default search action
George Stergiopoulos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]George Stergiopoulos, Panagiotis Kotzanikolaou, Konstantinos Adamos, Lilian Mitrou:
Scaling private proximity testing protocols for geofenced information exchange: A metropolitan-wide case study. Comput. Networks 245: 110381 (2024) - [j25]Konstantinos Adamos, George Stergiopoulos, Michalis Karamousadakis, Dimitris Gritzalis:
Enhancing attack resilience of cyber-physical systems through state dependency graph models. Int. J. Inf. Sec. 23(1): 187-198 (2024) - [c25]Antonio Di Pietro, Francesco Cavedon, Vittorio Rosato, George Stergiopoulos:
Modeling Networks of Interdependent Infrastructure in Complex Urban Environments Using Open-Data. COMPLEXIS 2024: 62-73 - [c24]Argiro Anagnostopoulou, Thomas Papaloukas, George Stergiopoulos, Dimitris Gritzalis:
From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control Systems. SECRYPT 2024: 13-25 - [c23]George Stergiopoulos, Michalis Detsis, Sozon Leventopoulos, Dimitris Gritzalis:
Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical Infrastructures. SECRYPT 2024: 544-551 - 2023
- [j24]Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, Dimitris Gritzalis:
Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering. IEEE Access 11: 106172-106189 (2023) - [j23]Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis:
Correction to: A decentralized honeypot for IoT Protocols based on Android devices. Int. J. Inf. Sec. 22(1): 303 (2023) - [j22]George Stergiopoulos, Panayiotis Kotzanikolaou, Charalambos Konstantinou, Achilleas Tsoukalis:
Process-Aware Attacks on Medication Control of Type-I Diabetics Using Infusion Pumps. IEEE Syst. J. 17(2): 1831-1842 (2023) - 2022
- [j21]George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis:
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0. Int. J. Inf. Sec. 21(1): 37-59 (2022) - [j20]Irini Lygerou, Shreyas Srinivasa, Emmanouil Vasilomanolakis, George Stergiopoulos, Dimitris Gritzalis:
A decentralized honeypot for IoT Protocols based on Android devices. Int. J. Inf. Sec. 21(6): 1211-1222 (2022) - [c22]Panagiotis Dedousis, Melina Raptaki, George Stergiopoulos, Dimitris Gritzalis:
Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach. SECRYPT 2022: 35-46 - 2021
- [j19]Vangelis Malamas, Fotis Chantzis, Thomas K. Dasaklis, George Stergiopoulos, Panayiotis Kotzanikolaou, Christos Douligeris:
Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal. IEEE Access 9: 40049-40075 (2021) - [j18]Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, Dimitris Gritzalis:
A Security-Aware Framework for Designing Industrial Engineering Processes. IEEE Access 9: 163065-163085 (2021) - [j17]George Stergiopoulos, Dimitris Gritzalis, Efstratios Vasilellis, Argiro Anagnostopoulou:
Dropping malware through sound injection: A comparative analysis on Android operating systems. Comput. Secur. 105: 102228 (2021) - [j16]Constantinos-Giovanni Xarhoulacos, Argiro Anagnostopoulou, George Stergiopoulos, Dimitris Gritzalis:
Misinformation vs. Situational Awareness: The Art of Deception and the Need for Cross-Domain Detection. Sensors 21(16): 5496 (2021) - [c21]Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, Dimitris Gritzalis:
Towards Integrating Security in Industrial Engineering Design Practices. SECRYPT 2021: 161-172 - [i1]Charalambos Konstantinou, George Stergiopoulos, Masood Parvania, Paulo Esteves Veríssimo:
Chaos Engineering for Enhanced Resilience of Cyber-Physical Systems. CoRR abs/2106.14962 (2021) - 2020
- [j15]George Stergiopoulos, Dimitris Gritzalis, Evangelos Limnaios:
Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns. IEEE Access 8: 128440-128475 (2020) - [j14]Georgia Lykou, Panagiotis Dedousis, George Stergiopoulos, Dimitris Gritzalis:
Assessing Interdependencies and Congestion Delays in the Aviation Network. IEEE Access 8: 223234-223254 (2020) - [j13]George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis:
Automatic network restructuring and risk mitigation through business process asset dependency analysis. Comput. Secur. 96: 101869 (2020) - [j12]George Stergiopoulos, Nick Kapetanas, Efstratios Vasilellis, Dimitris Gritzalis:
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis. Secur. Priv. 3(4) (2020) - [j11]Dimitris Koutras, George Stergiopoulos, Thomas K. Dasaklis, Panayiotis Kotzanikolaou, Dimitris Glynos, Christos Douligeris:
Security in IoMT Communications: A Survey. Sensors 20(17): 4828 (2020) - [c20]Konstantinos Nomikos, Athanasios Papadimitriou, George Stergiopoulos, Dimitris Koutras, Mihalis Psarakis, Panayiotis Kotzanikolaou:
On a Security-oriented Design Framework for Medical IoT Devices: The Hardware Security Perspective. DSD 2020: 301-308 - [c19]Panagiotis Dedousis, George Stergiopoulos, Dimitris Gritzalis:
An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems. ICETE (Selected Papers) 2020: 1-23 - [c18]George Stergiopoulos, Eirini Lygerou, Nikolaos Tsalis, Dimitris Tomaras, Dimitris Gritzalis:
Avoiding Network and Host Detection using Packet Bit-masking. ICETE (2) 2020: 52-63
2010 – 2019
- 2019
- [j10]George Stergiopoulos, Georgia Chronopoulou, Evangelos Bitsikas, Nikolaos Tsalis, Dimitris Gritzalis:
Using side channel TCP features for real-time detection of malware connections. J. Comput. Secur. 27(5): 507-520 (2019) - 2018
- [j9]George Stergiopoulos, Evangelos Valvis, Dimitris Mitrodimas, Dimitrios Lekkas, Dimitris Gritzalis:
Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure. IEEE Access 6: 63823-63832 (2018) - [j8]George Stergiopoulos, Dimitris Gritzalis, Vasilis Kouktzoglou:
Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment. Comput. Networks 134: 23-45 (2018) - [c17]Georgia Lykou, Argiro Anagnostopoulou, George Stergiopoulos, Dimitris Gritzalis:
Cybersecurity Self-assessment Tools: Evaluating the Importance for Securing Industrial Control Systems in Critical Infrastructures. CRITIS 2018: 129-142 - [c16]George Stergiopoulos, Alexander Talavari, Evangelos Bitsikas, Dimitris Gritzalis:
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets. ESORICS (1) 2018: 346-362 - [c15]Nikolaos Tsalis, George Stergiopoulos, Evangelos Bitsikas, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks. ICETE (2) 2018: 219-229 - 2017
- [j7]George Stergiopoulos, Panayiotis Katsaros, Dimitris Gritzalis:
Program analysis with risk-based classification of dynamic invariants for logical error detection. Comput. Secur. 71: 36-50 (2017) - [j6]George Stergiopoulos, Vasilis Kouktzoglou, Marianthi Theocharidou, Dimitris Gritzalis:
A process-based dependency risk analysis methodology for critical infrastructures. Int. J. Crit. Infrastructures 13(2/3): 184-205 (2017) - [j5]George Stergiopoulos, Evangelos Valvis, Foivos Anagnou-Misyris, Nick Bozovic, Dimitris Gritzalis:
Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures. SIGMETRICS Perform. Evaluation Rev. 45(2): 119-124 (2017) - [c14]Georgia Lykou, George Stergiopoulos, Antonios Papachrysanthou, Dimitris Gritzalis:
Protecting the Transportation Sector from the Negative Impacts of Climate Change. Critical Infrastructure Protection 2017: 3-21 - 2016
- [j4]George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Georgia Lykou, Dimitris Gritzalis:
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures. Int. J. Crit. Infrastructure Prot. 12: 46-60 (2016) - [c13]Dimitris Gritzalis, George Stergiopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos, Georgia Lykou:
Critical Infrastructure Protection: A Holistic Methodology for Greece. CyberICPS@ESORICS 2016: 19-34 - [c12]George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Classification and Comparison of Critical Infrastructure Protection Tools. Critical Infrastructure Protection 2016: 239-255 - [c11]George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions. SECRYPT 2016: 28-40 - 2015
- [j3]George Stergiopoulos, Dimitris Gritzalis:
Hacking and Penetration Testing with Low Power Devices. Comput. Secur. 49: 274-275 (2015) - [j2]George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Dimitris Gritzalis:
Risk mitigation strategies for critical infrastructures based on graph centrality analysis. Int. J. Crit. Infrastructure Prot. 10: 34-44 (2015) - [c10]Shamal Faily, George Stergiopoulos, Vasilios Katos, Dimitris Gritzalis:
"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar. CRITIS 2015: 243-246 - [c9]George Stergiopoulos, Marianthi Theocharidou, Dimitris Gritzalis:
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures. HCI (22) 2015: 672-683 - [c8]George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis:
Execution Path Classification for Vulnerability Analysis and Detection. ICETE (Selected Papers) 2015: 293-317 - [c7]George Stergiopoulos, Marianthi Theocharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation. Critical Infrastructure Protection 2015: 299-314 - [c6]George Stergiopoulos, Panagiotis Petsanas, Panagiotis Katsaros, Dimitris Gritzalis:
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position. SECRYPT 2015: 100-111 - 2014
- [j1]George Stergiopoulos, Dimitris Gritzalis:
A Bug Hunter's Diary. Comput. Secur. 43: 188 (2014) - [c5]George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis:
Automated Detection of Logical Errors in Programs. CRiSIS 2014: 35-51 - [c4]Dimitris Gritzalis, Vasilis Stavrou, Miltiadis Kandias, George Stergiopoulos:
Insider Threat: Enhancing BPM through Social Media. NTMS 2014: 1-6 - 2013
- [c3]George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis:
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework. NSS 2013: 236-249 - [c2]George Stergiopoulos, Miltiadis Kandias, Dimitris Gritzalis:
Approaching Encryption through Complex Number Logarithms. SECRYPT 2013: 574-579 - 2012
- [c1]George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis:
Hunting Application-Level Logical Errors. ESSoS 2012: 135-142
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint