Helphed: Hybrid ensemble learning phishing email detection

P Bountakas, C Xenakis - Journal of network and computer applications, 2023 - Elsevier
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …

AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks

G Petihakis, A Farao, P Bountakas, A Sabazioti… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …

Cyber Threat Intelligence on Blockchain: A Systematic Literature Review

D Chatziamanetoglou, K Rantos - Computers, 2024 - mdpi.com
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding
organizations against cyber threats. However, managing, storing, analyzing, and sharing …

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain

A Farao, G Paparis, S Panda, E Panaousis… - International Journal of …, 2024 - Springer
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …

A Bring Your Own Device security awareness survey among professionals

G Petihakis, D Kiritsis, A Farao, P Bountakas… - Proceedings of the 18th …, 2023 - dl.acm.org
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …

Event-Based Threat Intelligence Ontology Model

P Wang, G Dai, L Zhai - International Conference on Science of Cyber …, 2023 - Springer
Abstract Cyber Threat Intelligence (CTI) has become an essential part of contemporary
threat detection and response solutions. However, threat intelligence is facing challenges …

NITRO: an Interconnected 5G-IoT Cyber Range

A Farao, C Ntantogian, S Karagiannis… - Proceedings of the 19th …, 2024 - dl.acm.org
This paper presents NITRO cyber range, which aims at creating a specialized cybersecurity
testing and training environment for 5G and IoT networks. NITRO provides a platform for …

Advanced cyber security solutions for critical infrastructure and applications: smart grid and cyber insurance

A Farao - 2024 - dione.lib.unipi.gr
The rapid digitization of critical infrastructure, coupled with the increasing sophistication of
cyber threats, has elevated the importance of robust cybersecurity measures. This …

Analytical study for cyber threat intelligence (CTI)

IR Alkhateeb, QA Al-Haija, S Abu-Soud - 2023 - IET
Cyber Threat Intelligence (CTI) involves collecting and analyzing cyber security data using
advanced algorithms and rigorous techniques to identify and address potential threats …

[PDF][PDF] Cybersecurity Challenges and Pitfalls in 6G Networks

A Farao, V Bolgouras, A Zarras, C Xenakis - users.ics.forth.gr
The transition from 5G to 6G networks aims to improve connection speeds and intelligence
levels. 6G is expected to support machine-type communications and ultra-reliable …