{"id":1018,"date":"2018-12-25T22:53:53","date_gmt":"2018-12-25T20:53:53","guid":{"rendered":"http:\/\/ssl.ds.unipi.gr\/?page_id=1018"},"modified":"2026-01-16T17:34:49","modified_gmt":"2026-01-16T15:34:49","slug":"publications","status":"publish","type":"page","link":"https:\/\/laboratories.ds.unipi.gr\/ssl\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<div class=\"ssl-pubs\">\n<h2>Discover SSL&#8217;s Publications<\/h2>\n<p>Here you can see our publications, sorted by year and category (Books, Journals, and Conferences).<\/p>\n<style>\n    .ssl-pubs details{<br \/>\n      border:1px solid #ccc;<br \/>\n      border-radius:6px;<br \/>\n      margin:0 0 10px 0;<br \/>\n      background:#fff;<br \/>\n      overflow:hidden;<br \/>\n    }<br \/>\n    .ssl-pubs summary{<br \/>\n      cursor:pointer;<br \/>\n      padding:.75em 1em;<br \/>\n      background:#eee;<br \/>\n      font-weight:600;<br \/>\n      list-style:none;<br \/>\n      user-select:none;<br \/>\n    }<br \/>\n    .ssl-pubs summary::-webkit-details-marker{ display:none; }<br \/>\n    .ssl-pubs details[open] summary{ border-bottom:1px solid #ccc; background:#e7e7e7; }<\/p>\n<p>    .ssl-pubs .content{<br \/>\n      padding:1em;<br \/>\n    }<br \/>\n    .ssl-pubs ul{ margin:.5em 0 1em 1.25em; }<br \/>\n    .ssl-pubs li{ margin:.35em 0; }<br \/>\n    .ssl-pubs h3{ margin-top:0; }<br \/>\n  <\/style>\n<p>  <!-- 2025 --><\/p>\n<details>\n<summary>2025 Publications<\/summary>\n<div class=\"content\">\n<h3>\ud83d\udcda Books<\/h3>\n<ul>\n<li><strong>Tracing Techniques for Connected Medical Devices<\/strong><br \/>\nVaios Bolgouras, Georgios Petychakis, Aristeidis Farao, Apostolis Zarras, Christos Xenakis<br \/>\n<em>Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World<\/em>, May 7, 2025.<\/li>\n<li><strong>Cybersecurity Challenges and Pitfalls in 6G Networks<\/strong><br \/>\nAristeidis Farao, Vaios Bolgouras, Apostolis Zarras, Christos Xenakis<br \/>\n<em>Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World<\/em>, Now Publishers, May 7, 2025.<\/li>\n<li><strong>Securing the Software Supply Chain: Innovations and Approaches<\/strong><br \/>\nApostolis Zarras, Evangelos Haleplidis, Christos Xenakis, Apostolos Fournaris<br \/>\n<em>Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World<\/em>, Now Publishers, May 7, 2025.<\/li>\n<li><strong>An Architecture for Dynamic Trust Management in IoT Security<\/strong><br \/>\nStef Verreydt, Dimitri Van Landuyt, Michail Bampatsikos, Rustem Dautov, Hui Song, Shukun Hui, Tom Van Eyck, Sam Michiels, Apostolis Zarras, Thodoris Ioannidis, Christos Xenakis, Danny Hughes, Wouter Joosen, Konstantinos Loupos<br \/>\n<em>Now Publishers<\/em>, pp. 45-81, May 7, 2025.<\/li>\n<li><strong>Cyber-insurance: Past, present and future<\/strong><br \/>\nSakshyam Panda, Aristeidis Farao, Emmanouil Panaousis, Christos Xenakis<br \/>\n<em>Encyclopedia of Cryptography, Security and Privacy<\/em>, pp. 529-532, Springer Nature Switzerland, January 8, 2025.<\/li>\n<\/ul>\n<h3>\ud83d\udcdd Journals<\/h3>\n<ul>\n<li><strong>CRASHED: Cyber risk assessment for smart home electronic devices<\/strong><br \/>\nGeorgios Paparis, Apostolis Zarras, Aristeidis Farao, Christos Xenakis<br \/>\n<em>Journal of Information Security and Applications<\/em>, Vol. 91, p. 104054, Elsevier, June 2025.<\/li>\n<li><strong>EAP-FIDO: A novel EAP method for using FIDO2 credentials for network authentication<\/strong><br \/>\nMarti\u00f1o Rivera-Dourado, Christos Xenakis, Alejandro Pazos, Jose V\u00e1zquez-Naya<br \/>\n<em>Computer Networks<\/em>, p. 111348, Elsevier, May 10, 2025.<\/li>\n<li><strong>A comprehensive survey of Federated Intrusion Detection Systems: techniques, challenges and solutions<\/strong><br \/>\nIoannis Makris, Aikaterini Karampasi, Panagiotis Radoglou-Grammatikis, Nikolaos Episkopos, Eider Iturbe, Erkuden Rios, Nikos Piperigkos, Aris Lalos, Christos Xenakis, Thomas Lagkas, Vasileios Argyriou, Panagiotis Sarigiannidis<br \/>\n<em>Computer Science Review<\/em>, Vol. 56, p. 100717, Elsevier, May 1, 2025.<\/li>\n<li><strong>Trust Score Prediction and Management in IoT Ecosystems Using Markov Chains and MADM Techniques<\/strong><br \/>\nMichail Bampatsikos, Ilias Politis, Thodoris Ioannidis, Christos Xenakis<br \/>\n<em>IEEE Transactions on Consumer Electronics<\/em>, IEEE, January 17, 2025.<\/li>\n<\/ul>\n<h3>\ud83c\udfa4 Conferences<\/h3>\n<p>No conference publications for 2025.<\/p>\n<\/div>\n<\/details>\n<p>  <!-- 2024 --><\/p>\n<details>\n<summary>2024 Publications<\/summary>\n<div class=\"content\">\n<h3>\ud83d\udcda Books<\/h3>\n<ul>\n<li><strong>Information and Communications Security<\/strong><br \/>\nSokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis,<br \/>\n<em>Springer Nature, 2024.<\/em><\/li>\n<\/ul>\n<h3>\ud83d\udcdd Journals<\/h3>\n<ul>\n<li><strong>Game on: a performance comparison of interpolation techniques applied to Shamir\u2019s secret sharing<\/strong><br \/>\nAnastassis Voudouris, Aristomenis Tressos, Apostolis Zarras, Christos Xenakis,<br \/>\n<em>The Computer Journal, p. bxae109, Oxford University Press, November 14, 2024.<\/em><\/li>\n<li><strong>RETINA: Distributed and secure trust management for smart grid applications and energy trading<\/strong><br \/>\nVaios Bolgouras, Thodoris Ioannidis, Ilias Politis, Apostolis Zarras, Christos Xenakis,<br \/>\n<em>Sustainable Energy, Grids and Networks, Vol. 38, p. 101274, Elsevier, June 1, 2024.<\/em><\/li>\n<li><strong>How many FIDO protocols are needed? Analysing the technology, security and compliance<\/strong><br \/>\nAnna Angelogianni, Ilias Politis, Christos Xenakis,<br \/>\n<em>ACM Computing Surveys, Vol. 56, Issue 8, pp. 1-51, ACM, April 26, 2024.<\/em><\/li>\n<li><strong>INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain<\/strong><br \/>\nAristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras, Christos Xenakis,<br \/>\n<em>International Journal of Information Security, Vol. 23, Issue 1, pp. 347-371, Springer Berlin Heidelberg, February 2024.<\/em><\/li>\n<\/ul>\n<h3>\ud83c\udfa4 Conferences<\/h3>\n<ul>\n<li><strong>Deception Mechanisms for Cyber-Security Enhancement in the Internet of Things<\/strong><br \/>\nIgnacio Lacalle, Salvador Cu\u00f1at, Aristeidis Farao, Christos Xenakis, Dionysis Xenakis, Carlos E Palau,<br \/>\n<em>2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1-7, IEEE, October 21, 2024.<\/em><\/li>\n<li><strong>Roadmap to Secure 6G Networks<\/strong><br \/>\nVaios Bolgouras, Aristeidis Farao, Christos Xenakis,<br \/>\n<em>2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1-6, IEEE, October 21, 2024.<\/em><\/li>\n<li><strong>AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks<\/strong><br \/>\nGeorgios Petihakis, Aristeidis Farao, Panagiotis Bountakas, Athanasia Sabazioti, John Polley, Christos Xenakis,<br \/>\n<em>Proceedings of the 19th International Conference on Availability, Reliability and Security, pp. 1-7, July 30, 2024.<\/em><\/li>\n<li><strong>NITRO: an Interconnected 5G-IoT Cyber Range<\/strong><br \/>\nAristeidis Farao, Christoforos Ntantogian, Stylianos Karagiannis, Emmanouil Magkos, Alexandra Dritsa, Christos Xenakis,<br \/>\n<em>Proceedings of the 19th International Conference on Availability, Reliability and Security, pp. 1-6, July 30, 2024.<\/em><\/li>\n<li><strong>Integrating Hyperledger Fabric with Satellite Communications: A Revolutionary Approach for Enhanced Security and Decentralization in Space Networks<\/strong><br \/>\nAnastassios Voudouris, Aristeidis Farao, Aggeliki Panou, John Polley, Christos Xenakis,<br \/>\n<em>Proceedings of the 19th International Conference on Availability, Reliability and Security, pp. 1-8, July 30, 2024.<\/em><\/li>\n<li><strong>Leveraging Self-sovereign Identity for e-Health Applications<\/strong><br \/>\nAristeidis Farao, Georgios Paparis, Michail-Alexandros Kourtis, Margarita Anastassova, Christian Bolzmacher, St\u00e9phane Bouilland, Evangelos Markakis, Ioannis Koufos, Ilias Politis, Christos Xenakis, George Xilouris,<br \/>\n<em>International Symposium on Distributed Computing and Artificial Intelligence, pp. 340-349, Springer Nature Switzerland, June 25, 2024.<\/em><\/li>\n<li><strong>Lifecycle management of IoT devices via digital identities management and distributed ledgers solutions<\/strong><br \/>\nKonstantinos Loupos*, Sokratis Vavilis, Harris Niavis, Fotis Michalopoulos, Konstantinos Dafloukas, Antonio Skarmeta, Jes\u00fas Garc\u00eda, Angel Palomares, Hui Song, Rustem Dautov, Rosella Mancilla, Francesca Costantino, Dimitri Van Landuyt, Sam Michiels, Stefan More, Christos Xenakis, Konstantinos Krilakis,<br \/>\n<em>Proceedings of the Embedded World Conference, April 11, 2024.<\/em><\/li>\n<\/ul>\n<\/div>\n<\/details>\n<p>  <!-- 2023 --><\/p>\n<details>\n<summary>2023 Publications<\/summary>\n<div class=\"content\">\n<h3>\ud83d\udcda Books<\/h3>\n<p>No book publications for 2023.<\/p>\n<h3>\ud83d\udcdd Journals<\/h3>\n<ul>\n<li>Multi-attribute decision making-based trust score calculation in trust management in IoT<br \/>\nMichail Bampatsikos, Ilias Politis, Vaios Bolgouras, Christos Xenakis<br \/>\n<em>Proceedings of the 18th International Conference on Availability, Reliability and Security<\/em>, pp. 1-8, August 29, 2023.<\/li>\n<li>Adversarial machine learning attacks on multiclass classification of IoT network traffic<br \/>\nVasileios Pantelakis, Panagiotis Bountakas, Aristeidis Farao, Christos Xenakis<br \/>\n<em>Proceedings of the 18th International Conference on Availability, Reliability and Security<\/em>, pp. 1-8, August 29, 2023.<\/li>\n<li>Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era<br \/>\nVaios Bolgouras, Konstantinos Papadamou, Ioana Stroinea, Michail Papadakis, George Gugulea, Michael Sirivianos, Christos Xenakis<br \/>\n<em>Proceedings of the 18th International Conference on Availability, Reliability and Security<\/em>, pp. 1-8, August 29, 2023.<\/li>\n<li>Securing the Flow: Security and Privacy Tools for Flow-based Programming<br \/>\nThodoris Ioannidis, Vaios Bolgouras, Christos Xenakis, Ilias Politis<br \/>\n<em>Proceedings of the 18th International Conference on Availability, Reliability and Security<\/em>, pp. 1-6, August 29, 2023.<\/li>\n<li>A Bring Your Own Device security awareness survey among professionals<br \/>\nGeorge Petihakis, Dimitrios Kiritsis, Aristeidis Farao, Panagiotis Bountakas, Aggeliki Panou, Christos Xenakis<br \/>\n<em>Proceedings of the 18th International Conference on Availability, Reliability and Security<\/em>, pp. 1-10, August 29, 2023.<\/li>\n<li>An inclusive lifecycle approach for IoT devices trust and identity management<br \/>\nKonstantinos Loupos, Harris Niavis, Fotis Michalopoulos, George Misiakoulis, Antonio Skarmeta, Jes\u00fas Garcia, Angel Palomares, Hui Song, Rustem Dautov, Francesca Giampaolo, Rosella Mancilla, Francesca Costantino, Dimitri Van Landuyt, Sam Michiels, Stefan More, Christos Xenakis, Michail Bampatsikos, Ilias Politis, Konstantinos Krilakis, Sokratis Vavilis<br \/>\n<em>Proceedings of the 18th International Conference on Availability, Reliability and Security<\/em>, pp. 1-6, August 29, 2023.<\/li>\n<li>Towards building a self-sovereign identity framework for healthcare<br \/>\nEmmanouil G Spanakis, Ilias Politis, Evangelos Markakis, Dimitra Papatsaroucha, Athanasios Vasileios Grammatopoulos, Vaios Bolgouras, Anna Angelogianni, Christos Xenakis, Vangelis Sakkalis<br \/>\n<em>2023 45th Annual International Conference of the IEEE Engineering in Medicine &amp; Biology Society (EMBC)<\/em>, pp. 1-4, IEEE, July 24, 2023.<\/li>\n<li>OASEES: An Innovative scope for a DAO-based programmable swarm solution, for decentralizing AI applications close to data generation locations<br \/>\nIoannis P Chochliouros, Michail-Alexandros Kourtis, George Xilouris, Wouter Tavernier, Enrique Areizaga Sanchez, Margarita Anastassova, Christian Bolzmacher, Nikolay Tcholtchev, Antonello Corsi, Panagiotis Trakadas, Marta Millet, Christos Xenakis, Adnan Imeri, Francesco Bellesini, Paride D\u2019ostilio, Albertos Markakis, Ihsan Bal Engin, Antonis Litke, Lucrezia Maria Quarato, Diego Cugat, Georgios Gardikis, Charilaos Zarakovitis, Stephane Bouilland, Zaharias Zaharis, Christina Lessi, Dimitrios Arvanitozisis, Anastasia S Spiliopoulou<br \/>\n<em>IFIP International Conference on Artificial Intelligence Applications and Innovations<\/em>, pp. 91-105, Springer Nature Switzerland, June 2, 2023.<\/li>\n<li>Enhancing 3GPP CAPIF Authentication and Authorization Across Mobile Operators Using OpenID Connect and Single Sign-On<br \/>\nIoannis Stylianou, Ilias Politis, Christos Xenakis<br \/>\n<em>ICC 2023 &#8211; IEEE International Conference on Communications<\/em>, pp. 5310-5315, IEEE, May 28, 2023.<\/li>\n<\/ul>\n<h3>\ud83c\udfa4 Conferences<\/h3>\n<ul>\n<li>Defense strategies for adversarial machine learning: A survey<br \/>\nPanagiotis Bountakas, Apostolis Zarras, Alexios Lekidis, Christos Xenakis<br \/>\n<em>Computer Science Review<\/em>, Vol. 49, p. 100573, Elsevier, August 1, 2023.<\/li>\n<li>A Holistic Approach for IoT Networks\u2019 Identity and Trust Management \u2013 The ERATOSTHENES Project<br \/>\nElena Torroglosa-Garcia, Angel Palomares, Hui Song, Paul-Emmanuel Brun, Francesca Giampaolo, Dimitri Van Landuyt, Sam Michiels, Bla\u017e Podgorelec, Christos Xenakis, Michail Bampatsikos, Konstantinos Krilakis<br \/>\n<em>Internet of Things: 5th The Global IoT Summit, GIoTS 2022, Dublin, Ireland, June 20\u201323, 2022, Revised Selected Papers<\/em>, Vol. 13533, p. 338, Springer Nature, 2023.<\/li>\n<li>Helphed: Hybrid ensemble learning phishing email detection<br \/>\nPanagiotis Bountakas, Christos Xenakis<br \/>\n<em>Journal of Network and Computer Applications<\/em>, Vol. 210, p. 103545, Academic Press, January 1, 2023.<\/li>\n<\/ul>\n<\/div>\n<\/details>\n<p>    <!-- 2022 --><\/p>\n<details>\n<summary>2022 Publications<\/summary>\n<div class=\"content\">\n<h3>\ud83d\udcda Books<\/h3>\n<ul>\n<li><strong>Blue Book: A set of cybersecurity roadmaps and challenges for researchers and policymakers<\/strong><br \/>\nEvangelos Markatos, Kai Rannenberg, Elias Athanasopoulos, Marko Kompara, Panagiotis Bountakas, Panayiotis Kotzanikolaou, Sunil Chaudhary, Stephan Krenn, Said Daoudagh, Antonio Lioy, Antreas Dionysiou, Alberto Lluch Lafuente, Christos Douligeris, Harry Manifavas, Afonso Ferreira, Eda Marchetti, Simone Fischer-H\u00fcbner, Constantinos Patsakis, Vasileios Gkioulos, Joao Roberto Peres, Leonardo Horn Iwaya, Laurens Sion, Meiko Jensen, Silvia Sisinni, Wouter Joosen, Christos Xenakis<br \/>\n<em>The CyberSec4Europe Consortium<\/em>, 2022.<\/li>\n<\/ul>\n<h3>\ud83d\udcdd Journals<\/h3>\n<ul>\n<li><strong>A trusted platform module-based, pre-emptive and dynamic asset discovery tool<\/strong><br \/>\nAntonio Jesus Diaz-Honrubia, Alberto Bl\u00e1zquez Herranz, Luc\u00eda Prieto Santamar\u00eda, Ernestina Menasalvas Ruiz, Alejandro Rodr\u00edguez-Gonz\u00e1lez, Gustavo Gonzalez-Granadillo, Rodrigo Diaz, Emmanouil Panaousis, Christos Xenakis<br \/>\n<em>Journal of Information Security and Applications<\/em>, Vol. 71, p. 103350, Elsevier, December 1, 2022.<\/li>\n<li><strong>EKnad: Exploit Kits\u2019 network activity detection<\/strong><br \/>\nPanagiotis Bountakas, Christoforos Ntantogian, Christos Xenakis<br \/>\n<em>Future Generation Computer Systems<\/em>, Vol. 134, pp. 219-235, North-Holland, September 1, 2022.<\/li>\n<li><strong>SAMGRID: security authorization and monitoring module based on SealedGRID platform<\/strong><br \/>\nGeorge Suciu, Aristeidis Farao, Giorgio Bernardinetti, Ivan Palam\u00e0, Mari-Anais Sachian, Alexandru Vulpe, Marius-Constantin Vochin, Pavel Muresan, Michail Bampatsikos, Antonio Mu\u00f1oz, Christos Xenakis<br \/>\n<em>Sensors<\/em>, Vol. 22, Issue 17, p. 6527, MDPI, August 30, 2022.<\/li>\n<li><strong>A large-scale analysis of Wi-Fi passwords<\/strong><br \/>\nEleni Veroni, Christoforos Ntantogian, Christos Xenakis<br \/>\n<em>Journal of Information Security and Applications<\/em>, Vol. 67, p. 103190, Elsevier, June 1, 2022.<\/li>\n<li><strong>Security and privacy in distributed health care environments<\/strong><br \/>\nStephen V Flowerday, Christos Xenakis<br \/>\n<em>Methods of Information in Medicine<\/em>, Vol. 61, Issue 01\/02, pp. 001-002, Georg Thieme Verlag KG, May 2022.<\/li>\n<li><strong>[m] allotROPism: a metamorphic engine for malicious software variation development<\/strong><br \/>\nChristos Lyvas, Christoforos Ntantogian, Christos Xenakis<br \/>\n<em>International Journal of Information Security<\/em>, pp. 1-18, Springer Berlin Heidelberg, February 1, 2022.<\/li>\n<li><strong>Blind software-assisted conformance and security assessment of FIDO2\/WebAuthn implementations<\/strong><br \/>\nAthanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis<br \/>\n<em>Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications<\/em>, Vol. 13, Issue 2, pp. 96-127, 2022.<\/li>\n<\/ul>\n<h3>\ud83c\udfa4 Conferences<\/h3>\n<ul>\n<li><strong>Improving Network, Data and Application Security for SMEs<\/strong><br \/>\nChristos Tselios, Ilias Politis, Christos Xenakis<br \/>\n<em>Proceedings of the 17th International Conference on Availability, Reliability and Security<\/em>, pp. 1-8, August 23, 2022.<\/li>\n<li><strong>Secret sharing a key in a distributed way, Lagrange vs Newton<\/strong><br \/>\nAnastassios Voudouris, Ilias Politis, Christos Xenakis<br \/>\n<em>Proceedings of the 17th International Conference on Availability, Reliability and Security<\/em>, pp. 1-7, August 23, 2022.<\/li>\n<li><strong>GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments<\/strong><br \/>\nIoannis Kalderemidis, Aristeidis Farao, Panagiotis Bountakas, Sakshyam Panda, Christos Xenakis<br \/>\n<em>Proceedings of the 17th International Conference on Availability, Reliability and Security<\/em>, pp. 1-9, August 23, 2022.<\/li>\n<li><strong>Trusted and secure self-sovereign identity framework<\/strong><br \/>\nVaios Bolgouras, Anna Angelogianni, Ilias Politis, Christos Xenakis<br \/>\n<em>Proceedings of the 17th International Conference on Availability, Reliability and Security<\/em>, pp. 1-6, August 23, 2022.<\/li>\n<li><strong>MITRE ATT&amp;CK-driven cyber risk assessment<\/strong><br \/>\nMohamed Ahmed, Sakshyam Panda, Christos Xenakis, Emmanouil Panaousis<br \/>\n<em>Proceedings of the 17th International Conference on Availability, Reliability and Security<\/em>, pp. 1-10, August 23, 2022.<\/li>\n<li><strong>Facilitating DoS Attack Detection using Unsupervised Anomaly Detection<\/strong><br \/>\nChristos Bellas, Georgia Kougka, Athanasios Naskos, Anastasios Gounaris, Athena Vakali, Christos Xenakis, Apostolos Papadopoulos<br \/>\n<em>Proceedings of the 34th International Conference on Scientific and Statistical Database Management<\/em>, pp. 1-4, July 6, 2022.<\/li>\n<li><strong>BRIDGE: BRIDGing the gap bEtween CTI production and consumption<\/strong><br \/>\nMarios Karatisoglou, Aristeidis Farao, Vaios Bolgouras, Christos Xenakis<br \/>\n<em>2022 14th International Conference on Communications (COMM)<\/em>, pp. 1-6, IEEE, June 16, 2022.<\/li>\n<li><strong>A digital twin for the 5G era: The SPIDER cyber range<\/strong><br \/>\nFilippo Rebecchi, Antonio Pastor, Alberto Mozo, Chiara Lombardo, Roberto Bruschi, Ilias Aliferis, Roberto Doriguzzi-Corin, Panagiotis Gouvas, Antonio Alvarez Romero, Anna Angelogianni, Ilias Politis, Christos Xenakis<br \/>\n<em>2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)<\/em>, pp. 567-572, IEEE, June 14, 2022.<\/li>\n<\/ul>\n<\/div>\n<\/details>\n<p>  <!-- 2021 --><\/p>\n<details>\n<summary>2021 Publications<\/summary>\n<div class=\"content\">\n<h3>\ud83d\udcda Books<\/h3>\n<ul>\n<li><strong>A Conceptual Model for Assessing Security and Privacy Risks in Healthcare Information Infrastructures: The CUREX Approach<\/strong><br \/>\nGeorgia Kougka, Anastasios Gounaris, Apostolos Papadopoulos, Athena Vakali, Diana Navarro Llobet, Jos Dumortier, Eleni Veroni, Christos Xenakis, Gustavo Gonzalez-Granadillo<br \/>\n<em>Knowledge Modelling and Big Data Analytics in Healthcare<\/em>, CRC Press, December 8, 2021.<\/li>\n<li><strong>Cybersecurity threats in the healthcare domain and technical solutions<\/strong><br \/>\nChristoforos Ntantogian, Christos Laoudias, Antonio Jesus Diaz Honrubia, Eleni Veroni, Christos Xenakis<br \/>\n<em>Handbook of Computational Neurodegeneration<\/em>, Springer International Publishing, November 13, 2021.<\/li>\n<\/ul>\n<h3>\ud83d\udcdd Journals<\/h3>\n<ul>\n<li><strong>P2ISE: preserving project integrity in CI\/CD based on secure elements<\/strong><br \/>\nAntonio Mu\u00f1oz, Aristeidis Farao, Jordy Ryan Casas Correia, Christos Xenakis<br \/>\n<em>Information<\/em>, Vol. 12, Issue 9, MDPI, August 31, 2021.<\/li>\n<li><strong>Automated cyber and privacy risk management toolkit<\/strong><br \/>\nGustavo Gonzalez-Granadillo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis, Emmanouil Panaousis<br \/>\n<em>Sensors<\/em>, Vol. 21, Issue 16, MDPI, August 15, 2021.<\/li>\n<li><strong>Sealedgrid: Secure and interoperable platform for smart grid applications<\/strong><br \/>\nGeorge Suciu, Mari-Anais Sachian, Alexandru Vulpe, Marius Vochin, Aristeidis Farao, Nikolaos Koutroumpouchos, Christos Xenakis<br \/>\n<em>Sensors<\/em>, Vol. 21, Issue 16, MDPI, August 12, 2021.<\/li>\n<li><strong>How many FIDO protocols are needed? Surveying the design, security and market perspectives<\/strong><br \/>\nAnna Angelogianni, Ilias Politis, Christos Xenakis<br \/>\n<em>arXiv preprint<\/em> arXiv:2107.00577, June 29, 2021.<\/li>\n<li><strong>Contract-less mobile data access beyond 5G: Fully-decentralized, high-throughput and anonymous asset trading over the blockchain<\/strong><br \/>\nDionysis Xenakis, Anastasia Tsiota, Christos-Thrasyvoulos Koulis, Christos Xenakis, Nikos Passas<br \/>\n<em>IEEE Access<\/em>, Vol. 9, IEEE, May 12, 2021.<\/li>\n<li><strong>NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation<\/strong><br \/>\nChristoforos Ntantogian, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, Christos Xenakis<br \/>\n<em>Journal of Information Security and Applications<\/em>, Vol. 58, Elsevier, May 1, 2021.<\/li>\n<li><strong>P4G2Go: a privacy-preserving scheme for roaming energy consumers of the smart grid-to-go<\/strong><br \/>\nAristeidis Farao, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis<br \/>\n<em>Sensors<\/em>, Vol. 21, Issue 8, MDPI, April 11, 2021.<\/li>\n<li><strong>On an innovative architecture for digital immunity passports and vaccination certificates<\/strong><br \/>\nJohn C Polley, Ilias Politis, Christos Xenakis, Adarbad Master, Micha\u0142 K\u0119pkowski<br \/>\n<em>arXiv preprint<\/em> arXiv:2103.04142, March 6, 2021.<\/li>\n<li><strong>Building trust for smart connected devices: The challenges and pitfalls of TrustZone<\/strong><br \/>\nNikolaos Koutroumpouchos, Christoforos Ntantogian, Christos Xenakis<br \/>\n<em>Sensors<\/em>, Vol. 21, Issue 2, MDPI, January 13, 2021.<\/li>\n<\/ul>\n<h3>\ud83c\udfa4 Conferences<\/h3>\n<ul>\n<li><strong>Unveiling the user requirements of a cyber range for 5G security testing and training<\/strong><br \/>\nAnna Angelogianni, Ilias Politis, Pier Luigi Polvanesi, Antonio Pastor, Christos Xenakis<br \/>\n<em>2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)<\/em>, October 25, 2021.<\/li>\n<li><strong>A web tool for analyzing FIDO2\/WebAuthn Requests and Responses<\/strong><br \/>\nAthanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis<br \/>\n<em>Proceedings of the 16th International Conference on Availability, Reliability and Security<\/em>, August 17, 2021.<\/li>\n<li><strong>Solving the cold start problem in Trust Management in IoT<\/strong><br \/>\nMichail Bampatsikos, Ilias Politis, Christos Xenakis, Stelios CA Thomopoulos<br \/>\n<em>Proceedings of the 16th International Conference on Availability, Reliability and Security<\/em>, August 17, 2021.<\/li>\n<li><strong>A comparison of natural language processing and machine learning methods for phishing email detection<\/strong><br \/>\nPanagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis<br \/>\n<em>Proceedings of the 16th International Conference on Availability, Reliability and Security<\/em>, August 17, 2021.<\/li>\n<li><strong>A multi-factor assessment mechanism to define priorities on vulnerabilities affecting healthcare organizations<\/strong><br \/>\nGustavo Gonzalez-Granadillo, Rodrigo Diaz, Eleni Veroni, Christos Xenakis<br \/>\n<em>ITASEC\u201921: Italian Conference on Cybersecurity<\/em>, 2021.<\/li>\n<\/ul>\n<\/div>\n<\/details>\n<p>  <!-- 2020 --><\/p>\n<details>\n<summary>2020 Publications<\/summary>\n<div class=\"content\">\n<h3>\ud83d\udcda Books<\/h3>\n<p>No books published in 2020.<\/p>\n<h3>\ud83d\udcdd Journals<\/h3>\n<ul>\n<li><strong>On identifying threats and quantifying cybersecurity risks of MNOs deploying heterogeneous RATs<\/strong><br \/>\nAnna Angelogianni, Ilias Politis, Farnaz Mohammadi, Christos Xenakis<br \/>\n<em>IEEE Access<\/em>, Vol. 8, pp. 224677-224701, IEEE, December 16, 2020.<\/li>\n<li><strong>Text and Data Mining for the National Library of Greece in consideration of Internet Security and GDPR<\/strong><br \/>\nKonstantinos Vavousis, Marinos Papadopoulos, Michalis Gerolimos, Christos Xenakis<br \/>\n<em>Qualitative and Quantitative Methods in Libraries<\/em>, Vol. 9, Issue 3, pp. 441-460, October 5, 2020.<\/li>\n<li><strong>Introduction to the special issue of the journal of information security and applications on \u201ccyber security in ICS &amp; SCADA systems\u201d<\/strong><br \/>\nKevin Jones, Helge Janicke, Leandros Maglaras, Christos Xenakis<br \/>\n<em>Journal of Information Security and Applications<\/em>, Vol. 54, p. 102542, Elsevier, October 1, 2020.<\/li>\n<li><strong>Compliant and secure websites for the Greek Libraries Network of the National Library of Greece and each library-member of this Network in consideration of internet security and GDPR<\/strong><br \/>\nKonstantinos Vavousis, Marinos Papadopoulos, Michalis Gerolimos, Christos Xenakis<br \/>\n<em>Qualitative &amp; Quantitative Methods in Libraries<\/em>, Vol. 9, Issue 3, September 1, 2020.<\/li>\n<li><strong>A compliant and secure IT infrastructure for the National Library of Greece in consideration of internet security and GDPR<\/strong><br \/>\nKonstantinos Vavousis, Marinos Papadopoulos, John Polley, Christos Xenakis<br \/>\n<em>Qualitative and Quantitative Methods in Libraries<\/em>, Vol. 9, Issue 2, pp. 219-236, July 3, 2020.<\/li>\n<\/ul>\n<h3>\ud83c\udfa4 Conferences<\/h3>\n<ul>\n<li><strong>FI-WARE authorization in a Smart Grid scenario<\/strong><br \/>\nGeorge Suciu, Cristiana Istrate, Mari-Anais Sachian, Alexandru Vulpe, Marius Vochin, Aristeidis Farao, Christos Xenakis<br \/>\n<em>2020 Global Internet of Things Summit (GIoTS)<\/em>, pp. 1-5, IEEE, June 3, 2020.<\/li>\n<li><strong>ICITPM: integrity validation of software in iterative continuous integration through the use of Trusted Platform Module (TPM)<\/strong><br \/>\nAntonio Mu\u00f1oz, Aristeidis Farao, Jordy Ryan Casas Correia, Christos Xenakis<br \/>\n<em>Computer Security: ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE<\/em>, Guildford, UK, September 17\u201318, 2020, Revised Selected Papers, pp. 147-165, Springer International Publishing, 2020.<\/li>\n<li><strong>SECONDO: A platform for cybersecurity investments and cyber insurance decisions<\/strong><br \/>\nAristeidis Farao, Sakshyam Panda, Sofia Anna Menesidou, Entso Veliou, Nikolaos Episkopos, George Kalatzantonakis, Farnaz Mohammadi, Nikolaos Georgopoulos, Michael Sirivianos, Nikos Salamanos, Spyros Loizou, Michalis Pingos, John Polley, Andrew Fielder, Emmanouil Panaousis, Christos Xenakis<br \/>\n<em>Trust, Privacy and Security in Digital Business: 17th International Conference, TrustBus 2020<\/em>, Bratislava, Slovakia, September 14\u201317, 2020, Proceedings, pp. 65-74, Springer International Publishing, 2020.<\/li>\n<li><strong>Sealedgrid: A secure interconnection of technologies for smart grid applications<\/strong><br \/>\nAristeidis Farao, Juan Enrique Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis, Javier Lopez<br \/>\n<em>Critical Information Infrastructures Security: 14th International Conference, CRITIS 2019<\/em>, Link\u00f6ping, Sweden, September 23\u201325, 2019, Revised Selected Papers, pp. 169-175, Springer International Publishing, 2020.<\/li>\n<\/ul>\n<\/div>\n<\/details>\n<p>  <!-- 2019 --><\/p>\n<details>\n<summary>2019 Publications<\/summary>\n<div class=\"content\">\n<h3>\ud83d\udcda Books<\/h3>\n<ul>\n<li><strong>Privacy-Preserving Aggregation in the Smart Grid<\/strong><br \/>\nGeorgios Karopoulos, Christoforos Ntantogian, Christos Xenakis<br \/>\n<em>Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications<\/em>, IGI Global, 2019.<\/li>\n<\/ul>\n<h3>\ud83d\udcdd Journals<\/h3>\n<ul>\n<li><strong>Killing the password and preserving privacy with device-centric and attribute-based authentication<\/strong><br \/>\nKostantinos Papadamou, Savvas Zannettou, Bogdan Chifor, Sorin Teican, George Gugulea, Alberto Caponi, Annamaria Recupero, Claudio Pisa, Giuseppe Bianchi, Steven Gevers, Christos Xenakis, Michael Sirivianos<br \/>\n<em>IEEE Transactions on Information Forensics and Security<\/em>, 15:2183-2193, 2019.<\/li>\n<li><strong>The integrated holistic security and privacy framework deployed in CrowdHEALTH project<\/strong><br \/>\nStefanos Malliaros, Christos Xenakis, George Moldovan, John Mantas, Andriana Magdalinou, Lydia Montandon<br \/>\n<em>Acta Informatica Medica<\/em>, 27(5):333, 2019.<\/li>\n<li><strong>Transforming malicious code to ROP gadgets for antivirus evasion<\/strong><br \/>\nChristoforos Ntantogian, Georgios Poulios, Georgios Karopoulos, Christos Xenakis<br \/>\n<em>IET Information Security<\/em>, 13(6):570-578, 2019.<\/li>\n<li><strong>Distributed key management in microgrids<\/strong><br \/>\nVaios Bolgouras, Christoforos Ntantogian, Emmanouil Panaousis, Christos Xenakis<br \/>\n<em>IEEE Transactions on Industrial Informatics<\/em>, 16(3):2125-2133, 2019.<\/li>\n<li><strong>A survey of voice and communication protection solutions against wiretapping<\/strong><br \/>\nChristoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis<br \/>\n<em>Computers &amp; Electrical Engineering<\/em>, 77:163-178, 2019.<\/li>\n<li><strong>Evaluation of password hashing schemes in open source web platforms<\/strong><br \/>\nChristoforos Ntantogian, Stefanos Malliaros, Christos Xenakis<br \/>\n<em>Computers &amp; Security<\/em>, 84:206-224, 2019.<\/li>\n<li><strong>Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications<\/strong><br \/>\nAnastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis<br \/>\n<em>International Journal of Information Security<\/em>, 18:49-72, 2019.<\/li>\n<\/ul>\n<h3>\ud83c\udfa4 Conferences<\/h3>\n<ul>\n<li><strong>ObjectMap: Detecting insecure object deserialization<\/strong><br \/>\nNikolaos Koutroumpouchos, Georgios Lavdanis, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis<br \/>\n<em>Proceedings of the 23rd Pan-Hellenic Conference on Informatics<\/em>, Pages 67-72, 2019.<\/li>\n<li><strong>CUREX: seCUre and pRivate hEalth data eXchange<\/strong><br \/>\nFarnaz Mohammadi, Angeliki Panou, Christoforos Ntantogian, Eirini Karapistoli, Emmanouil Panaousis, Christos Xenakis<br \/>\n<em>IEEE\/WIC\/ACM International Conference on Web Intelligence-Companion Volume<\/em>, Pages 263-268, 2019.<\/li>\n<li><strong>BARRETT blockchain regulated remote attestation<\/strong><br \/>\nMichail Bampatsikos, Christoforos Ntantogian, Christos Xenakis, Stelios CA Thomopoulos<br \/>\n<em>IEEE\/WIC\/ACM International Conference on Web Intelligence-Companion Volume<\/em>, Pages 256-262, 2019.<\/li>\n<li><strong>Attribute-based access control for secure and resilient smart grids<\/strong><br \/>\nGeorge Suciu, Cristiana-Ioana Istrate, Alexandru Vulpe, Mari-Anais Sachian, Marius Constantin Vochin, Aristeidis Farao, Christos Xenakis<br \/>\n<em>6th International Symposium for ICS &amp; SCADA Cyber Security Research<\/em>, 2019.<\/li>\n<li><strong>SealedGRID: Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID<\/strong><br \/>\nAristeidis Farao, Christoforos Ntantogian, Cristiana Istrate, George Suciu, Christos Xenakis<br \/>\n<em>6th International Symposium for ICS &amp; SCADA Cyber Security Research<\/em>, 2019.<\/li>\n<li><strong>Secure edge computing with lightweight control-flow property-based attestation<\/strong><br \/>\nNikos Koutroumpouchos, Christoforos Ntantogian, Sofia-Anna Menesidou, Kaitai Liang, Panagiotis Gouvas, Christos Xenakis, Thanassis Giannetsos<br \/>\n<em>2019 IEEE Conference on Network Softwarization (NetSoft)<\/em>, Pages 84-92, 2019.<\/li>\n<\/ul>\n<\/div>\n<\/details>\n<details>\n<summary>Earlier Work<\/summary>\n<div class=\"content\">\n<ul>\n<li><a href=\"https:\/\/laboratories.ds.unipi.gr\/ssl\/conferences\/\" target=\"_blank\" rel=\"noopener\">Conferences<\/a><\/li>\n<li><a href=\"https:\/\/laboratories.ds.unipi.gr\/ssl\/books\/\" target=\"_blank\" rel=\"noopener\">Books<\/a><\/li>\n<li><a href=\"https:\/\/laboratories.ds.unipi.gr\/ssl\/journals\/\" target=\"_blank\" rel=\"noopener\">Journals<\/a><\/li>\n<\/ul>\n<\/div>\n<\/details>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover SSL&#8217;s Publications Here you can see our publications, sorted by year and category (Books, Journals, and Conferences). 2025 Publications \ud83d\udcda Books Tracing Techniques for Connected Medical Devices Vaios Bolgouras, Georgios Petychakis, Aristeidis Farao, Apostolis Zarras, Christos Xenakis Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, May 7, 2025. Cybersecurity [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"_links":{"self":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1018"}],"collection":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/comments?post=1018"}],"version-history":[{"count":27,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1018\/revisions"}],"predecessor-version":[{"id":2573,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1018\/revisions\/2573"}],"wp:attachment":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/media?parent=1018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}