Myridakis, Dimitrios; Myridakis, Paul; Kakarountas, Athanasios A Power Dissipation Monitoring Circuit for Intrusion Detection and Botnet Prevention on IoT Devices Journal Article In: Computation, vol. 9, no. 2, pp. 19, 2021. BibTeX | Tags: Hardware, IoT, security, Smart Devices Maglogiannis, Ilias; Kontogianni, Georgia; Papadodima, Olga; Karanikas, Haralampos; Billiris, Antonis; Chatziioannou, Aristotle An Integrated Platform for Skin Cancer Heterogenous and Multilayered Data Management Journal Article In: Journal of Medical Systems, vol. 45, 2021. Spathoulas, Georgios; Negka, Lydia; Pandey, Pankaj; Katsikas, Sokratis Can Blockchain Technology Enhance Security and Privacy in the Internet of Things? Book Chapter In: Tsihrintzis, George A; Virvou, Maria (Ed.): pp. 199–228, Springer International Publishing, Cham, 2021, ISBN: 978-3-030-41196-1. BibTeX | Tags: blockchain, IoT, privacy, security Kavallieratos, Georgios; Spathoulas, Georgios; Katsikas, Sokratis Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems Journal Article In: Sensors, vol. 21, no. 5, 2021, ISSN: 1424-8220. Abstract | Links | BibTeX | Tags: Giannoukos, Georgios; Kakarountas, Athanasios; Chioktour, Vasileios Interaction between two cells based on a recurrent neural network using the impedance concept Journal Article In: Journal of Computational Methods in Sciences and Engineering, pp. 1–7, 2020, ISSN: 14727978, 18758983. Links | BibTeX | Tags: Hardware, Neural Networks Myridakis, Dimitrios; Spathoulas, Georgios; Kakarountas, Athanasios; Schinianakis, Dimitrios Smart Devices Security Enhancement via Power Supply Monitoring Journal Article In: Future Internet, vol. 12, no. 3, 2020, ISSN: 1999-5903. Abstract | Links | BibTeX | Tags: Anomaly Detection, Hardware, IoT, security, smart device; current monitoring; physical characteristics
2021
@article{myridakis2021power,
title = {A Power Dissipation Monitoring Circuit for Intrusion Detection and Botnet Prevention on IoT Devices},
author = {Dimitrios Myridakis and Paul Myridakis and Athanasios Kakarountas},
year = {2021},
date = {2021-01-01},
journal = {Computation},
volume = {9},
number = {2},
pages = {19},
publisher = {Multidisciplinary Digital Publishing Institute},
keywords = {Hardware, IoT, security, Smart Devices},
pubstate = {published},
tppubtype = {article}
}
@article{articleb,
title = {An Integrated Platform for Skin Cancer Heterogenous and Multilayered Data Management},
author = {Ilias Maglogiannis and Georgia Kontogianni and Olga Papadodima and Haralampos Karanikas and Antonis Billiris and Aristotle Chatziioannou},
doi = {10.1007/s10916-020-01679-3},
year = {2021},
date = {2021-01-01},
journal = {Journal of Medical Systems},
volume = {45},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
@inbook{Spathoulas2021,
title = {Can Blockchain Technology Enhance Security and Privacy in the Internet of Things?},
author = {Georgios Spathoulas and Lydia Negka and Pankaj Pandey and Sokratis Katsikas},
editor = {George A Tsihrintzis and Maria Virvou},
isbn = {978-3-030-41196-1},
year = {2021},
date = {2021-01-01},
pages = {199--228},
publisher = {Springer International Publishing},
address = {Cham},
keywords = {blockchain, IoT, privacy, security},
pubstate = {published},
tppubtype = {inbook}
}
@article{s21051691,
title = {Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems},
author = {Georgios Kavallieratos and Georgios Spathoulas and Sokratis Katsikas},
url = {https://www.mdpi.com/1424-8220/21/5/1691},
doi = {10.3390/s21051691 keywords=security, cyberphysical},
issn = {1424-8220},
year = {2021},
date = {2021-01-01},
journal = {Sensors},
volume = {21},
number = {5},
abstract = {The increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other to form systems-of-systems. This interconnection enables the offering of functionality beyond the combined offering of each individual component, but at the same time increases the cyber risk of the overall system, as such risk propagates between and aggregates at component systems. The complexity of the resulting systems-of-systems in many cases leads to difficulty in analyzing cyber risk. Additionally, the selection of cybersecurity controls that will effectively and efficiently treat the cyber risk is commonly performed manually, or at best with limited automated decision support. In this work, we propose a method for analyzing risk propagation and aggregation in complex CPSs utilizing the results of risk assessments of their individual constituents. Additionally, we propose a method employing evolutionary programming for automating the selection of an optimal set of cybersecurity controls out of a list of available controls, that will minimize the residual risk and the cost associated with the implementation of these measures. We illustrate the workings of the proposed methods by applying them to the navigational systems of two variants of the Cyber-Enabled Ship (C-ES), namely the autonomous ship and the remotely controlled ship. The results are sets of cybersecurity controls applied to those components of the overall system that have been identified in previous studies as the most vulnerable ones; such controls minimize the residual risk, while also minimizing the cost of implementation.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2020
@article{Giannoukos_Kakarountas_Chioktour_2020,
title = {Interaction between two cells based on a recurrent neural network using the impedance concept},
author = {Georgios Giannoukos and Athanasios Kakarountas and Vasileios Chioktour},
doi = {10.3233/JCM-204367},
issn = {14727978, 18758983},
year = {2020},
date = {2020-07-01},
journal = {Journal of Computational Methods in Sciences and Engineering},
pages = {1–7},
keywords = {Hardware, Neural Networks},
pubstate = {published},
tppubtype = {article}
}
@article{fi12030048,
title = {Smart Devices Security Enhancement via Power Supply Monitoring},
author = {Dimitrios Myridakis and Georgios Spathoulas and Athanasios Kakarountas and Dimitrios Schinianakis},
url = {https://www.mdpi.com/1999-5903/12/3/48},
doi = {10.3390/fi12030048},
issn = {1999-5903},
year = {2020},
date = {2020-01-01},
journal = {Future Internet},
volume = {12},
number = {3},
abstract = {The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, these devices create a potential threat to personal and public security. This may be easily understood either due to the sensitivity of the collected data, or by our dependability to the devices' operation. Considering that most IoT devices are of low cost and are used for various tasks, such as monitoring people or controlling indoor environmental conditions, the security factor should be enhanced. This paper presents the exploitation of side-channel attack technique for protecting low-cost smart devices in an intuitive way. The work aims to extend the dataset provided to an Intrusion Detection Systems (IDS) in order to achieve a higher accuracy in anomaly detection. Thus, along with typical data provided to an IDS, such as network traffic, transmitted packets, CPU usage, etc., it is proposed to include information regarding the device’s physical state and behaviour such as its power consumption, the supply current, the emitted heat, etc. Awareness of the typical operation of a smart device in terms of operation and functionality may prove valuable, since any deviation may warn of an operational or functional anomaly. In this paper, the deviation (either increase or decrease) of the supply current is exploited for this reason. This work aimed to affect the intrusion detection process of IoT and proposes for consideration new inputs of interest with a collateral interest of study. In parallel, malfunction of the device is also detected, extending this work’s application to issues of reliability and maintainability. The results present 100% attack detection and this is the first time that a low-cost security solution suitable for every type of target devices is presented.},
keywords = {Anomaly Detection, Hardware, IoT, security, smart device; current monitoring; physical characteristics},
pubstate = {published},
tppubtype = {article}
}
A Power Dissipation Monitoring Circuit for Intrusion Detection and Botnet Prevention on IoT Devices Journal Article In: Computation, vol. 9, no. 2, pp. 19, 2021. An Integrated Platform for Skin Cancer Heterogenous and Multilayered Data Management Journal Article In: Journal of Medical Systems, vol. 45, 2021. Can Blockchain Technology Enhance Security and Privacy in the Internet of Things? Book Chapter In: Tsihrintzis, George A; Virvou, Maria (Ed.): pp. 199–228, Springer International Publishing, Cham, 2021, ISBN: 978-3-030-41196-1. Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems Journal Article In: Sensors, vol. 21, no. 5, 2021, ISSN: 1424-8220. Interaction between two cells based on a recurrent neural network using the impedance concept Journal Article In: Journal of Computational Methods in Sciences and Engineering, pp. 1–7, 2020, ISSN: 14727978, 18758983. Smart Devices Security Enhancement via Power Supply Monitoring Journal Article In: Future Internet, vol. 12, no. 3, 2020, ISSN: 1999-5903.
2021
2020