MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

A systematic literature review of cyber insurance challenges

B Aziz - … Conference on Information Technology Systems and …, 2020 - ieeexplore.ieee.org
This paper presents a systematic literature review of the challenges in cyber insurance. The
study uses PRISMA to obtain transparent results. This review summarized sectors which risk …

GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments

I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …

HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles

S Panda, S Rass, S Moschoyiannis, K Liang… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each
other and with road infrastructure on a common network, has promising socio-economic …

AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks

G Petihakis, A Farao, P Bountakas, A Sabazioti… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain

A Farao, G Paparis, S Panda, E Panaousis… - International Journal of …, 2024 - Springer
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …

A Bring Your Own Device security awareness survey among professionals

G Petihakis, D Kiritsis, A Farao, P Bountakas… - Proceedings of the 18th …, 2023 - dl.acm.org
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …

Privacy impact assessment of cyber attacks on connected and autonomous vehicles

S Panda, E Panaousis, G Loukas… - Proceedings of the 18th …, 2023 - dl.acm.org
Connected and autonomous vehicles (CAVs) are vulnerable to security gaps that can result
in serious consequences, including cyber-physical and privacy risks. For example, an …

BRIDGE: BRIDGing the gap bEtween CTI production and consumption

M Karatisoglou, A Farao, V Bolgouras… - 2022 14th …, 2022 - ieeexplore.ieee.org
Security for businesses and organizations is essential to protect operational activities, trust
relationship with clients and financial viability. Increased interest for research concerning …

Optimising user security recommendations for AI-powered smart-homes

E Scott, S Panda, G Loukas… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Research in the context of user awareness has shown that smart-home occupants often lack
cybersecurity awareness even when it comes to frequently used technologies such as …