Vasilis Katos

Professor Vasilis Katos

  • 01202 966736
  • vkatos at bournemouth dot ac dot uk
  • Professor and Head of Computing
  • Poole House P323, Talbot Campus, Fern Barrow, Poole, BH12 5BB
Back to top


I obtained a Diploma in Electrical Engineering from Democritus University of Thrace in Greece, an MBA from Keele University in the UK and a PhD in Computer Science (network security and cryptography) from Aston University. I am a certified Computer Hacking Forensic Investigator (CHFI). I have worked in the Industry as Information Security Consultant and served as an expert witness in Information Security for a criminal court in the UK and a misdemeanor court in Greece. My research falls in the area of digital forensics and incident response. I have participated in 2 FP7 and 3 nationally funded research projects and in a number of national and international cyberdefence exercises. I have over 80 publications in journals, book chapters and conference proceedings and serves as a referee on several reputable conferences and journals (for example, IEEE Communications Letters, Computers & Security, Information and Computer Security), has coordinated and delivered a number of workshops, both in an academic and a security professionals context...


Journal Articles

  • Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D. and Pangalos, G., 2018. A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness. International Journal of Systems and Society, 4 (2).
  • Simou, S., Kalloniatis, C., Gritzalis, S. and Katos, V., 2018. A framework for designing cloud forensic-enabled services (CFeS). Requirements Engineering, 1-28.
  • Menesidou, S.A., Katos, V. and Kambourakis, G., 2017. Cryptographic key management in delay tolerant networks: A survey. Future Internet, 9 (3).
  • Tsalis, N., Mylonas, A., Nisioti, A., Gritzalis, D. and Katos, V., 2017. Exploring the protection of private browsing in desktop browsers. Computers and Security, 67, 181-197.
  • Menesidou, S.A. and Katos, V., 2017. Opportunistic key management in delay tolerant networks. International Journal of Information and Computer Security, 9 (3), 212-228.
  • Tsimperidis, I., Rostami, S. and Katos, V., 2017. Age detection through keystroke dynamics from user authentication failures. International Journal of Digital Crime and Forensics, 9 (1), 1-16.
  • Menesidou, S.A., Vardalis, D. and Katos, V., 2016. Automated key exchange protocol evaluation in delay tolerant networks. Computers and Security, 59, 1-8.
  • Tasidou, A., Soupionis, Y., Efraimidis, P., Mitrou, L. and Katos, V., 2015. Privacy-preserving, User-centric VoIP CAPTCHA Challenges: an Integrated Solution in the SIP Environment. Information and Computer Security.
  • Tsavli, M., Efraimidis, P., Katos, V. and Mitrou, L., 2015. Reengineering the user: Privacy concerns about personal data on smartphones. Information and Computer Security.
  • Tsimperidis, I., Katos, V. and Clarke, N., 2015. Language Independent Gender Identification Through Keystroke Analysis. Information and Computer Security, 23 (3), 286-301.
  • Psaroudakis, I., Katos, V. and Efraimidis, P.S., 2015. A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network. Security and Communication Networks, 8 (3), 486-500.
  • Psaroudakis, I., Katos, V., Saragiotis, P. and Mitrou, L., 2014. A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol. International Journal of Electronic Security and Digital Forensics, 6 (4), 241-267.
  • Barmpatsalou, K., Damopoulos, D., Kambourakis, G. and Katos, V., 2013. A critical review of 7 years of Mobile Device Forensics. Digital Investigation, 10 (4), 323-349.
  • Provataki, A. and Katos, V., 2013. Differential malware forensics. Digital Investigation, 10 (4), 311-322.
  • Shiaeles, S., Chryssanthou, A. and Katos, V., 2013. On-scene triage open source forensic tool chests: Are they effective? Digital Investigation, 10 (2), 99-115.
  • Katos, V., Stowell, F. and Bednar, P., 2013. Macroeconomics of privacy and security for identity management and surveillance. Kybernetes, 42 (1), 140-163.
  • Shiaeles, S.N., Katos, V., Karakos, A.S. and Papadopoulos, B.K., 2012. Real time DDoS detection using fuzzy estimators. Computers and Security, 31 (6), 782-790.
  • Karayianni, S., Katos, V. and Georgiadis, C.K., 2012. A framework for password harvesting from volatile memory. International Journal of Electronic Security and Digital Forensics, 4 (2-3), 154-163.
  • Katos, V., 2012. An integrated model for online transactions: Illuminating the black box. Information Management and Computer Security, 20 (3), 184-206.
  • Spyridopoulos, T. and Katos, V., 2011. Requirements for a forensically ready cloud storage service. International Journal of Digital Crime and Forensics, 3 (3), 19-36.
  • Aggelis, A., Sarris, E.T. and Katos, V., 2011. A location privacy extension for DVB-RCS. Radioengineering, 20 (1), 151-158.
  • Kavallaris, T. and Katos, V., 2010. On the detection of pod slurping attacks. Computers and Security, 29 (6), 680-685.
  • Bednar, P.M. and Katos, V., 2009. Diversity Networks in Digital Investigations. WDFIA.
  • Bednar, P.M., Katos, V. and Hennell, C., 2009. On the complexity of collaborative cyber crime investigations. Digital Evidence & Elec. Signature L. ….
  • Katos, V., 2009. An integrated model for online transactions: methodological issues and challenges. Methodological Innovations.
  • Katos, V., Stowell, F. and Bednar, P., 2009. From Synergy to Symbiosis: New Directions in Security and Privacy? International Journal of Information ….
  • Katos, V. and Furnell, S., 2008. The security and privacy impact of criminalising the distribution of hacking tools. Computer Fraud and Security, 2008 (7), 9-16.
  • Katos, V. and Bednar, P.M., 2008. A cyber-crime investigation framework. Computer Standards and Interfaces, 30 (4), 223-228.
  • Katos, V. and Patel, A., 2008. A partial equilibrium view on security and privacy. Information Management and Computer Security, 16 (1), 74-83.
  • Bednar, P., Welch, C. and Katos, V., 2008. Innovation management through the use of diversity networks. International Journal of Knowledge and ….
  • Katos, V., Stowell, F. and Bednar, P., 2007. Quis Custodiet Ipsos Custodies? Systemist, 29 (2), 96-105.
  • Katos, V., 2007. Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. Information Sciences, 177 (15), 3060-3073.
  • Katos, V. and Doherty, B., 2007. Exploring confusion in product ciphers through regression analysis. Information Sciences, 177 (8), 1789-1795.
  • Katos, V., 2007. Exploring confusion in product ciphers through regression analysis”, Information Sciences. Information Sciences, 177 (8), 1789.
  • Adams, C. and Katos, V., 2007. Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations. Journal of Information Privacy and Security.
  • Katos, V., Stowell, F. and Bednar, P., 2007. Quis Custodiet Ipsos Custodies? Systemist.
  • Katos, V., 2006. Forecasting Volatility of Active Phising Sites. Information Risk Management & Audit, 16 (2), 8-11.
  • Katos, V. and Adams, C., 2005. Modelling corporate wireless security and privacy. Journal of Strategic Information Systems, 14 (3), 307-321.
  • Katos, V., King, T. and Adams, C., 2005. Towards a Computer Based Training Tool for Education in Cryptography. UPGRADE Journal, V (6), 30-35.
  • Adams, C. and Katos, V., 2005. The ubiquitous mobile and location-awareness time bomb. Cutter IT Journal, 18 (6), 20-26.
  • Katos, V., 2005. A randomness test for block ciphers. Applied Mathematics and Computation, 162 (1), 29-35.
  • Katos, V., 2005. Statistical Risk Cluster Analysis for Network Segmentation. Information Risk Management & Audit, 162 (1), 7-11.
  • Adams, C. and Katos, V., 2005. Privacy challenges for location aware technologies. Mobile Information Systems II.
  • Katos, V., 2004. Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. WOSIS.
  • Katos, V., King, T. and Adams, C., 2004. Towards A Computer-Based Training Tool for Education in Cryptography.
  • Katos, V. and Alyea, W., 2001. Trust Models for Access Control. Journal of Information Technology Impact.
  • Katos, V., Psaroudakis, I., Saragiotis, P. and Mitrou, L.. A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description ….



  • Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S. and Marinos, L., 2017. Security Concerns in Cooperative Intelligent Transportation Systems. Intrusion Detection and Prevention for Mobile Ecosystems. CRC Press, 487-522.
  • Spyridopoulos, T. and Katos, V., 2014. Data recovery strategies for cloud environments. Cloud Technology: Concepts, Methodologies, Tools, and Applications. 377-391.
  • Spyridopoulos, T. and Katos, V., 2012. Data recovery strategies for cloud environments. Cybercrime and Cloud Forensics: Applications for Investigation Processes. 251-265.
  • Katos, V. and Efraimidis, P., 2009. Identity Assurance in the Surveillance Society (in Greek). In: Lambrinoudakis, C., Mitrou, L., Gritzalis, S. and Katsikas, S., eds. Privacy Protection in ICT: Technical and Legal Aspects. Athens: Papasotiriou.
  • Efraimidis, P. and Katos, V., 2009. Probability and Information Theory (in Greek). In: Burmester, M., Gritzalis, S., Katsikas, S. and Chryssikopoulos, V., eds. Modern Cryptography: Theory and Applications.. Papasotirou.
  • Katos, V., 2009. Managing IS Security and Privacy.
  • Katos, V., Bednar, P. and Welch, C., 2006. Dealing with epistemic uncertainty in the SST framework.




  • Katos, V., 1999. Product cipher negotiation with on-line evaluation for private communication over computer networks.

PhD Students

  • Mohammed Al Qurashi. Intrusion Detection for IoT.
  • Christos Iliou
  • Sofianna Menesidou - completed, 2016. Cryptographic Key Management in Delay Tolerant Networks
  • Ioannis Tsimperidis - completed, 2017. Offender Profiling via Keystroke Dynamics
  • Ioannis Psaroudakis - completed, 2014. VoIP Forensics
  • Antonia Nisioti. A Data Driven Framework for Attribution and Correlation in Intrusion Detection

Profile of Teaching PG

  • Cyber Security
  • Cyber Security (BBC)

Profile of Teaching UG

  • Computer Security
  • Security Information and Event Management


  • Online Business Models Infringing Illegal IPTV and Cardsharing (EU Intellectual Property Office, 01 Sep 2018). Awarded
  • WIDECERT: Widening BU-CERT Threat Intelligence activities (Innovate UK/DCMS, 01 Feb 2018). Completed
  • IDEAL-CITIES: Intelligence-Driven Urban Internet-of-Things Ecosystems for Circular, SAfe and IncLusive Smart CITIES (European Commission, 01 Jan 2018). Awarded
  • CE2016 Exercise incident – Apt Memory Forensics Analysis (European Network and Information Security Agency, 01 Oct 2016). Completed
  • EDUWEB - Combating Digital Exclusion: Children educate digitally illiterate adults in safe and creative web (European Commission, 01 Sep 2016). In Progress
  • CE 2016 Incident Development (European Network and Information Security Agency, 01 Apr 2016). Completed
  • ' SENsing SKIN' for Monitoring-Based Maintenance of the Transport Infrastructure (SENSKIN) (H2020, 01 Jun 2015). In Progress
  • QB50 and REA CubeSats (General Secretariat for Research and Technology - NSRF, 01 Sep 2012). Completed
  • SPHINX: Robust Internet Services (General Secretariat for Research and Technology - NSRF, 01 Feb 2011). Completed
  • Space-Data Routers (FP-7, 01 Nov 2010). Completed
  • Space Internetworking Center (FP-7, 01 Sep 2010). Completed

External Responsibilities

  • EU Agency for Network and Information Security, NIS Expert (2017-2020)
  • CHIST-ERA, Reviewer (-2016)
  • Research Council of Norway, Reviewer (-2015)
  • European Commission, Reviewer (-2016)


  • MEng in Electrical and Computer Engineering (Democritus University of Thrace, 1994)
  • MBA in Business Administration (Keele University, 1996)
  • PhD in Computer Science (Aston University, 2000)
  • PGCE in Teaching, HE (Portsmouth University, 2006)


  • EU Agency for Network and Information Security (ENISA), NIS Expert (2017-2020),
  • Information Audit and Control Association (ISACA), Academic Advocate (2007-),
  • Institute of Electrical and Electronics Engineers (IEEE), Member,
The data on this page was last updated at 04:09 on July 18, 2018.