What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sokratis K. Katsikas
Google Scholar
ORCID:
0000-0003-2966-9683
36
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
A step-by-step definition of a reference architecture for cyber ranges.
Vyron Kampourakis
Vasileios Gkioulos
Sokratis K. Katsikas
2025
journals/compsec
Cracks in the chain: A technical analysis of real-life supply chain security incidents.
Vyron Kampourakis
Georgios Kavallieratos
Vasileios Gkioulos
Sokratis K. Katsikas
2024
conf/sec
GAD: A Real-Time Gait Anomaly Detection System with Online Adaptive Learning.
Ming-Chang Lee
Jia-Chun Lin
Sokratis K. Katsikas
2024
conf/csr2
Lightweight Testbed for IEC61162-450-Related Cyber Security Research.
Gabor Visky
Sokratis K. Katsikas
Olaf Maennel
2024
conf/esorics
Threat Modeling in Satellite Communications for Maritime Operations.
Even Kvam Frøseth
Georgios Kavallieratos
Sokratis K. Katsikas
2024
conf/esorics
Usage of Cybersecurity Standards in Operational Technology Systems.
Kristian Kannelønning
Sokratis K. Katsikas
2024
conf/esorics
Best-Practices-Based Training for Improving Cybersecurity in Power Grids.
Georgios Kavallieratos
Ahmed Amro
Vasileios Gkioulos
Grigore Stamatescu
Kostantinos Rantos
Thomas Lagkas
Konstantinos Demertzis
Fotis Paterakis
Alexios Lekidis
Christos Dalamagkas
Igor Kotsiuba
Sokratis K. Katsikas
2024
conf/icics
Impact of Recurrent Neural Networks and Deep Learning Frameworks on Real-Time Lightweight Time Series Anomaly Detection.
Ming-Chang Lee
Jia-Chun Lin
Sokratis K. Katsikas
2023
journals/compsec
Understanding situation awareness in SOCs, a systematic literature review.
Håvard Jakobsen Ofte
Sokratis K. Katsikas
2023
journals/compsec
A systematic literature review on wireless security testbeds in the cyber-physical realm.
Vyron Kampourakis
Vasileios Gkioulos
Sokratis K. Katsikas
2023
conf/esorics
Threat Analysis in Dairy Farming 4.0.
Karl Jonatan Due Vatn
Georgios Kavallieratos
Sokratis K. Katsikas
2022
journals/compsec
Investigating machine learning attacks on financial time series models.
Michael Gallagher
Nikolaos Pitropakis
Christos Chrysoulas
Pavlos Papadopoulos
Alexios Mylonas
Sokratis K. Katsikas
2022
journals/compsec
Modeling effective cybersecurity training frameworks: A delphi method-based study.
Nabin Chowdhury
Sokratis K. Katsikas
Vasileios Gkioulos
2022
conf/esorics
Towards Comprehensive Modeling of CPSs to Discover and Study Interdependencies.
Aida Akbarzadeh
Sokratis K. Katsikas
2021
conf/esorics
Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysical Systems.
Georgios P. Spathoulas
Georgios Kavallieratos
Sokratis K. Katsikas
Alessio Baiocco
2020
conf/esorics
Attack Path Analysis for Cyber Physical Systems.
Georgios Kavallieratos
Sokratis K. Katsikas
2019
conf/esorics
Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation.
Ahmed Amro
Vasileios Gkioulos
Sokratis K. Katsikas
2018
conf/esorics
Cyber-Attacks Against the Autonomous Ship.
Georgios Kavallieratos
Sokratis K. Katsikas
Vasileios Gkioulos
2017
journals/compsec
A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems.
Ahmed Patel
Hitham Alhussian
Jens Myrup Pedersen
Bouchaib Bounabat
Joaquim Celestino Júnior
Sokratis K. Katsikas
2017
journals/istr
A structured methodology for deploying log management in WANs.
Vasileios Anastopoulos
Sokratis K. Katsikas
2017
conf/ccs
Cyber Security of the Autonomous Ship.
Sokratis K. Katsikas
2013
journals/compsec
Enhancing IDS performance through comprehensive alert post-processing.
Georgios P. Spathoulas
Sokratis K. Katsikas
2010
journals/compsec
Reducing false positives in intrusion detection systems.
Georgios P. Spathoulas
Sokratis K. Katsikas
2010
journals/compsec
A game-based intrusion detection mechanism to confront internal attackers.
Ioanna Kantzavelou
Sokratis K. Katsikas
2009
journals/compsec
Editorial.
Dimitris Gritzalis
Sokratis K. Katsikas
2008
conf/esorics
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
Athanasios N. Yannacopoulos
Costas Lambrinoudakis
Stefanos Gritzalis
Stylianos Z. Xanthopoulos
Sokratis K. Katsikas
2002
conf/sec
Revisiting Legal and Regulatory Requirements for Secure E-Voting.
Lilian Mitrou
Dimitris Gritzalis
Sokratis K. Katsikas
2000
journals/compsec
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture.
Stefanos Gritzalis
Sokratis K. Katsikas
Dimitrios Lekkas
Konstantinos Moulinos
Eleni Polydoro
2000
conf/ccs
Evaluating certificate status information mechanisms.
John Iliadis
Diomidis Spinellis
Dimitris Gritzalis
Bart Preneel
Sokratis K. Katsikas
2000
conf/sec
A Postgraduate Programme on Information and Communication Systems Security.
Sokratis K. Katsikas
1999
journals/compsec
Trusted third party services for deploying secure telemedical applications over the WWW.
Diomidis Spinellis
Stefanos Gritzalis
John Iliadis
Dimitris Gritzalis
Sokratis K. Katsikas
1997
conf/sec
An attack detection system for secure computer systems - outline of the solution.
Ioanna Kantzavelou
Sokratis K. Katsikas
1995
journals/compsec
Design of a neural network for recognition and classification of computer viruses.
Anastasia Doumas
Konstantinos Mavroudakis
Dimitris Gritzalis
Sokratis K. Katsikas
1992
journals/compsec
A zero knowledge probabilistic login protocol.
Dimitris Gritzalis
Sokratis K. Katsikas
Stefanos Gritzalis
1992
journals/compsec
Determining access rights for medical information systems.
Dimitris Gritzalis
Sokratis K. Katsikas
J. Keklikoglou
A. Tomaras
1991
journals/compsec
Data security in medical information systems: The Greek case.
Dimitris Gritzalis
A. Tomaras
Sokratis K. Katsikas
J. Keklikoglou
Coauthors
A. Tomaras
(2)
Ahmed Amro
(2)
Ahmed Patel
(1)
Aida Akbarzadeh
(1)
Alessio Baiocco
(1)
Alexios Lekidis
(1)
Alexios Mylonas
(1)
Anastasia Doumas
(1)
Athanasios N. Yannacopoulos
(1)
Bart Preneel
(1)
Bouchaib Bounabat
(1)
Christos Chrysoulas
(1)
Christos Dalamagkas
(1)
Costas Lambrinoudakis
(1)
Dimitrios Lekkas
(1)
Dimitris Gritzalis
(8)
Diomidis Spinellis
(2)
Eleni Polydoro
(1)
Even Kvam Frøseth
(1)
Fotis Paterakis
(1)
Gabor Visky
(1)
Georgios Kavallieratos
(7)
Georgios P. Spathoulas
(3)
Grigore Stamatescu
(1)
Håvard Jakobsen Ofte
(1)
Hitham Alhussian
(1)
Igor Kotsiuba
(1)
Ioanna Kantzavelou
(2)
J. Keklikoglou
(2)
Jens Myrup Pedersen
(1)
Jia-Chun Lin
(2)
Joaquim Celestino Júnior
(1)
John Iliadis
(2)
Karl Jonatan Due Vatn
(1)
Konstantinos Demertzis
(1)
Konstantinos Mavroudakis
(1)
Konstantinos Moulinos
(1)
Kostantinos Rantos
(1)
Kristian Kannelønning
(1)
Lilian Mitrou
(1)
Michael Gallagher
(1)
Ming-Chang Lee
(2)
Nabin Chowdhury
(1)
Nikolaos Pitropakis
(1)
Olaf Maennel
(1)
Pavlos Papadopoulos
(1)
Sokratis K. Katsikas
(36)
Stefanos Gritzalis
(4)
Stylianos Z. Xanthopoulos
(1)
Thomas Lagkas
(1)
Vasileios Anastopoulos
(1)
Vasileios Gkioulos
(7)
Vyron Kampourakis
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to