Vasilis Katos

Professor Vasilis Katos

  • 01202 966736
  • vkatos at bournemouth dot ac dot uk
  • Professor and Head of Computing
  • Poole House P418, Talbot Campus, Fern Barrow, Poole, BH12 5BB
Back to top

Biography

I obtained a Diploma in Electrical Engineering from Democritus University of Thrace in Greece, an MBA from Keele University in the UK and a PhD in Computer Science (network security and cryptography) from Aston University. I am a certified Computer Hacking Forensic Investigator (CHFI). I have worked in the Industry as Information Security Consultant and served as an expert witness in Information Security for a criminal court in the UK and a misdemeanor court in Greece. My research falls in the area of digital forensics and incident response. I have participated in 2 FP7 and 3 nationally funded research projects and in a number of national and international cyberdefence exercises. I have over 80 publications in journals, book chapters and conference proceedings and serves as a referee on several reputable conferences and journals (for example, IEEE Communications Letters, Computers & Security, Information and Computer Security), has coordinated and delivered a number of workshops, both in an academic and a security professionals context...

more

Journal Articles

  • Menesidou, S.A., Katos, V. and Kambourakis, G., 2017. Cryptographic Key Management in Delay Tolerant Networks: A Survey. FUTURE INTERNET, 9 (3).
  • Tsalis, N., Mylonas, A., Nisioti, A., Gritzalis, D. and Katos, V., 2017. Exploring the protection of private browsing in desktop browsers. COMPUTERS & SECURITY, 67, 181-197.
  • Tsimperidis, I., Rostami, S. and Katos, V., 2017. Age Detection Through Keystroke Dynamics from User Authentication Failures. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 9 (1), 1-16.
  • Menesidou, S.A. and Katos, V., 2017. Opportunistic key management in delay tolerant networks. International Journal of Information and Computer Security, 9 (3), 212-228.
  • Menesidou, S.A., Vardalis, D. and Katos, V., 2016. Automated key exchange protocol evaluation in delay tolerant networks. COMPUTERS & SECURITY, 59, 1-8.
  • Tasidou, A., Soupionis, Y., Efraimidis, P., Mitrou, L. and Katos, V., 2015. Privacy-preserving, User-centric VoIP CAPTCHA Challenges: an Integrated Solution in the SIP Environment. Information and Computer Security.
  • Tsavli, M., Efraimidis, P., Katos, V. and Mitrou, L., 2015. Reengineering the user: Privacy concerns about personal data on smartphones. Information and Computer Security.
  • Tsimperidis, I., Katos, V. and Clarke, N., 2015. Language Independent Gender Identification Through Keystroke Analysis. Information and Computer Security, 23 (3), 286-301.
  • Psaroudakis, I., Katos, V. and Efraimidis, P.S., 2015. A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network. Security and Communication Networks, 8 (3), 486-500.
  • Psaroudakis, I., Katos, V., Saragiotis, P. and Mitrou, L., 2014. A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol. International Journal of Electronic Security and Digital Forensics, 6 (4), 241-267.
  • Provataki, A. and Katos, V., 2013. Differential malware forensics. Digital Investigation, 10 (4), 311-322.
  • Barmpatsalou, K., Damopoulos, D., Kambourakis, G. and Katos, V., 2013. A critical review of 7 years of Mobile Device Forensics. Digital Investigation, 10 (4), 323-349.
  • Shiaeles, S., Chryssanthou, A. and Katos, V., 2013. On-scene triage open source forensic tool chests: Are they effective? Digital Investigation, 10 (2), 99-115.
  • Katos, V., Stowell, F. and Bednar, P., 2013. Macroeconomics of privacy and security for identity management and surveillance. Kybernetes, 42 (1), 140-163.
  • Shiaeles, S.N., Katos, V., Karakos, A.S. and Papadopoulos, B.K., 2012. Real time DDoS detection using fuzzy estimators. Computers and Security, 31 (6), 782-790.
  • Karayianni, S., Katos, V. and Georgiadis, C.K., 2012. A framework for password harvesting from volatile memory. International Journal of Electronic Security and Digital Forensics, 4 (2-3), 154-163.
  • Katos, V., 2012. An integrated model for online transactions: Illuminating the black box. Information Management and Computer Security, 20 (3), 184-206.
  • Spyridopoulos, T. and Katos, V., 2011. Requirements for a forensically ready cloud storage service. International Journal of Digital Crime and Forensics, 3 (3), 19-36.
  • Aggelis, A., Sarris, E.T. and Katos, V., 2011. A location privacy extension for DVB-RCS. Radioengineering, 20 (1), 151-158.
  • Kavallaris, T. and Katos, V., 2010. On the detection of pod slurping attacks. Computers and Security, 29 (6), 680-685.
  • Bednar, P.M. and Katos, V., 2009. Diversity Networks in Digital Investigations. WDFIA.
  • Katos, V., Stowell, F. and Bednar, P., 2009. From Synergy to Symbiosis: New Directions in Security and Privacy? International Journal of Information ….
  • Katos, V., 2009. An integrated model for online transactions: methodological issues and challenges. Methodological Innovations.
  • Bednar, P.M., Katos, V. and Hennell, C., 2009. On the complexity of collaborative cyber crime investigations. Digital Evidence & Elec. Signature L. ….
  • Katos, V. and Furnell, S., 2008. The security and privacy impact of criminalising the distribution of hacking tools. Computer Fraud and Security, 2008 (7), 9-16.
  • Katos, V. and Bednar, P.M., 2008. A cyber-crime investigation framework. Computer Standards and Interfaces, 30 (4), 223-228.
  • Katos, V. and Patel, A., 2008. A partial equilibrium view on security and privacy. Information Management and Computer Security, 16 (1), 74-83.
  • Bednar, P., Welch, C. and Katos, V., 2008. Innovation management through the use of diversity networks. International Journal of Knowledge and ….
  • Katos, V., Stowell, F. and Bednar, P., 2007. Quis Custodiet Ipsos Custodies? Systemist, 29 (2), 96-105.
  • Katos, V., 2007. Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. Information Sciences, 177 (15), 3060-3073.
  • Katos, V. and Doherty, B., 2007. Exploring confusion in product ciphers through regression analysis. Information Sciences, 177 (8), 1789-1795.
  • Katos, V., 2007. Exploring confusion in product ciphers through regression analysis”, Information Sciences. Information Sciences, 177 (8), 1789.
  • Katos, V., Stowell, F. and Bednar, P., 2007. Quis Custodiet Ipsos Custodies? Systemist.
  • Adams, C. and Katos, V., 2007. Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations. Journal of Information Privacy and Security.
  • Katos, V., 2006. Forecasting Volatility of Active Phising Sites. Information Risk Management & Audit, 16 (2), 8-11.
  • Katos, V. and Adams, C., 2005. Modelling corporate wireless security and privacy. Journal of Strategic Information Systems, 14 (3), 307-321.
  • Katos, V., King, T. and Adams, C., 2005. Towards a Computer Based Training Tool for Education in Cryptography. UPGRADE Journal, V (6), 30-35.
  • Adams, C. and Katos, V., 2005. The ubiquitous mobile and location-awareness time bomb. Cutter IT Journal, 18 (6), 20-26.
  • Katos, V., 2005. A randomness test for block ciphers. Applied Mathematics and Computation, 162 (1), 29-35.
  • Katos, V., 2005. Statistical Risk Cluster Analysis for Network Segmentation. Information Risk Management & Audit, 162 (1), 7-11.
  • Adams, C. and Katos, V., 2005. Privacy challenges for location aware technologies. Mobile Information Systems II.
  • Katos, V., 2004. Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. WOSIS.
  • Katos, V., King, T. and Adams, C., 2004. Towards A Computer-Based Training Tool for Education in Cryptography.
  • Katos, V. and Alyea, W., 2001. Trust Models for Access Control. Journal of Information Technology Impact.
  • Katos, V., Psaroudakis, I., Saragiotis, P. and Mitrou, L.. A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description …. cis.aueb.gr.

Books

Chapters

  • Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S. and Marinos, L., 2017. Security Concerns in Cooperative Intelligent Transportation Systems. Intrusion Detection and Prevention for Mobile Ecosystems. CRC Press, 487-522.
  • Spyridopoulos, T. and Katos, V., 2014. Data recovery strategies for cloud environments. Cloud Technology: Concepts, Methodologies, Tools, and Applications. 377-391.
  • Spyridopoulos, T. and Katos, V., 2012. Data recovery strategies for cloud environments. Cybercrime and Cloud Forensics: Applications for Investigation Processes. 251-265.
  • Katos, V. and Efraimidis, P., 2009. Identity Assurance in the Surveillance Society (in Greek). In: Lambrinoudakis, C., Mitrou, L., Gritzalis, S. and Katsikas, S., eds. Privacy Protection in ICT: Technical and Legal Aspects. Athens: Papasotiriou.
  • Efraimidis, P. and Katos, V., 2009. Probability and Information Theory (in Greek). In: Burmester, M., Gritzalis, S., Katsikas, S. and Chryssikopoulos, V., eds. Modern Cryptography: Theory and Applications.. Papasotirou.
  • Katos, V., 2009. Managing IS Security and Privacy. mfile.narotama.ac.id.
  • Katos, V., Bednar, P. and Welch, C., 2006. Dealing with epistemic uncertainty in the SST framework. lup.lub.lu.se.

Conferences

  • Saxena, N., katos and Kumar N, 2017. Cyber-Physical Smart Grid Security Tool for Education and Training Purposes. In: International Workshop on Realigning Cyber Security Education 27 November 2017 Canberra, Australia.
  • Nisioti, A., Mylonas, A., Katos, V., Yoo, P.D. and Chryssanthou, A., 2017. You can run but you cannot hide from memory: Extracting im evidence of Android apps. 457-464.
  • Tsikrika, T., Vrochidis, S., Akhgar, B., Burnap, P., Katos, V. and Williams, M.L., 2017. 1st international workshop on search and mining terrorist online content & advances in data science for cyber security and risk on the web. 823-824.
  • Ward, J., Dogan, H., Apeh, E., Mylonas, A. and Katos, V., 2017. Using human factor approaches to an organisation’s bring your own device scheme. 396-413.
  • Nisioti, A., Heydari, M., Mylonas, A., Katos, V. and Tafreshi, V.H.F., 2017. TRAWL: Protection against rogue sites for the masses. 120-127.
  • Faily, S., Lykou, G., Partridge, A., Gritzalis, D., Mylonas, A. and Katos, V., 2016. Human-Centered Specification Exemplars for Critical Infrastructure Environments. In: 30th British HCI Group Annual Conference on People and Computers: Fusion 11-15 July 2016 Bournemouth, UK.
  • Dimitriadis, A., Efraimidis, P.S. and Katos, V., 2016. Malevolent app pairs: An android permission overpassing scheme. 431-436.
  • Fysarakis, K., Askoxylakis, I., Soultatos, O., Papaefstathiou, I., Manifavas, C., Katos, V. and IEEE, 2016. Which IoT Protocol?
  • Naik, N., Jenkins, P., Savage, N., Katos, V. and IEEE, 2016. Big Data Security Analysis Approach Using Computational Intelligence Techniques in R for Desktop Users.
  • Faily, S., Stergiopoulos, G., Katos, V. and Gritzalis, D., 2016. "Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar. 243-246.
  • Ali, R., McAlaney, J., Faily, S., Phalp, K. and Katos, V., 2015. Mitigating Circumstances in Cybercrime: a Position Paper. 1973-1977.
  • Sadok, M., Katos, V. and Bednar, P., 2014. Developing contextual understanding of information security risks. Centre for Security, Communications and Network Research, Plymouth University, UK. 1-10.
  • Tavli, M., Efraimidis, P. and Katos, V., 2014. Reengineering the user: Privacy concerns about personal data on smartphones. In: 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2014) 8-9 July 2014 Plymouth, UK. 80-89.
  • Tsochataridou, C., Arampatzis, A. and Katos, V., 2014. Improving Digital Forensics Through Data Mining. In: 4th International Conference on Advances in Information Mining and Management (IMMM 2014) 20-25 July 2014 Paris.
  • Tsimperidis, I. and Katos, V., 2013. Keystroke forensics: Are you typing on a desktop or a laptop? 89-94.
  • Gritzalis, D., Soupionis, Y., Katos, V., Psaroudakis, I., Katsaros, P. and Mentis, A., 2013. The SPHINX enigma in critical VoIP infrastructures: Human or botnet? 151-154.
  • Bednar, P., Sadok, M. and Katos, V., 2013. Contextual dependencies in information security systems. In: AIS SIGSEC and IFIP TC 11.1 Workshop on Information Security & Privacy, WISP 2013 14 September 2013 Milan, Italy. eprints.port.ac.uk.
  • Furnell, S., Clarke, N. and Katos, V., 2013. Preface. i.
  • Karayianni, S. and Katos, V., 2012. Practical password harvesting from volatile memory. 17-22.
  • Psaroudakis, I., Katos, V. and Efraimidis, P.S., 2012. A framework for anonymizing GSM calls over a smartphone VoIP network. 543-548.
  • Menesidou, S.A. and Katos, V., 2012. Authenticated key exchange (AKE) in delay tolerant networks. 49-60.
  • Clarke, N.L., Katos, V., Menesidou, S.A., Ghita, B. and Furnell, S., 2012. A novel security architecture for a space-data DTN. 342-349.
  • Chryssanthou, A. and Katos, V., 2012. Assessing forensic readiness. 107-118.
  • Tasidou, A., Efraimidis, P.S., Soupionis, Y., Mitrou, L. and Katos, V., 2012. User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges. 139-149.
  • Varka, A.M. and Katos, V., 2012. On the user acceptance of graphical passwords. 150-159.
  • Katos, V., Vrakas, D. and Katsaros, P., 2011. A framework for access control with inference constraints. 289-297.
  • Katos, V., Stowell, F. and Bednar, P., 2011. Surveillance, privacy and the law of requisite variety. 123-139.
  • Bednar, P. and Katos, V., 2011. SSD: New Challenges for Digital Forensics. ItAIS.
  • Spyridopoulos, T. and Katos, V., 2011. Towards a forensically ready cloud storage service. books.google.com.
  • Pangalos, G. and Katos, V., 2010. Information assurance and forensic readiness. 181-188.
  • Tasidou, A., Efraimidis, P.S. and Katos, V., 2010. Economics of personal data management: Fair personal information trades. 151-160.
  • Bednar, P.M. and Katos, V., 2010. Digital forensic investigations: A new frontier for informing systems. 361-371.
  • Strevens, C., Wilson, C. and Katos, V., 2010. An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education.
  • Bednar, P. and Katos, V., 2009. Addressing the human factor in information systems security. lup.lub.lu.se.
  • Kavallaris, T. and Katos, V., 2009. Detecting Data Leakage from Pod Slurping Based Attacks on a Windows XP Platform.
  • Bednar, P.M., Katos, V. and Hennell, C., 2008. Cyber-crime investigations: Complex collaborative decision making. 3-11.
  • Briggs, J., Katos, V. and Bhaludin, A., 2008. On the Security Controls of Portable Computing Devices in Healthcare Environments. In: International Network Conference 1-3 July 2008 Plymouth, UK.
  • Bednar, P.M., Katos, V. and Welch, C., 2007. Systems analysis: Exploring the spectrum of diversity. 647-657.
  • Bednar, P., Welch, C. and Katos, V., 2007. Dealing with complexity in knowledge sharing processes. 101-107.
  • Wilson, C., Katos, V. and Strevens, C., 2007. An interdisciplinary approach to forensic IT and forensic psychology education. 65-71.
  • Hennell, C. and Katos, V., 2007. A systemic approach to analysing the implications of the introduction of biometric passports. In: Furnell, S. and Clarke, N., eds. 1st International Conference in Human Aspects of Information Security Assurance 4-5 June 2007 Plymouth, UK.
  • Bednar, P., Welch, C. and Katos, V., 2006. Four valued logic: Supporting complexity in knowledge sharing processes. 29-35.
  • Katos, V. and Mavridis, I., 2006. A Practical Location Aware Access Control Solution for HTML Content in Wireless Networks. In: MediaWiN 2 April 2006 Athens. 44-50.
  • Fouliras, P.E. and Katos, V.A., 2005. A novel security protocol enhancement on distributed multicasting for video on demand. 129-136.
  • Katos, V.. Risk Cluster Analysis for Network Segmentation. books.google.com.
  • Kalentzi, E., Katos, V. and Batzios, C.. On the Scalability of the BRODESSYS Decision Support System.

Reports

Theses

  • Katos, V., 1999. Product cipher negotiation with on-line evaluation for private communication over computer networks.

PhD Students

  • Antonia Nisioti. A Data Driven Framework for Attribution and Correlation in Intrusion Detection
  • Ioannis Psaroudakis - completed, 2014. VoIP Forensics
  • Ioannis Tsimperidis - completed, 2017. Offender Profiling via Keystroke Dynamics
  • Sofianna Menesidou - completed, 2016. Cryptographic Key Management in Delay Tolerant Networks
  • Christos Iliou
  • Mohammed Al Qurashi. Intrusion Detection for IoT.

Profile of Teaching PG

  • Cyber Security (BBC)
  • Cyber Security

Profile of Teaching UG

  • Security Information and Event Management
  • Computer Security

Grants

  • IDEAL-CITIES: Intelligence-Driven Urban Internet-of-Things Ecosystems for Circular, SAfe and IncLusive Smart CITIES (European Commission, 01 Jan 2018). Awarded
  • CE2016 Exercise incident – Apt Memory Forensics Analysis (European Network and Information Security Agency, 01 Oct 2016). Completed
  • EDUWEB - Combating Digital Exclusion: Children educate digitally illiterate adults in safe and creative web (European Commission, 01 Sep 2016). In Progress
  • CE 2016 Incident Development (European Network and Information Security Agency, 01 Apr 2016). Completed
  • ' SENsing SKIN' for Monitoring-Based Maintenance of the Transport Infrastructure (SENSKIN) (H2020, 01 Jun 2015). In Progress
  • QB50 and REA CubeSats (General Secretariat for Research and Technology - NSRF, 01 Sep 2012). Completed
  • SPHINX: Robust Internet Services (General Secretariat for Research and Technology - NSRF, 01 Feb 2011). Completed
  • Space-Data Routers (FP-7, 01 Nov 2010). Completed
  • Space Internetworking Center (FP-7, 01 Sep 2010). Completed

External Responsibilities

  • EU Agency for Network and Information Security, NIS Expert (2017-2020)
  • European Commission, Reviewer (-2016)
  • Research Council of Norway, Reviewer (-2015)
  • CHIST-ERA, Reviewer (-2016)

Qualifications

  • PGCE in Teaching, HE (Portsmouth University, 2006)
  • PhD in Computer Science (Aston University, 2000)
  • MBA in Business Administration (Keele University, 1996)
  • MEng in Electrical and Computer Engineering (Democritus University of Thrace, 1994)

Memberships

  • EU Agency for Network and Information Security (ENISA), NIS Expert (2017-2020),
  • Information Audit and Control Association (ISACA), Academic Advocate (2007-), https://www.isaca.org/pages/default.aspx
  • Institute of Electrical and Electronics Engineers (IEEE), Member,
The data on this page was last updated at 04:01 on December 18, 2017.