MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments

I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …

HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles

S Panda, S Rass, S Moschoyiannis, K Liang… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each
other and with road infrastructure on a common network, has promising socio-economic …

AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks

G Petihakis, A Farao, P Bountakas, A Sabazioti… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain

A Farao, G Paparis, S Panda, E Panaousis… - International Journal of …, 2024 - Springer
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …

SYNAPSE-An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness …

P Bountakas, K Fysarakis, T Kyriakakis… - Proceedings of the 19th …, 2024 - dl.acm.org
In an era of escalating cyber threats, the imperative for robust and comprehensive
cybersecurity measures has never been more pressing. To address this challenge …

Privacy impact assessment of cyber attacks on connected and autonomous vehicles

S Panda, E Panaousis, G Loukas… - Proceedings of the 18th …, 2023 - dl.acm.org
Connected and autonomous vehicles (CAVs) are vulnerable to security gaps that can result
in serious consequences, including cyber-physical and privacy risks. For example, an …

BRIDGE: BRIDGing the gap bEtween CTI production and consumption

M Karatisoglou, A Farao, V Bolgouras… - 2022 14th …, 2022 - ieeexplore.ieee.org
Security for businesses and organizations is essential to protect operational activities, trust
relationship with clients and financial viability. Increased interest for research concerning …

Analyzing coverages of cyber insurance policies using ontology

M Charalambous, A Farao… - Proceedings of the 17th …, 2022 - dl.acm.org
In an era where all the transactions, businesses and services are becoming digital and
online, the data assets and the services protection are of utmost importance. Cyber …

[PDF][PDF] Optimal strategies for cyber security decision-making

S Panda - 2022 - openresearch.surrey.ac.uk
One of the major concerns of organisations is how to protect themselves from the growing
volume and sophistication of cyber attacks. In this context, methodologies, models, and …