GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments

I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …

SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks

I Syamsuddin, OM Barukab - electronics, 2022 - mdpi.com
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …

Enhancing Industrial IoT Network Security through Blockchain Integration

Y Bobde, G Narayanan, M Jati, RSP Raj, I Cvitić… - Electronics, 2024 - mdpi.com
In the rapidly evolving landscape of industrial ecosystems, Industrial IoT networks face
increasing security challenges. Traditional security methods often struggle to protect these …

AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks

G Petihakis, A Farao, P Bountakas, A Sabazioti… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain

A Farao, G Paparis, S Panda, E Panaousis… - International Journal of …, 2024 - Springer
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …

A Bring Your Own Device security awareness survey among professionals

G Petihakis, D Kiritsis, A Farao, P Bountakas… - Proceedings of the 18th …, 2023 - dl.acm.org
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …

Analyzing coverages of cyber insurance policies using ontology

M Charalambous, A Farao… - Proceedings of the 17th …, 2022 - dl.acm.org
In an era where all the transactions, businesses and services are becoming digital and
online, the data assets and the services protection are of utmost importance. Cyber …

SAMGRID: security authorization and monitoring module based on SealedGRID platform

G Suciu, A Farao, G Bernardinetti, I Palamà… - Sensors, 2022 - mdpi.com
IoT devices present an ever-growing domain with multiple applicability. This technology has
favored and still favors many areas by creating critical infrastructures that are as profitable as …

GLPS: A Geohash-Based Location Privacy Protection Scheme

B Liu, C Zhang, L Yao, Y Xin - Entropy, 2023 - mdpi.com
With the development of mobile applications, location-based services (LBSs) have been
incorporated into people's daily lives and created huge commercial revenues. However …

A Stochastic Petri net Model of Continuous Integration and Continuous Delivery

S Bhadra - 2022 IEEE International Symposium on Software …, 2022 - ieeexplore.ieee.org
Modern software development organizations rely on continuous integration and continuous
delivery (CI/CD), since it allows developers to continuously integrate their code in a single …