What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vasileios Gkioulos
Google Scholar
16
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
A step-by-step definition of a reference architecture for cyber ranges.
Vyron Kampourakis
Vasileios Gkioulos
Sokratis K. Katsikas
2025
journals/compsec
Cracks in the chain: A technical analysis of real-life supply chain security incidents.
Vyron Kampourakis
Georgios Kavallieratos
Vasileios Gkioulos
Sokratis K. Katsikas
2024
conf/esorics
Best-Practices-Based Training for Improving Cybersecurity in Power Grids.
Georgios Kavallieratos
Ahmed Amro
Vasileios Gkioulos
Grigore Stamatescu
Kostantinos Rantos
Thomas Lagkas
Konstantinos Demertzis
Fotis Paterakis
Alexios Lekidis
Christos Dalamagkas
Igor Kotsiuba
Sokratis K. Katsikas
2023
journals/compsec
A systematic literature review on wireless security testbeds in the cyber-physical realm.
Vyron Kampourakis
Vasileios Gkioulos
Sokratis K. Katsikas
2023
conf/esorics
Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain.
Susanne Barkhald Sandberg
Aida Akbarzadeh
Vasileios Gkioulos
2022
journals/compsec
Modeling effective cybersecurity training frameworks: A delphi method-based study.
Nabin Chowdhury
Sokratis K. Katsikas
Vasileios Gkioulos
2022
conf/esorics
From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks.
Ahmed Amro
Vasileios Gkioulos
2022
conf/esorics
A Framework for Developing Tabletop Cybersecurity Exercises.
Nabin Chowdhury
Vasileios Gkioulos
2022
conf/esorics
Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness Resources.
Sunil Chaudhary
Vasileios Gkioulos
David Goodman
2021
conf/esorics
Communication and Cybersecurity Testbed for Autonomous Passenger Ship.
Ahmed Amro
Vasileios Gkioulos
2020
journals/compsec
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture.
Muhammad Mudassar Yamin
Basel Katt
Vasileios Gkioulos
2019
conf/esorics
Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation.
Ahmed Amro
Vasileios Gkioulos
Sokratis K. Katsikas
2018
conf/esorics
Enhancing Usage Control for Performance: An Architecture for Systems of Systems.
Vasileios Gkioulos
Athanasios Rizos
Christina Michailidou
Paolo Mori
Andrea Saracino
2018
conf/esorics
Cyber-Attacks Against the Autonomous Ship.
Georgios Kavallieratos
Sokratis K. Katsikas
Vasileios Gkioulos
2017
journals/istr
TACTICS: Validation of the security framework developed for tactical SOA.
Vasileios Gkioulos
Erko Risthein
Stephen D. Wolthusen
2016
conf/esorics
A Security Policy Infrastructure for Tactical Service Oriented Architectures.
Vasileios Gkioulos
Stephen D. Wolthusen
Coauthors
Ahmed Amro
(4)
Aida Akbarzadeh
(1)
Alexios Lekidis
(1)
Andrea Saracino
(1)
Athanasios Rizos
(1)
Basel Katt
(1)
Christina Michailidou
(1)
Christos Dalamagkas
(1)
David Goodman
(1)
Erko Risthein
(1)
Fotis Paterakis
(1)
Georgios Kavallieratos
(3)
Grigore Stamatescu
(1)
Igor Kotsiuba
(1)
Konstantinos Demertzis
(1)
Kostantinos Rantos
(1)
Muhammad Mudassar Yamin
(1)
Nabin Chowdhury
(2)
Paolo Mori
(1)
Sokratis K. Katsikas
(7)
Stephen D. Wolthusen
(2)
Sunil Chaudhary
(1)
Susanne Barkhald Sandberg
(1)
Thomas Lagkas
(1)
Vasileios Gkioulos
(16)
Vyron Kampourakis
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to