default search action
Vasileios Gkioulos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Samson O. Oruma, Ricardo Colomo Palacios, Vasileios Gkioulos:
Architectural views for social robots in public spaces: business, system, and security strategies. Int. J. Inf. Sec. 24(1): 12 (2025) - 2024
- [j31]Jessica B. Heluany, Vasileios Gkioulos:
A review on digital twins for power generation and distribution. Int. J. Inf. Sec. 23(2): 1171-1195 (2024) - [j30]Aybars Oruc, Nabin Chowdhury, Vasileios Gkioulos:
A modular cyber security training programme for the maritime domain. Int. J. Inf. Sec. 23(2): 1477-1512 (2024) - [j29]Ivar Moen, Aybars Oruc, Ahmed Amro, Vasileios Gkioulos, Georgios Kavallieratos:
Survey-based analysis of cybersecurity awareness of Turkish seafarers. Int. J. Inf. Sec. 23(5): 3153-3178 (2024) - [c30]Markus Wurzenberger, Stephan Krenn, Max Landauer, Florian Skopik, Cora Perner, Jarno Lötjönen, Jani Päijänen, Georgios Gardikis, Nikos Alabasis, Liisa Sakerman, Kristiina Omri, Juha Röning, Kimmo Halunen, Vincent Thouvenot, Martin Weise, Andreas Rauber, Vasileios Gkioulos, Sokratis K. Katsikas, Luigi Sabetta, Jacopo Bonato, Rocío Ortíz, Daniel Navarro, Nikolaos Stamatelatos, Ioannis Avdoulas, Rudolf Mayer, Andreas Ekelhart, Ioannis Giannoulakis, Emmanouil Kafetzakis, Antonello Corsi, Ulrike Lechner, Corinna Schmitt:
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence. ARES 2024: 69:1-69:11 - [c29]Jessica B. Heluany, Johannes Götzfried, Bernhard Mehlig, Vasileios Gkioulos:
Vulnerability management digital twin for energy systems. ARES 2024: 102:1-102:11 - [c28]Xhesika Ramaj, Mary Sánchez-Gordón, Ricardo Colomo Palacios, Vasileios Gkioulos:
Training and Security Awareness Under the Lens of Practitioners: A DevSecOps Perspective Towards Risk Management. HCI (46) 2024: 84-97 - [c27]Jessica B. Heluany, Ahmed Amro, Vasileios Gkioulos, Sokratis K. Katsikas:
Interplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancements. EnCyCriS/SVM 2024: 20-28 - [c26]Xhesika Ramaj, Mary Sánchez-Gordón, Vasileios Gkioulos, Ricardo Colomo Palacios:
On DevSecOps and Risk Management in Critical Infrastructures: Practitioners' Insights on Needs and Goals. EnCyCriS/SVM 2024: 45-52 - 2023
- [j28]Vyron Kampourakis, Vasileios Gkioulos, Sokratis K. Katsikas:
A systematic literature review on wireless security testbeds in the cyber-physical realm. Comput. Secur. 133: 103383 (2023) - [j27]Sunil Chaudhary, Vasileios Gkioulos, Sokratis K. Katsikas:
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises. Comput. Sci. Rev. 50: 100592 (2023) - [j26]Ahmed Amro, Vasileios Gkioulos:
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth. Int. J. Inf. Sec. 22(1): 249-288 (2023) - [j25]Nabin Chowdhury, Vasileios Gkioulos:
A personalized learning theory-based cyber-security training exercise. Int. J. Inf. Sec. 22(6): 1531-1546 (2023) - [j24]Ahmed Amro, Vasileios Gkioulos, Sokratis K. Katsikas:
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework. ACM Trans. Priv. Secur. 26(2): 22:1-22:33 (2023) - [c25]Jessica B. Heluany, Vasileios Gkioulos:
Survey on Digital Twins: from concepts to applications. ARES 2023: 119:1-119:8 - [c24]Susanne Barkhald Sandberg, Aida Akbarzadeh, Vasileios Gkioulos:
Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain. ESORICS Workshops (1) 2023: 5-24 - [c23]Xhesika Ramaj, Ricardo Colomo Palacios, Mary Sánchez-Gordón, Vasileios Gkioulos:
Towards a DevSecOps-Enabled Framework for Risk Management of Critical Infrastructures. EuroSPI (1) 2023: 47-58 - [c22]Aida Akbarzadeh, Sabarathinam Chockalingam, Xhesika Ramaj, Lama Amro, Mary Sánchez-Gordón, Vasileios Gkioulos, Ricardo Colomo Palacios, László Erdodi, Nathan Lau, Siv Hilde Houmb:
Workshop on Cybersecurity of Critical Infrastructures. Privacy and Identity Management 2023: 325-339 - 2022
- [j23]Nabin Chowdhury, Sokratis K. Katsikas, Vasileios Gkioulos:
Modeling effective cybersecurity training frameworks: A delphi method-based study. Comput. Secur. 113: 102551 (2022) - [j22]Samson O. Oruma, Mary Sánchez-Gordón, Ricardo Colomo Palacios, Vasileios Gkioulos, Joakim K. Hansen:
A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack Surface. Comput. 11(12): 181 (2022) - [j21]Sunil Chaudhary, Vasileios Gkioulos, Sokratis K. Katsikas:
Developing metrics to assess the effectiveness of cybersecurity awareness program. J. Cybersecur. 8(1) (2022) - [j20]Ahmed Amro, Aybars Oruc, Vasileios Gkioulos, Sokratis K. Katsikas:
Navigation Data Anomaly Analysis and Detection. Inf. 13(3): 104 (2022) - [j19]Aybars Oruc, Ahmed Amro, Vasileios Gkioulos:
Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework. Sensors 22(22): 8745 (2022) - [c21]Sunil Chaudhary, Marko Kompara, Sebastian Pape, Vasileios Gkioulos:
Properties for Cybersecurity Awareness Posters' Design and Quality Assessment. ARES 2022: 79:1-79:8 - [c20]Sunil Chaudhary, Vasileios Gkioulos:
Building a Cybersecurity Awareness Program: Present and Prospective Aspects. CyberSec4Europe 2022: 149-160 - [c19]Sunil Chaudhary, Vasileios Gkioulos, David Goodman:
Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness Resources. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 97-115 - [c18]Nabin Chowdhury, Vasileios Gkioulos:
A Framework for Developing Tabletop Cybersecurity Exercises. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 116-133 - [c17]Ahmed Amro, Vasileios Gkioulos:
From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks. ESORICS (3) 2022: 535-553 - 2021
- [j18]Nabin Chowdhury, Vasileios Gkioulos:
Cyber security training for critical infrastructure protection: A literature review. Comput. Sci. Rev. 40: 100361 (2021) - [j17]Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, Christos Dalamagkas, Yannis Spyridis, Thomas Lagkas, Georgios Efstathopoulos, Achilleas Sesis, Ignacio Labrador Pavón, Rubén Trapero Burgos, Rodrigo Diaz Rodriguez, Antonios Sarigiannidis, Dimitrios Papamartzivanos, Sofia-Anna Menesidou, Giannis Ledakis, Achilleas Pasias, Thanasis Kotsiopoulos, Anastasios Drosou, Orestis Mavropoulos, Alba Colet-Subirachs, Pol Paradell Sola, José Luis Domínguez-García, Marisa Escalante, Alberto Molinuevo Martín, Benito Caracuel, Francisco Ramos, Vasileios Gkioulos, Sokratis K. Katsikas, Hans Christian Bolstad, Dan-Eric Archer, Nikola Paunovic, Ramon Gallart-Fernandez, Theodoros Rokkas, Alicia Arce:
SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture. Digit. 1(4): 173-187 (2021) - [j16]Sandeep Pirbhulal, Vasileios Gkioulos, Sokratis K. Katsikas:
A Systematic Literature Review on RAMS analysis for critical infrastructures protection. Int. J. Crit. Infrastructure Prot. 33: 100427 (2021) - [j15]Nabin Chowdhury, Vasileios Gkioulos:
Key competencies for critical infrastructure cyber-security: a systematic literature review. Inf. Comput. Secur. 29(5): 697-723 (2021) - [c16]Ahmed Amro, Vasileios Gkioulos:
Communication and Cybersecurity Testbed for Autonomous Passenger Ship. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 5-22 - [c15]Mehari Msgna, Sokratis K. Katsikas, Vasileios Gkioulos:
WYK: Mobile Device Authentication Using the User's Address Book. ETAA 2021: 1-16 - 2020
- [j14]Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos:
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Comput. Secur. 88 (2020) - [j13]Georgios Kavallieratos, Sokratis K. Katsikas, Vasileios Gkioulos:
SafeSec Tropos: Joint security and safety requirements elicitation. Comput. Stand. Interfaces 70: 103429 (2020) - [j12]Georgios Kavallieratos, Sokratis K. Katsikas, Vasileios Gkioulos:
Cybersecurity and Safety Co-Engineering of Cyberphysical Systems - A Comprehensive Survey. Future Internet 12(4): 65 (2020) - [j11]Philip Nyblom, Gaute Wangen, Vasileios Gkioulos:
Risk Perceptions on Social Media Use in Norway. Future Internet 12(12): 211 (2020) - [j10]Christina Michailidou, Vasileios Gkioulos, Andrii Shalaginov, Athanasios Rizos, Andrea Saracino:
RESPOnSE - A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments. Sensors 20(10): 2960 (2020) - [j9]Sokratis K. Katsikas, Vasileios Gkioulos:
Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things. Sensors 20(14): 3846 (2020) - [c14]Georgios Kavallieratos, Sokratis K. Katsikas, Vasileios Gkioulos:
Modelling Shipping 4.0: A Reference Architecture for the Cyber-Enabled Ship. ACIIDS (2) 2020: 202-217
2010 – 2019
- 2019
- [j8]Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos:
Dynamic setup of IPsec VPNs in service function chaining. Comput. Networks 160: 77-91 (2019) - [j7]Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos:
A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains. Future Internet 11(9): 183 (2019) - [j6]Georgios Kavallieratos, Nabin Chowdhury, Sokratis K. Katsikas, Vasileios Gkioulos, Stephen D. Wolthusen:
Threat Analysis for Smart Homes. Future Internet 11(10): 207 (2019) - [c13]Georgios Kavallieratos, Sokratis K. Katsikas, Vasileios Gkioulos:
Towards a Cyber-Physical Range. CPSS@AsiaCCS 2019: 25-34 - [c12]Georgios Kavallieratos, Vasileios Gkioulos, Sokratis K. Katsikas:
Threat Analysis in Dynamic Environments: The Case of the Smart Home. DCOSS 2019: 234-240 - [c11]Ahmed Amro, Vasileios Gkioulos, Sokratis K. Katsikas:
Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 69-85 - [c10]Håkon Gunleifsen, Vasileios Gkioulos, Gaute Wangen, Andrii Shalaginov, Mazaher Kianpour, Mohamed Abomhara:
Cybersecurity Awareness and Culture in Rural Norway. HAISA 2019: 110-121 - 2018
- [j5]Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich:
A Tiered Control Plane Model for Service Function Chaining Isolation. Future Internet 10(6): 46 (2018) - [j4]Vasileios Gkioulos, Håkon Gunleifsen, Goitom K. Weldehawaryat:
A Systematic Literature Review on Military Software Defined Networks. Future Internet 10(9): 88 (2018) - [c9]Georgios Kavallieratos, Sokratis K. Katsikas, Vasileios Gkioulos:
Cyber-Attacks Against the Autonomous Ship. CyberICPS/SECPRE@ESORICS 2018: 20-36 - [c8]Vasileios Gkioulos, Athanasios Rizos, Christina Michailidou, Paolo Mori, Andrea Saracino:
Enhancing Usage Control for Performance: An Architecture for Systems of Systems. CyberICPS/SECPRE@ESORICS 2018: 69-84 - [c7]Vasileios Gkioulos, Athanasios Rizos, Christina Michailidou, Fabio Martinelli, Paolo Mori:
Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster). HPCS 2018: 1061-1062 - 2017
- [j3]Vasileios Gkioulos, Gaute Wangen, Sokratis K. Katsikas:
User Modelling Validation over the Security Awareness of Digital Natives. Future Internet 9(3): 32 (2017) - [j2]Vasileios Gkioulos, Gaute Wangen, Sokratis K. Katsikas, George K. Karagiannidis, Panayiotis Kotzanikolaou:
Security Awareness of the Digital Natives. Inf. 8(2): 42 (2017) - [j1]Vasileios Gkioulos, Erko Risthein, Stephen D. Wolthusen:
TACTICS: Validation of the security framework developed for tactical SOA. J. Inf. Secur. Appl. 35: 96-105 (2017) - [c6]Vasileios Gkioulos, Stephen D. Wolthusen:
Security Infrastructure for Service Oriented Architectures at the Tactical Edge. CISIS 2017: 310-322 - [c5]Vasileios Gkioulos, Stephen D. Wolthusen:
Security Requirements for the Deployment of Services Across Tactical SOA. MMM-ACNS 2017: 115-127 - 2016
- [c4]Vasileios Gkioulos, Stephen D. Wolthusen:
A Security Policy Infrastructure for Tactical Service Oriented Architectures. CyberICPS@ESORICS 2016: 37-51 - [c3]Vasileios Gkioulos, Stephen D. Wolthusen:
Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures. FNSS 2016: 47-61 - [c2]Vasileios Gkioulos, Stephen D. Wolthusen, Adam Flizikowski, Anna Stachowicz, Dariusz Nogalski, Kamil Gleba, Joanna Sliwa:
Interoperability of security and quality of Service Policies Over Tactical SOA. SSCI 2016: 1-7 - [c1]Vasileios Gkioulos, Stephen D. Wolthusen:
Securing tactical service oriented architectures. SSIC 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint