Vasilis Katos

Professor Vasilis Katos

  • 01202 966736
  • vkatos at bournemouth dot ac dot uk
  • Professor and Head of Computing
  • Poole House P323, Talbot Campus, Fern Barrow, Poole, BH12 5BB
Back to top

Biography

I obtained a Diploma in Electrical Engineering from Democritus University of Thrace in Greece, an MBA from Keele University in the UK and a PhD in Computer Science (network security and cryptography) from Aston University. I am a certified Computer Hacking Forensic Investigator (CHFI). I have worked in the Industry as Information Security Consultant and served as an expert witness in Information Security for a criminal court in the UK and a misdemeanor court in Greece. My research falls in the area of digital forensics and incident response. I have participated in 2 FP7 and 3 nationally funded research projects and in a number of national and international cyberdefence exercises. I have over 100 publications in journals, book chapters and conference proceedings and serves as a referee on several reputable conferences and journals (for example, IEEE Communications Letters, Computers & Security, Information and Computer Security), has coordinated and delivered a number of workshops, both in an academic and a security professionals context...

more

Journal Articles

Books

Chapters

  • Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S. and Marinos, L., 2017. Security Concerns in Cooperative Intelligent Transportation Systems. Intrusion Detection and Prevention for Mobile Ecosystems. CRC Press, 487-522.
  • Spyridopoulos, T. and Katos, V., 2014. Data recovery strategies for cloud environments. Cloud Technology: Concepts, Methodologies, Tools, and Applications. 377-391.
  • Katos, V. and Efraimidis, P., 2009. Identity Assurance in the Surveillance Society (in Greek). In: Lambrinoudakis, C., Mitrou, L., Gritzalis, S. and Katsikas, S., eds. Privacy Protection in ICT: Technical and Legal Aspects. Athens: Papasotiriou.
  • Efraimidis, P. and Katos, V., 2009. Probability and Information Theory (in Greek). In: Burmester, M., Gritzalis, S., Katsikas, S. and Chryssikopoulos, V., eds. Modern Cryptography: Theory and Applications.. Papasotirou.
  • Katos, V., 2009. Managing IS Security and Privacy. mfile.narotama.ac.id.
  • Katos, V., Bednar, P. and Welch, C., 2006. Dealing with epistemic uncertainty in the SST framework. lup.lub.lu.se.

Conferences

  • Alexandris, G., Katos, V., Alexaki, S. and Hatzivasilis, G., 2018. Blockchains as Enablers for Auditing Cooperative Circular Economy Networks.
  • Alexaki, S., Alexandris, G., Katos, V. and Petroulakis, N., 2018. Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions. In: IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks 17 September-19 October 2018 Barcelona.
  • Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D. and Pangalos, G., 2018. Towards a Threat Intelligence Informed Digital Forensics Readiness Framework. In: Twenty-Fifth European Conference on Information Systems (ECIS) 6 June 2017 Guimarães, Portugal.
  • Saxena, N., Katos, V. and Kumar N, 2017. Cyber-Physical Smart Grid Security Tool for Education and Training Purposes. In: International Workshop on Realigning Cyber Security Education 27 November 2017 Canberra, Australia.
  • Ward, J., Dogan, H., Apeh, E., Mylonas, A. and Katos, V., 2017. Using Human Factor Approaches to an Organisation’s Bring Your Own Device scheme. In: the 5th International Conference on Human Aspects of Information Security, Privacy and Trust, 2017 8 July-14 April 2017 Vancouver, Canada.
  • Nisioti, A., Mylonas, A., Katos, V., Yoo, P.D. and Chryssanthou, A., 2017. You can run but you cannot hide from memory: Extracting IM evidence of Android apps. 457-464.
  • Nisioti, A., Heydari, M., Mylonas, A., Katos, V. and Tafreshi, V.H.F., 2017. TRAWL: Protection against rogue sites for the masses. 120-127.
  • Naik, N., Jenkins, P., Savage, N. and Katos, V., 2017. Big data security analysis approach using Computational Intelligence techniques in R for desktop users.
  • Akhgar, B., Burnap, P., Katos, V. and Williams, M.L., 2017. 1st international workshop on search and mining terrorist online content & advances in data science for cyber security and risk on the web. 823-824.
  • Fysarakis, K., Askoxylakis, I., Manifavas, C., Soultatos, O., Papaefstathiou, I. and Katos, V., 2016. Which IoT Protocol? Comparing standardized approaches over a common M2M application. In: IEEE Globecom 4 December-8 July 2016 Washington.
  • Faily, S., Gritzalis, D., Lykou, G., Mylonas, A., Partridge, A. and Katos, V., 2016. Human-centered specification exemplars for critical infrastructure environments.
  • Ali, R., McAlaney, J., Faily, S., Phalp, K. and Katos, V., 2015. Mitigating Circumstances in Cybercrime: a Position Paper. In: 3rd International Workshop on Cybercrimes and Emerging Web Environments 26-28 October 2015 Liverpool, UK.
  • Faily, S., Stergiopoulos, G., Katos, V. and Gritzalis, D., 2015. "Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar. In: 10th International Conference on Critical Information Infrastructures Security 5-7 October 2015 Berlin, Germany. Springer.
  • Tsochataridou, C., Arampatzis, A. and Katos, V., 2014. Improving Digital Forensics Through Data Mining. In: 4th International Conference on Advances in Information Mining and Management (IMMM 2014) 20-25 July 2014 Paris.
  • Tavli, M., Efraimidis, P. and Katos, V., 2014. Reengineering the user: Privacy concerns about personal data on smartphones. In: 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2014) 8-9 July 2014 Plymouth, UK. 80-89.
  • Sadok, M., Katos, V. and Bednar, P., 2014. Developing contextual understanding of information security risks. Centre for Security, Communications and Network Research, Plymouth University, UK. 1-10.
  • Bednar, P., Sadok, M. and Katos, V., 2013. Contextual dependencies in information security systems. In: AIS SIGSEC and IFIP TC 11.1 Workshop on Information Security & Privacy, WISP 2013 14 September 2013 Milan, Italy. eprints.port.ac.uk.
  • Varka, A.M. and Katos, V., 2012. On the user acceptance of graphical passwords. 150-159.
  • Tasidou, A., Efraimidis, P.S., Soupionis, Y., Mitrou, L. and Katos, V., 2012. User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges. 139-149.
  • Chryssanthou, A. and Katos, V., 2012. Assessing forensic readiness. 107-118.
  • Bednar, P. and Katos, V., 2011. SSD: New Challenges for Digital Forensics. ItAIS.
  • Spyridopoulos, T. and Katos, V., 2011. Towards a forensically ready cloud storage service. books.google.com.
  • Katos, V., 2010. Digital forensic investigations: A new frontier for informing systems. 361-371.
  • Strevens, C., Wilson, C. and Katos, V., 2010. An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education.
  • Kavallaris, T. and Katos, V., 2009. Detecting Data Leakage from Pod Slurping Based Attacks on a Windows XP Platform.
  • Bednar, P. and Katos, V., 2009. Addressing the human factor in information systems security. lup.lub.lu.se.
  • Briggs, J., Katos, V. and Bhaludin, A., 2008. On the Security Controls of Portable Computing Devices in Healthcare Environments. In: International Network Conference 1-3 July 2008 Plymouth, UK.
  • Strevens, C., 2007. An interdisciplinary approach to forensic IT and forensic psychology education. 65-71.
  • Hennell, C. and Katos, V., 2007. A systemic approach to analysing the implications of the introduction of biometric passports. In: Furnell, S. and Clarke, N., eds. 1st International Conference in Human Aspects of Information Security Assurance 4-5 June 2007 Plymouth, UK.
  • Katos, V. and Mavridis, I., 2006. A Practical Location Aware Access Control Solution for HTML Content in Wireless Networks. In: MediaWiN 2 April 2006 Athens. 44-50.
  • Kalentzi, E., Katos, V. and Batzios, C.. On the Scalability of the BRODESSYS Decision Support System.
  • Katos, V.. Risk Cluster Analysis for Network Segmentation. books.google.com.

Reports

Theses

  • Katos, V., 1999. Product cipher negotiation with on-line evaluation for private communication over computer networks.

PhD Students

  • Mohammed Al Qurashi. Intrusion Detection for IoT.
  • Christos Iliou
  • Sofianna Menesidou - completed, 2016. Cryptographic Key Management in Delay Tolerant Networks
  • Ioannis Tsimperidis - completed, 2017. Offender Profiling via Keystroke Dynamics
  • Ioannis Psaroudakis - completed, 2014. VoIP Forensics
  • Amalia Damianou. Digital Forensics in Smart, Circular Cities

Profile of Teaching PG

  • Cyber Security
  • Cyber Security (BBC)

Profile of Teaching UG

  • Computer Security
  • Security Information and Event Management

Grants

  • ECHO: European network of Cybersecurity centres and competence Hub for innovation and Operations (EC/H2020/SU-ICT-3, 01 Nov 2018). Awarded
  • Online Business Models Infringing Illegal IPTV and Cardsharing (EU Intellectual Property Office, 01 Sep 2018). Awarded
  • WIDECERT: Widening BU-CERT Threat Intelligence activities (Innovate UK/DCMS, 01 Feb 2018). Completed
  • IDEAL-CITIES: Intelligence-Driven Urban Internet-of-Things Ecosystems for Circular, SAfe and IncLusive Smart CITIES (European Commission, 01 Jan 2018). Awarded
  • CE2016 Exercise incident – Apt Memory Forensics Analysis (European Network and Information Security Agency, 01 Oct 2016). Completed
  • EDUWEB - Combating Digital Exclusion: Children educate digitally illiterate adults in safe and creative web (European Commission, 01 Sep 2016). Completed
  • CE 2016 Incident Development (European Network and Information Security Agency, 01 Apr 2016). Completed
  • ' SENsing SKIN' for Monitoring-Based Maintenance of the Transport Infrastructure (SENSKIN) (H2020, 01 Jun 2015). In Progress
  • QB50 and REA CubeSats (General Secretariat for Research and Technology - NSRF, 01 Sep 2012). Completed
  • SPHINX: Robust Internet Services (General Secretariat for Research and Technology - NSRF, 01 Feb 2011). Completed
  • Space-Data Routers (FP-7, 01 Nov 2010). Completed
  • Space Internetworking Center (FP-7, 01 Sep 2010). Completed

External Responsibilities

  • EU Agency for Network and Information Security, NIS Expert (2017-2020)
  • CHIST-ERA, Reviewer (-2016)
  • Research Council of Norway, Reviewer (-2015)
  • European Commission, Reviewer (-2016)

Qualifications

  • MEng in Electrical and Computer Engineering (Democritus University of Thrace, 1994)
  • MBA in Business Administration (Keele University, 1996)
  • PhD in Computer Science (Aston University, 2000)
  • PGCE in Teaching, HE (Portsmouth University, 2006)

Memberships

  • EU Agency for Network and Information Security (ENISA), NIS Expert (2017-2020),
  • Information Audit and Control Association (ISACA), Academic Advocate (2007-), https://www.isaca.org/pages/default.aspx
  • Institute of Electrical and Electronics Engineers (IEEE), Member,
The data on this page was last updated at 04:10 on January 19, 2019.