: A Survey. Future Internet 9(3): 26 (2017) - [j25]Ioannis Tsimperidis, Shahin Rostami, Vasilios Katos:
Age Detection Through Keystroke Dynamics from User Authentication Failures. Int. J. Digit. Crime Forensics 9(1): 1-16 (2017) - [j24]Sofia-Anna Menesidou, Vasilios Katos:
Opportunistic key management in delay tolerant networks. Int. J. Inf. Comput. Secur. 9(3): 212-228 (2017) - [c34]Jodie Ward, Huseyin Dogan, Edward Apeh, Alexios Mylonas, Vasilios Katos:
Using Human Factor Approaches to an Organisation's Bring Your Own Device Scheme. HCI (22) 2017: 396-413 - [c33]Antonia Nisioti, Alexios Mylonas, Vasilios Katos, Paul D. Yoo, Anargyros Chryssanthou:
You can run but you cannot hide from memory: Extracting IM evidence of Android apps. ISCC 2017: 457-464 - [c32]Antonia Nisioti, Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Vahid Heydari Fami Tafreshi:
TRAWL: Protection against rogue sites for the masses. RCIS 2017: 120-127 - [c31]Theodora Tsikrika, Babak Akhgar, Vasilis Katos, Stefanos Vrochidis, Pete Burnap, Matthew L. Williams:
1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web. WSDM 2017: 823-824 - [e2]Markos Zampoglou, Stefanos Vrochidis, Anderson Rocha, Vasilis Katos:
Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, MFSec@ICMR 2017, Bucharest, Romania, June 6, 2017. ACM 2017, ISBN 978-1-4503-5034-1 [contents] - 2016
- [j23]Sofia-Anna Menesidou, Dimitrios Vardalis, Vasilios Katos:
Automated key exchange protocol evaluation in delay tolerant networks. Comput. Secur. 59: 1-8 (2016) - [j22]Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos:
Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment. Inf. Comput. Secur. 24(1): 2-19 (2016) - [c30]Shamal Faily, Georgia Lykou, Anton Partridge, Dimitris Gritzalis, Alexios Mylonas, Vasilios Katos:
Human-Centered Specification Exemplars for Critical Infrastructure Environments. BCS HCI 2016 - [c29]Antonios Dimitriadis, Pavlos S. Efraimidis, Vasilios Katos:
Malevolent app pairs: an Android permission overpassing scheme. Conf. Computing Frontiers 2016: 431-436 - [c28]Konstantinos Fysarakis, Ioannis G. Askoxylakis, Othonas Soultatos, Ioannis Papaefstathiou, Charalampos Manifavas, Vasilios Katos:
Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application. GLOBECOM 2016: 1-7 - [c27]Nitin Naik, Paul Jenkins, Nick Savage, Vasilios Katos:
Big data security analysis approach using Computational Intelligence techniques in R for desktop users. SSCI 2016: 1-8 - 2015
- [j21]Ioannis Tsimperidis, Vasilios Katos, Nathan L. Clarke:
Language-independent gender identification through keystroke analysis. Inf. Comput. Secur. 23(3): 286-301 (2015) - [j20]Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos, Lilian Mitrou:
Reengineering the user: privacy concerns about personal data on smartphones. Inf. Comput. Secur. 23(4): 394-405 (2015) - [j19]Ioannis Psaroudakis, Vasilios Katos, Pavlos S. Efraimidis:
A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network. Secur. Commun. Networks 8(3): 486-500 (2015) - [c26]Raian Ali, John McAlaney, Shamal Faily, Keith Phalp, Vasilios Katos:
Mitigating Circumstances in Cybercrime: A Position Paper. CIT/IUCC/DASC/PICom 2015: 1972-1976 - [c25]Shamal Faily, George Stergiopoulos, Vasilios Katos, Dimitris Gritzalis:
"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar. CRITIS 2015: 243-246 - 2014
- [j18]Ioannis Psaroudakis, Vasilios Katos, Panagiotis Saragiotis, Lilian Mitrou:
A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol. Int. J. Electron. Secur. Digit. Forensics 6(4): 241-267 (2014) - [c24]Moufida Sadok, Vasilios Katos, Peter M. Bednar:
Developing contextual understanding of information security risks. HAISA 2014: 1-10 - [c23]Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos:
Reengineering the user: Privacy concerns about personal data on smartphones. HAISA 2014: 80-89 - 2013
- [j17]Stavros N. Shiaeles, Anargyros Chryssanthou, Vasilios Katos:
On-scene triage open source forensic tool chests: Are they effective? Digit. Investig. 10(2): 99-115 (2013) - [j16]Athina Provataki, Vasilios Katos:
Differential malware forensics. Digit. Investig. 10(4): 311-322 (2013) - [j15]Konstantia Barmpatsalou, Dimitrios Damopoulos, Georgios Kambourakis, Vasilios Katos:
A critical review of 7 years of Mobile Device Forensics. Digit. Investig. 10(4): 323-349 (2013) - [j14]Vasilios Katos, Frank Stowell, Peter M. Bednar:
Macroeconomics of Privacy and Security for Identity Management and Surveillance. Kybernetes 42(1): 140-163 (2013) - [c22]Ioannis Tsimperidis, Vasilios Katos:
Keystroke forensics: are you typing on a desktop or a laptop? BCI 2013: 89-94 - [c21]Dimitris Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, Panajotis Katsaros, Anakreon Mentis:
The Sphinx enigma in critical VoIP infrastructures: Human or botnet? IISA 2013: 1-6 - [e1]Steven Furnell, Nathan L. Clarke, Vasilios Katos:
European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 8-10, 2013. Proceedings. Plymouth University 2013, ISBN 978-1-84102-345-8 [contents] - 2012
- [j13]Stavros N. Shiaeles, Vasilios Katos, Alexandros S. Karakos, Basil K. Papadopoulos:
Real time DDoS detection using fuzzy estimators. Comput. Secur. 31(6): 782-790 (2012) - [j12]Stavroula Karayianni, Vasilios Katos, Christos K. Georgiadis:
A framework for password harvesting from volatile memory. Int. J. Electron. Secur. Digit. Forensics 4(2/3): 154-163 (2012) - [j11]Vasilios Katos:
An integrated model for online transactions: illuminating the black box. Inf. Manag. Comput. Secur. 20(3): 184-206 (2012) - [c20]Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos:
User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges. HAISA 2012: 139-149 - [c19]Alexandra Maria Varka, Vasilios Katos:
On the user acceptance of graphical passwords. HAISA 2012: 150-159 - [c18]Sofia-Anna Menesidou, Vasilios Katos:
Authenticated Key Exchange (AKE) in Delay Tolerant Networks. SEC 2012: 49-60 - [c17]Ioannis Psaroudakis, Vasilios Katos, Pavlos S. Efraimidis:
A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network. SEC 2012: 543-548 - [c16]Anargyros Chryssanthou, Vasilios Katos:
Assessing forensic readiness. WDFIA 2012: 107-118 - [c15]Nathan L. Clarke, Vasilios Katos, Sofia-Anna Menesidou, Bogdan V. Ghita, Steven Furnell:
A Novel Security Architecture for a Space-Data DTN. WWIC 2012: 342-349 - 2011
- [j10]Theodoros Spyridopoulos, Vasilios Katos:
Requirements for a Forensically Ready Cloud Storage Service. Int. J. Digit. Crime Forensics 3(3): 19-36 (2011) - [c14]Vasilios Katos, Dimitris Vrakas, Panagiotis Katsaros:
A Framework for Access Control with Inference Constraints. COMPSAC 2011: 289-297 - [c13]Stavroula Karayianni, Vasilios Katos:
Practical Password Harvesting from Volatile Memory. ICGS3/e-Democracy 2011: 17-22 - [c12]Theodoros Spyridopoulos, Vasilios Katos:
Towards a forensically ready cloud storage service. WDFIA 2011: 93-107 - 2010
- [j9]Theodoros Kavallaris, Vasilios Katos:
On the detection of pod slurping attacks. Comput. Secur. 29(6): 680-685 (2010) - [c11]Vasilios Katos, Frank Stowell, Peter M. Bednar:
Surveillance, Privacy and the Law of Requisite Variety. DPM/SETOP 2010: 123-139
2000 – 2009
- 2009
- [j8]Vasilios Katos, Frank Stowell, Peter M. Bednar:
From Synergy to Symbiosis: New Directions in Security and Privacy? Int. J. Inf. Technol. Syst. Approach 2(2): 1-14 (2009) - [c10]Aimilia Tasidou, Pavlos S. Efraimidis, Vasilios Katos:
Economics of Personal Data Management: Fair Personal Information Trades. e-Democracy 2009: 151-160 - [c9]Georgios J. Pangalos, Vasilios Katos:
Information Assurance and Forensic Readiness. e-Democracy 2009: 181-188 - [c8]Peter M. Bednar, Vasilios Katos:
Addressing The Human Factor In Information Systems Security. MCIS 2009: 72 - [c7]Theodoros Kavallaris, Vasilios Katos:
Detecting Data Leakage from Pod Slurping Based Attacks on a Windows XP Platform. WDFIA 2009: 1-8 - [c6]Peter M. Bednar, Vasilios Katos:
Diversity Networks in Digital Investigations. WDFIA 2009: 63-71 - 2008
- [j7]Vasilios Katos, Peter M. Bednar:
A cyber-crime investigation framework. Comput. Stand. Interfaces 30(4): 223-228 (2008) - [j6]Peter M. Bednar, Christine E. Welch, Vasilios Katos:
Innovation management through the use of diversity networks. Int. J. Knowl. Learn. 4(4): 357-369 (2008) - [j5]Vasilios Katos, Ahmed Patel:
A partial equilibrium view on security and privacy. Inf. Manag. Comput. Secur. 16(1): 74-83 (2008) - [c5]James S. Briggs, Vasilios Katos, Azzri Bhaludin:
On the Security Controls of Portable Computing Devices in Healthcare Environments. INC 2008: 161-170 - 2007
- [j4]Vasilios Katos, Bernard S. Doherty:
Exploring confusion in product ciphers through regression analysis. Inf. Sci. 177(8): 1789-1795 (2007) - [j3]Vasilios Katos:
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. Inf. Sci. 177(15): 3060-3073 (2007) - [c4]Peter M. Bednar, Vasilios Katos, Christine E. Welch:
Systems Analysis: Exploring the Spectrum of Diversity. ECIS 2007: 647-657 - [c3]Clare Wilson, Vasilios Katos, Caroline Strevens:
An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education. World Conference on Information Security Education 2007: 65-71 - 2005
- [j2]Vasilios Katos:
A randomness test for block ciphers. Appl. Math. Comput. 162(1): 29-35 (2005) - [j1]Vasilios Katos, Carl Adams:
Modelling corporate wireless security and privacy. J. Strateg. Inf. Syst. 14(3): 307-321 (2005) - [c2]Carl Adams, Vasilios Katos:
Privacy Challenges for Location Aware Technologies. MOBIS 2005: 303-310 - 2004
- [c1]Vasilios Katos:
Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. WOSIS 2004: 79-87
1990 – 1999
- 1999
- [b1]Vasilios Katos:
Product cipher negotiation with on-line evaluation for private communication over computer networks. Aston University, Birmingham, UK, 1999
Coauthor Index
aka: Marios Angelopoulos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint