Vasilis Katos

Professor Vasilis Katos

  • Professor
  • Poole House P323, Talbot Campus, Fern Barrow, Poole, BH12 5BB
Back to top

Biography

I obtained a Diploma in Electrical Engineering from Democritus University of Thrace in Greece, an MBA from Keele University in the UK and a PhD in Computer Science (network security and cryptography) from Aston University. I am a certified Computer Hacking Forensic Investigator (CHFI). I have worked in the Industry as Information Security Consultant and served as an expert witness in Information Security in the UK and Greece. My research falls in the area of digital forensics and incident response. I have participated in FP7, H2020 and nationally funded research projects and in a number of national and international cyberdefence exercises. I have over 130 publications in journals, book chapters and conference proceedings and serves as a referee on several reputable conferences and journals (for example, IEEE Communications Letters, Computers & Security, Information and Computer Security), has coordinated and delivered a number of workshops, both in an academic and a security professionals context...

more

Journal Articles

  • Shah, R., Cemiloglu, D., Yucel, C., Ali, R. and Katos, V., 2024. Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices. International Journal of Information Security.
  • Lockett, A., Chalkias, I., Yucel, C., Henriksen-Bulmer, J. and Katos, V., 2023. Investigating IPTV Malware in the Wild. Future Internet, 15 (10).
  • Zheng, G., Chai, W.K., Zhang, J. and Katos, V., 2023. VDGCNeT: A novel network-wide Virtual Dynamic Graph Convolution Neural network and Transformer-based traffic prediction model. Knowledge-Based Systems, 275.
  • Damianou, A., Vayona, A., Demetriou, G. and Katos, V., 2023. An actionable maturity planning model for smart, circular cities. Cities, 140.
  • Zheng, G., Chai, W.K., Duanmu, J.L. and Katos, V., 2023. Hybrid deep learning models for traffic prediction in large-scale road networks. Information Fusion, 92, 93-114.
  • Zheng, G., Chai, W.K. and Katos, V., 2022. A dynamic spatial–temporal deep learning framework for traffic speed prediction on large-scale road networks. Expert Systems with Applications, 195.
  • Deutrom, J., Katos, V., Al-Mourad, M.B. and Ali, R., 2022. The Relationships between Gender, Life Satisfaction, Loneliness and Problematic Internet Use during COVID-19: Does the Lockdown Matter? International Journal of Environmental Research and Public Health, 19 (3).
  • Deutrom, J., Katos, V. and Ali, R., 2022. Loneliness, life satisfaction, problematic internet use and security behaviours: re-examining the relationships when working from home during COVID-19. Behaviour and Information Technology, 41 (14), 3161-3175.
  • Simou, S., Kalloniatis, C., Gritzalis, S., Katos, V. and Psalidas, M., 2022. Revised forensic framework validation and cloud forensic readiness. International Journal of Electronic Governance, 14 (1-2), 236-263.
  • Jarvis, P.-D., Damianou, A., Ciobanu, C. and Katos, V., 2021. Vulnerability Exposure Driven Intelligence in Smart, Circular Cities. Digital Threats: Research and Practice.
  • Casino, F., Lykousas, N., Katos, V. and Patsakis, C., 2021. Unearthing malicious campaigns and actors from the blockchain DNS ecosystem. Computer Communications, 179, 217-230.
  • Zheng, G., Chai, W.K., Katos, V. and Walton, M., 2021. A joint temporal-spatial ensemble model for short-term traffic prediction. Neurocomputing, 457, 26-39.
  • Iliou, C., Kostoulas, T., Tsikrika, T., Katos, V., Vrochidis, S. and Kompatsiaris, I., 2021. Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics. Digital Threats: Research and Practice, 2 (3).
  • Tsimperidis, I., Yucel, C. and Katos, V., 2021. Age and gender as cyber attribution features in keystroke dynamic-based user classification processes. Electronics (Switzerland), 10 (7).
  • Apostolopoulos, T., Katos, V., Choo, K.K.R. and Patsakis, C., 2021. Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks. Future Generation Computer Systems, 116, 393-405.
  • Tsimperidis, I., Yoo, P.D., Taha, K., Mylonas, A. and Katos, V., 2021. R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification. IEEE Transactions on Cybernetics, 50 (2), 525-535.
  • Hatzivasilis, G., Soultatos, O., Chatziadam, P., Fysarakis, K., Askoxylakis, I., Ioannidis, S., Alexandris, G., Katos, V. and Spanoudakis, G., 2021. WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device. IEEE Transactions on Sustainable Computing, 6 (1), 4-18.
  • Qurashi, M.A., Angelopoulos, C.M. and Katos, V., 2020. An architecture for resilient intrusion detection in ad-hoc networks. Journal of Information Security and Applications, 53.
  • Miaoudakis, A., Fysarakis, K., Petroulakis, N., Alexaki, S., Alexandirs, G., Ioannidis, S., Spanoudakis, G., Katos, V. and Verikoukis, C., 2020. Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of “Looping Smart Assets”. IEEE Vehicular Technology Magazine.
  • Angelopoulos, K., Katos, V. and Damianou, A., 2020. DHP Framework: Digital Health Passports Using Blockchain - Use case on international tourism during the COVID-19 pandemic. Arxiv.
  • Hatzivasilis, G., Soultatos, O., Ioannidis, S., Spanoudakis, G., Katos, V. and Demetriou, G., 2020. MobileTrust: Secure Knowledge Integration in VANETs. ACM Transactions on Cyber-Physical Systems, 4 (3).
  • Rantos, K., Spyros, A., Papanikolaou, A., Kritsas, A., Ilioudis, C. and Katos, V., 2020. Interoperability challenges in the cybersecurity information sharing ecosystem. Computers, 9 (1).
  • Patsakis, C., Casino, F. and Katos, V., 2020. Encrypted and covert DNS queries for botnets: Challenges and countermeasures. Computers and Security, 88.
  • Patsakis, C., Casino, F., Lykousas, N. and Katos, V., 2020. Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS. IEEE Access, 8, 118559-118571.
  • Walshe, M., Epiphaniou, G., Al-Khateeb, H., Hammoudeh, M., Katos, V. and Dehghantanha, A., 2019. Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks, 95.
  • Simou, S., Kalloniatis, C., Gritzalis, S. and Katos, V., 2019. A framework for designing cloud forensic-enabled services (CFeS). Requirements Engineering, 24 (3), 403-430.
  • Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D. and Pangalos, G., 2019. Improving forensic triage efficiency through Cyber Threat Intelligence. Future Internet, 11 (7).
  • Valkanis, A., Iossifides, A., Chatzimisios, P., Angelopoulos, M. and Katos, V., 2019. IEEE 802.11ax Spatial reuse improvement: An interference-based channel-access algorithm. IEEE Vehicular Technology Magazine, 14 (2), 78-84.
  • Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D. and Pangalos, G.J., 2019. Actionable threat intelligence for digital forensics readiness. Information and Computer Security, 27 (2), 273-291.
  • Hatzivasilis, G., Soultatos, O., Chatziadam, P., Fysarakis, K., Askoxylakis, I., Ioannidis, S., Alexandris, G., Katos, V. and Spanoudakis, G., 2019. WARDOG: Awareness detection watchbog for Botnet infection on the host device. IEEE Transactions on Sustainable Computing, 1.
  • Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D. and Pangalos, G., 2018. A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness. International Journal of Systems and Society, 4 (2).
  • Nisioti, A., Mylonas, A., Yoo, P.D. and Katos, V., 2018. From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods. IEEE Communications Surveys and Tutorials, 20 (4), 3369-3388.
  • Menesidou, S.A., Katos, V. and Kambourakis, G., 2017. Cryptographic key management in delay tolerant networks: A survey. Future Internet, 9 (3).
  • Tsalis, N., Mylonas, A., Nisioti, A., Gritzalis, D. and Katos, V., 2017. Exploring the protection of private browsing in desktop browsers. Computers and Security, 67, 181-197.
  • Menesidou, S.A. and Katos, V., 2017. Opportunistic key management in delay tolerant networks. International Journal of Information and Computer Security, 9 (3), 212-228.
  • Tsimperidis, I., Rostami, S. and Katos, V., 2017. Age detection through keystroke dynamics from user authentication failures. International Journal of Digital Crime and Forensics, 9 (1), 1-16.
  • Menesidou, S.A., Vardalis, D. and Katos, V., 2016. Automated key exchange protocol evaluation in delay tolerant networks. Computers and Security, 59, 1-8.
  • Tasidou, A., Soupionis, Y., Efraimidis, P., Mitrou, L. and Katos, V., 2015. Privacy-preserving, User-centric VoIP CAPTCHA Challenges: an Integrated Solution in the SIP Environment. Information and Computer Security.
  • Tsavli, M., Efraimidis, P., Katos, V. and Mitrou, L., 2015. Reengineering the user: Privacy concerns about personal data on smartphones. Information and Computer Security.
  • Psaroudakis, I., Katos, V. and Efraimidis, P.S., 2015. A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network. Security and Communication Networks, 8 (3), 486-500.
  • Tsimperidis, I., Katos, V. and Clarke, N., 2015. Language Independent Gender Identification Through Keystroke Analysis. Information and Computer Security, 23 (3), 286-301.
  • Psaroudakis, I., Katos, V., Saragiotis, P. and Mitrou, L., 2014. A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol. International Journal of Electronic Security and Digital Forensics, 6 (4), 241-267.
  • Provataki, A. and Katos, V., 2013. Differential malware forensics. Digital Investigation, 10 (4), 311-322.
  • Barmpatsalou, K., Damopoulos, D., Kambourakis, G. and Katos, V., 2013. A critical review of 7 years of Mobile Device Forensics. Digital Investigation, 10 (4), 323-349.
  • Shiaeles, S., Chryssanthou, A. and Katos, V., 2013. On-scene triage open source forensic tool chests: Are they effective? Digital Investigation, 10 (2), 99-115.
  • Katos, V., Stowell, F. and Bednar, P., 2013. Macroeconomics of privacy and security for identity management and surveillance. Kybernetes, 42 (1), 140-163.
  • Shiaeles, S.N., Katos, V., Karakos, A.S. and Papadopoulos, B.K., 2012. Real time DDoS detection using fuzzy estimators. Computers and Security, 31 (6), 782-790.
  • Katos, V., 2012. An integrated model for online transactions: Illuminating the black box. Information Management and Computer Security, 20 (3), 184-206.
  • Karayianni, S., Katos, V. and Georgiadis, C.K., 2012. A framework for password harvesting from volatile memory. International Journal of Electronic Security and Digital Forensics, 4 (2-3), 154-163.
  • Spyridopoulos, T. and Katos, V., 2011. Requirements for a forensically ready cloud storage service. International Journal of Digital Crime and Forensics, 3 (3), 19-36.
  • Aggelis, A., Sarris, E.T. and Katos, V., 2011. A location privacy extension for DVB-RCS. Radioengineering, 20 (1), 151-158.
  • Kavallaris, T. and Katos, V., 2010. On the detection of pod slurping attacks. Computers and Security, 29 (6), 680-685.
  • Bednar, P.M., Katos, V. and Hennell, C., 2009. On the complexity of collaborative cyber crime investigations. Digital Evidence & Elec. Signature L. ….
  • Katos, V., 2009. An integrated model for online transactions: methodological issues and challenges. Methodological Innovations.
  • Bednar, P.M. and Katos, V., 2009. Diversity Networks in Digital Investigations. WDFIA.
  • Katos, V., Stowell, F. and Bednar, P., 2009. From Synergy to Symbiosis: New Directions in Security and Privacy? International Journal of Information ….
  • Katos, V. and Furnell, S., 2008. The security and privacy impact of criminalising the distribution of hacking tools. Computer Fraud and Security, 2008 (7), 9-16.
  • Katos, V. and Bednar, P.M., 2008. A cyber-crime investigation framework. Computer Standards and Interfaces, 30 (4), 223-228.
  • Katos, V. and Patel, A., 2008. A partial equilibrium view on security and privacy. Information Management and Computer Security, 16 (1), 74-83.
  • Bednar, P., Welch, C. and Katos, V., 2008. Innovation management through the use of diversity networks. International Journal of Knowledge and ….
  • Katos, V., Stowell, F. and Bednar, P., 2007. Quis Custodiet Ipsos Custodies? Systemist, 29 (2), 96-105.
  • Katos, V., 2007. Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. Information Sciences, 177 (15), 3060-3073.
  • Katos, V. and Doherty, B., 2007. Exploring confusion in product ciphers through regression analysis. Information Sciences, 177 (8), 1789-1795.
  • Katos, V., 2007. Exploring confusion in product ciphers through regression analysis”, Information Sciences. Information Sciences, 177 (8), 1789.
  • Adams, C. and Katos, V., 2007. Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations. Journal of Information Privacy and Security.
  • Katos, V., Stowell, F. and Bednar, P., 2007. Quis Custodiet Ipsos Custodies? Systemist.
  • Katos, V., 2006. Forecasting Volatility of Active Phising Sites. Information Risk Management & Audit, 16 (2), 8-11.
  • Katos, V. and Adams, C., 2005. Modelling corporate wireless security and privacy. Journal of Strategic Information Systems, 14 (3), 307-321.
  • Katos, V., King, T. and Adams, C., 2005. Towards a Computer Based Training Tool for Education in Cryptography. UPGRADE Journal, V (6), 30-35.
  • Adams, C. and Katos, V., 2005. The ubiquitous mobile and location-awareness time bomb. Cutter IT Journal, 18 (6), 20-26.
  • Katos, V., 2005. A randomness test for block ciphers. Applied Mathematics and Computation, 162 (1), 29-35.
  • Katos, V., 2005. Statistical Risk Cluster Analysis for Network Segmentation. Information Risk Management & Audit, 162 (1), 7-11.
  • Adams, C. and Katos, V., 2005. Privacy challenges for location aware technologies. Mobile Information Systems II.
  • Katos, V., 2004. Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. WOSIS.
  • Katos, V., King, T. and Adams, C., 2004. Towards A Computer-Based Training Tool for Education in Cryptography.
  • Katos, V. and Alyea, W., 2001. Trust Models for Access Control. Journal of Information Technology Impact.
  • Katos, V., Psaroudakis, I., Saragiotis, P. and Mitrou, L.. A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description …. cis.aueb.gr.

Books

Chapters

  • Chalkias, I., Yucel, C., Mallis, D., Rajamaki, J., De Vecchis, F., Hagstrom, P. and Katos, V., 2024. An Empirical Evaluation of Cyber Threat Intelligence Sharing in the ECHO Early Warning System. 23-40.
  • Arogbodo, M.O. and Katos, V., 2023. Predicting Cyber Security Behaviors Through Psychosocial and Demographic Conditions During COVID-19. Effective Cybersecurity Operations for Enterprise-Wide Systems. 1-55.
  • Katos, V. and Ciobanu, C., 2021. Economics of Software Vulnerability Markets. In: Jajodia, S., ed. Encyclopedia of Cryptography, Security and Privacy.. Springer.
  • Katos, V. and Efraimidis, P., 2021. Privacy in Data-Driven Circular Economy. In: Jajodia, S., ed. Encyclopedia of Cryptography, Security and Privacy. Springer.
  • Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D. and Pangalos, G.J., 2020. A socio-technical perspective on threat intelligence informed digital forensic readiness. Digital Forensics and Forensic Investigations: Breakthroughs in Research and Practice. 173-184.
  • Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D. and Pangalos, G.J., 2020. A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications. 1201-1212.
  • Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S. and Marinos, L., 2017. Security concerns in cooperative intelligent transportation systems. Intrusion Detection and Prevention for Mobile Ecosystems. 487-521.
  • Spyridopoulos, T. and Katos, V., 2014. Data recovery strategies for cloud environments. Cloud Technology: Concepts, Methodologies, Tools, and Applications. 377-391.
  • Spyridopoulos, T. and Katos, V., 2012. Data recovery strategies for cloud environments. Cybercrime and Cloud Forensics: Applications for Investigation Processes. 251-265.
  • Katos, V. and Efraimidis, P., 2009. Identity Assurance in the Surveillance Society (in Greek). In: Lambrinoudakis, C., Mitrou, L., Gritzalis, S. and Katsikas, S., eds. Privacy Protection in ICT: Technical and Legal Aspects. Athens: Papasotiriou.
  • Efraimidis, P. and Katos, V., 2009. Probability and Information Theory (in Greek). In: Burmester, M., Gritzalis, S., Katsikas, S. and Chryssikopoulos, V., eds. Modern Cryptography: Theory and Applications.. Papasotirou.
  • Katos, V., 2009. Managing IS Security and Privacy. mfile.narotama.ac.id.
  • Katos, V., Bednar, P. and Welch, C., 2006. Dealing with epistemic uncertainty in the SST framework. lup.lub.lu.se.

Conferences

  • Papanikolaou, A., Ilioudis, C. and Katos, V., 2023. Introducing responsibly self-healing into the incident management lifecycle. ACM International Conference Proceeding Series, 335-337.
  • Papanikolaou, A., Ilioudis, C. and Katos, V., 2023. Cyber-pi: Intelligent cyberthreat detection and supervised response. CEUR Workshop Proceedings, 3601.
  • Iliou, C., Kostoulas, T., Tsikrika, T., Katos, V., Vrochidis, S. and Kompatsiaris, I., 2022. Web Bot Detection Evasion Using Deep Reinforcement Learning. ACM International Conference Proceeding Series.
  • Katos, V., Ki-Aries, D., Faily, S., Genchev, A., Bozhilova, M. and Stoianov, N., 2022. Cybersecurity User Requirements Analysis: The ECHO Approach. Lecture Notes in Networks and Systems, 344, 405-421.
  • Iliou, C., Kostoulas, T., Tsikrika, T., Katos, V., Vrochidis, S. and Kompatsiaris, I., 2021. Web bot detection evasion using generative adversarial networks. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, CSR 2021, 115-120.
  • McCall, S., Yucel, C. and Katos, V., 2021. Education in cyber physical systems security: The case of connected autonomous vehicles. IEEE Global Engineering Education Conference, EDUCON, 2021-April, 1379-1385.
  • Tsimperidis, I., Rostami, S., Wilson, K. and Katos, V., 2021. User Attribution Through Keystroke Dynamics-Based Author Age Estimation. Lecture Notes in Networks and Systems, 180, 47-61.
  • Zheng, G., Chai, W.K. and Katos, V., 2021. The Sequence-to-Sequence Architecture with An Embedded Module for Long-Term Traffic Speed Forecasting with Missing Data. 2021 26th International Conference on Automation and Computing: System Intelligence through Automation and Computing, ICAC 2021.
  • Mallis, D., Angelopoulos, C.M., Katos, V. and Vogklis, K., 2021. ISUMS: Indoor Space Usage Monitoring System for Sustainable Built Environment Using LoRaWAN. Proceedings - 17th Annual International Conference on Distributed Computing in Sensor Systems, DCOS 2021, 473-482.
  • Bada, A.O., Damianou, A., Angelopoulos, C.M. and Katos, V., 2021. Towards a Green Blockchain: A Review of Consensus Mechanisms and their Energy Consumption. Proceedings - 17th Annual International Conference on Distributed Computing in Sensor Systems, DCOS 2021, 503-511.
  • Damianou, A., Khan, M.A., Marios Angelopoulos, C. and Katos, V., 2021. Threat Modelling of IoT Systems Using Distributed Ledger Technologies and IOTA. Proceedings - 17th Annual International Conference on Distributed Computing in Sensor Systems, DCOS 2021, 404-413.
  • Danilatou, V., Antonakaki, D., Tzagkarakis, C., Kanterakis, A., Katos, V. and Kostoulas, T., 2020. Automated Mortality Prediction in Critically-ill Patients with Thrombosis using Machine Learning. Proceedings - IEEE 20th International Conference on Bioinformatics and Bioengineering, BIBE 2020, 247-254.
  • Qurashi, M.A., Angelopoulos, C.M. and Katos, V., 2020. An Architecture for Resilient Intrusion Detection in IoT Networks. IEEE International Conference on Communications, 2020-June.
  • Simou, S., Kalloniatis, C., Gritzalis, S. and Katos, V., 2020. A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services. Communications in Computer and Information Science, 1111 CCIS, 161-177.
  • Heydari, M., Mylonas, A., Katos, V., Balaguer-Ballester, E., Altaf, A. and Tafreshi, V.H.F., 2020. Uncertainty-aware authentication model for IoT. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11980 LNCS, 224-237.
  • Rostami, S., Kleszcz, A., Dimanov, D. and Katos, V., 2020. A machine learning approach to dataset imputation for software vulnerabilities. Communications in Computer and Information Science, 1284 CCIS, 25-36.
  • Yucel, C., Chalkias, I., Mallis, D., Karagiannis, E., Cetinkaya, D. and Katos, V., 2020. On the assessment of completeness and timeliness of actionable cyber threat intelligence artefacts. Communications in Computer and Information Science, 1284 CCIS, 51-66.
  • Asad, B., Saxena, N. and Katos, V., 2020. Analysis of the security and privacy risks and challenges in smart cities' traffic light system. IET Conference Publications, 2020 (CP777), 226-232.
  • Heydari, M., Mylonas, A., Katos, V., Balaguer-Ballester, E., Tafreshi, V.H.F. and Benkhelifa, E., 2019. A Location-Aware Authentication Model to Handle Uncertainty in IoT. 2019 6th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019, 43-50.
  • Angelopoulos, K. and Katos, V., 2019. Efficient Intrusion Detection in P2P IoT Networks. In: The 6th International Symposium for ICS & SCADA Cyber Security 10 September-12 July 2019 Piraeus, Greece.
  • Iliou, C., Kostoulas, T., Tsikrika, T., Katos, V., Vrochidis, S. and Kompatsiaris, Y., 2019. Towards a framework for detecting advanced Web bots. ACM International Conference Proceeding Series.
  • Furnell, S., Li, S., Howells, G., Hernandez-Castro, J. and Katos, V., 2019. Welcome message from ARES program committee co-chairs and general chair. ACM International Conference Proceeding Series, 109ADUMMY.
  • Heydari, M., Mylonas, A., Katos, V., Balaguer-Ballester, E., Tafreshi, V.H.F. and Benkhelifa, E., 2019. Uncertainty-aware authentication model for fog computing in IoT. 2019 4th International Conference on Fog and Mobile Edge Computing, FMEC 2019, 52-59.
  • Angelopoulos, C.M. et al., 2019. IDEAL-CITIES - A trustworthy and sustainable framework for circular smart cities. Proceedings - 15th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2019, 443-450.
  • Damianou, A., Angelopoulos, C.M. and Katos, V., 2019. An architecture for blockchain over edge-enabled IoT for smart circular cities. Proceedings - 15th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2019, 465-472.
  • Zheng, G., Chai, W.K. and Katos, V., 2019. An ensemble model for short-term traffic prediction in smart city transportation system. Proceedings - IEEE Global Communications Conference, GLOBECOM.
  • Alexandris, G., Katos, V., Alexaki, S. and Hatzivasilis, G., 2018. Blockchains as Enablers for Auditing Cooperative Circular Economy Networks. IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD, 2018-September.
  • Alexaki, S., Alexandris, G., Katos, V. and Nikolaos Petroulakis, E., 2018. Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions. IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD, 2018-September.
  • Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D. and Pangalos, G., 2018. Towards a Threat Intelligence Informed Digital Forensics Readiness Framework. In: Twenty-Fifth European Conference on Information Systems (ECIS) 6 June 2017 Guimarães, Portugal.
  • Saxena, N., Katos, V. and Kumar N, 2017. Cyber-Physical Smart Grid Security Tool for Education and Training Purposes. In: International Workshop on Realigning Cyber Security Education 27 November 2017 Canberra, Australia.
  • Nisioti, A., Mylonas, A., Katos, V., Yoo, P.D. and Chryssanthou, A., 2017. You can run but you cannot hide from memory: Extracting im evidence of Android apps. Proceedings - IEEE Symposium on Computers and Communications, 457-464.
  • Nisioti, A., Heydari, M., Mylonas, A., Katos, V. and Tafreshi, V.H.F., 2017. TRAWL: Protection against rogue sites for the masses. Proceedings - International Conference on Research Challenges in Information Science, 120-127.
  • Zampoglou, M., Rocha, A., Vrochidis, S. and Katos, V., 2017. MFSec 2017 chairs‘ welcome. MFSec 2017 - Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, co-located with ICMR 2017, iii.
  • Naik, N., Jenkins, P., Savage, N. and Katos, V., 2017. Big data security analysis approach using Computational Intelligence techniques in R for desktop users. 2016 IEEE Symposium Series on Computational Intelligence, SSCI 2016.
  • Tsikrika, T., Vrochidis, S., Akhgar, B., Burnap, P., Katos, V. and Williams, M.L., 2017. 1st international workshop on search and mining terrorist online content & advances in data science for cyber security and risk on the web. WSDM 2017 - Proceedings of the 10th ACM International Conference on Web Search and Data Mining, 823-824.
  • Ward, J., Dogan, H., Apeh, E., Mylonas, A. and Katos, V., 2017. Using human factor approaches to an organisation’s bring your own device scheme. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10292 LNCS, 396-413.
  • Dimitriadis, A., Efraimidis, P.S. and Katos, V., 2016. Malevolent app pairs: An android permission overpassing scheme. 2016 ACM International Conference on Computing Frontiers - Proceedings, 431-436.
  • Faily, S., Stergiopoulos, G., Katos, V. and Gritzalis, D., 2016. “Water, water, every where”: Nuances for a water industry critical infrastructure specification exemplar. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9578, 243-246.
  • Faily, S., Gritzalis, D., Lykou, G., Mylonas, A., Partridge, A. and Katos, V., 2016. Human-centered specification exemplars for critical infrastructure environments. Proceedings of the 30th International BCS Human Computer Interaction Conference, HCI 2016, 2016-July.
  • Fysarakis, K., Askoxylakis, I., Soultatos, O., Papaefstathiou, I., Manifavas, C. and Katos, V., 2016. Which IoT protocol? Comparing standardized approaches over a common M2M application. Proceedings - IEEE Global Communications Conference, GLOBECOM.
  • Ali, R., McAlaney, J., Faily, S., Phalp, K. and Katos, V., 2015. Mitigating circumstances in cybercrime: A position paper. Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, 1972-1976.
  • Vrochidis, S., Katos, V., Weippl, E. and Kompatsiaris, I., 2015. Welcome message from the MFSec 2015 workshop organizers. Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015, xxxii.
  • Tsochataridou, C., Arampatzis, A. and Katos, V., 2014. Improving Digital Forensics Through Data Mining. In: 4th International Conference on Advances in Information Mining and Management (IMMM 2014) 20-25 July 2014 Paris.
  • Tavli, M., Efraimidis, P. and Katos, V., 2014. Reengineering the user: Privacy concerns about personal data on smartphones. In: 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2014) 8-9 July 2014 Plymouth, UK. , 80-89.
  • Sadok, M., Katos, V. and Bednar, P., 2014. Developing contextual understanding of information security risks. Centre for Security, Communications and Network Research, Plymouth University, UK. Human Aspects of Information Security and Assurance, HAISA 2014, 1-10.
  • Tsimperidis, I. and Katos, V., 2013. Keystroke forensics: Are you typing on a desktop or a laptop? ACM International Conference Proceeding Series, 89-94.
  • Gritzalis, D., Soupionis, Y., Katos, V., Psaroudakis, I., Katsaros, P. and Mentis, A., 2013. The SPHINX enigma in critical VoIP infrastructures: Human or botnet? IISA 2013 - 4th International Conference on Information, Intelligence, Systems and Applications, 151-154.
  • Bednar, P., Sadok, M. and Katos, V., 2013. Contextual dependencies in information security systems. In: AIS SIGSEC and IFIP TC 11.1 Workshop on Information Security & Privacy, WISP 2013 14 September 2013 Milan, Italy. eprints.port.ac.uk.
  • Furnell, S., Clarke, N. and Katos, V., 2013. Preface. Proceedings of the European Information Security Multi-Conference, EISMC 2013, i.
  • Gritzalis, D., Soupionis, Y., Katos, V., Psaroudakis, I., Katsaros, P. and Mentis, A., 2013. The SPHINX Enigma in Critical VoIP Infrastructures: Human or Botnet? 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 124-129.
  • Karayianni, S. and Katos, V., 2012. Practical password harvesting from volatile memory. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 99 LNICST, 17-22.
  • Menesidou, S.A. and Katos, V., 2012. Authenticated key exchange (AKE) in delay tolerant networks. IFIP Advances in Information and Communication Technology, 376 AICT, 49-60.
  • Psaroudakis, I., Katos, V. and Efraimidis, P.S., 2012. A framework for anonymizing GSM calls over a smartphone VoIP network. IFIP Advances in Information and Communication Technology, 376 AICT, 543-548.
  • Clarke, N.L., Katos, V., Menesidou, S.A., Ghita, B. and Furnell, S., 2012. A novel security architecture for a space-data DTN. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7277 LNCS, 342-349.
  • Varka, A.M. and Katos, V., 2012. On the user acceptance of graphical passwords. HAISA, 150-159.
  • Tasidou, A., Efraimidis, P.S., Soupionis, Y., Mitrou, L. and Katos, V., 2012. User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges. HAISA, 139-149.
  • Chryssanthou, A. and Katos, V., 2012. Assessing forensic readiness. WDFIA, 107-118.
  • Katos, V., Vrakas, D. and Katsaros, P., 2011. A framework for access control with inference constraints. Proceedings - International Computer Software and Applications Conference, 289-297.
  • Katos, V., Stowell, F. and Bednar, P., 2011. Surveillance, privacy and the law of requisite variety. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6514 LNCS, 123-139.
  • Bednar, P. and Katos, V., 2011. SSD: New Challenges for Digital Forensics. ItAIS. ItAIS 2011, Proceedings of the 8th Conference of the Italian Chapter of the Association for Information Systems.
  • Spyridopoulos, T. and Katos, V., 2011. Towards a forensically ready cloud storage service. WDFIA books.google.com.
  • Pangalos, G. and Katos, V., 2010. Information assurance and forensic readiness. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 26 LNICST, 181-188.
  • Tasidou, A., Efraimidis, P.S. and Katos, V., 2010. Economics of personal data management: Fair personal information trades. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 26 LNICST, 151-160.
  • Bednar, P.M. and Katos, V., 2010. Digital forensic investigations: A new frontier for informing systems. Information Systems: People, Organizations, Institutions, and Technologies - ItAIS: The Italian Association for Information Systems, 361-371.
  • Strevens, C., Wilson, C. and Katos, V., 2010. An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education. … Federation for Information Processing Digital Library.
  • Bednar, P. and Katos, V., 2009. Addressing the human factor in information systems security. MCIS2009: 4th Mediterranean Conference on … lup.lub.lu.se.
  • Kavallaris, T. and Katos, V., 2009. Detecting Data Leakage from Pod Slurping Based Attacks on a Windows XP Platform. WDFIA.
  • Bednar, P.M., Katos, V. and Hennell, C., 2008. Cyber-crime investigations: Complex collaborative decision making. Proceedings - 3rd International Annual Workshop on Digital Forensics and Incidents Analysis, WDFIA 2008, 3-11.
  • Briggs, J., Katos, V. and Bhaludin, A., 2008. On the Security Controls of Portable Computing Devices in Healthcare Environments. In: International Network Conference 1-3 July 2008 Plymouth, UK.
  • Bednar, P., Welch, C. and Katos, V., 2007. Dealing with complexity in knowledge sharing processes. Proceedings of the European Conference on Knowledge Management, ECKM, 101-107.
  • Bednar, P.M., Katos, V. and Welch, C., 2007. Systems analysis: Exploring the spectrum of diversity. Proceedings of the 15th European Conference on Information Systems, ECIS 2007, 647-657.
  • Wilson, C., Katos, V. and Strevens, C., 2007. An interdisciplinary approach to forensic IT and forensic psychology education. IFIP International Federation for Information Processing, 237, 65-71.
  • Hennell, C. and Katos, V., 2007. A systemic approach to analysing the implications of the introduction of biometric passports. In: Furnell, S. and Clarke, N., eds. 1st International Conference in Human Aspects of Information Security Assurance 4-5 June 2007 Plymouth, UK.
  • Bednar, P., Welch, C. and Katos, V., 2006. Four valued logic: Supporting complexity in knowledge sharing processes. Proceedings of the European Conference on Knowledge Management, ECKM, 29-35.
  • Katos, V. and Mavridis, I., 2006. A Practical Location Aware Access Control Solution for HTML Content in Wireless Networks. In: MediaWiN 2 April 2006 Athens. , 44-50.
  • Fouliras, P.E. and Katos, V.A., 2005. A novel security protocol enhancement on distributed multicasting for video on demand. Proceedings of the 5th International Network Conference, INC 2005, 129-136.
  • Katos, V., Vlachopoulou, M. and Manthou, V., 2002. Modeling virtual network processes. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS, 316-320.
  • Kalentzi, E., Katos, V. and Batzios, C.. On the Scalability of the BRODESSYS Decision Support System. researchgate.net.
  • Katos, V.. Risk Cluster Analysis for Network Segmentation. Proceedings of the Fourth International Network … books.google.com.

Reports

Theses

  • Katos, V., 1999. Product cipher negotiation with on-line evaluation for private communication over computer networks.

PhD Students

  • Christos Iliou. Machine Learning Based Detection and Evasion Techniques for Advanced Web Bots, (In progress)
  • Mohammed Al Qurashi - Completed. Intrusion Detection for IoT., (Completed)
  • Ioannis Psaroudakis - completed, 2014. VoIP Forensics
  • Sofianna Menesidou - completed, 2016. Cryptographic Key Management in Delay Tolerant Networks
  • Ioannis Tsimperidis - completed, 2017. Offender Profiling via Keystroke Dynamics
  • Amalia Damianou. Digital Forensics in Smart, Circular Cities

Profile of Teaching PG

  • Cyber Security
  • Cyber Security (BBC)

Profile of Teaching UG

  • Computer Security
  • Security Information and Event Management

Grants

  • Online business models used to infringe IPR – phase 4 – Vendor accounts on third party trading platforms (EU Intellectual Property Office, 01 Jun 2020). In Progress
  • Privacy Throughout (Innovate UK, 23 Sep 2019). Completed
  • The state of cybersecurity vulnerabilities in 2018 report (European Network and Information Security Agency, 01 Jul 2019). Completed
  • PITCH: Privacy In The Circular Economy (Innovate UK, 01 Apr 2019). Completed
  • ECHO: European network of Cybersecurity centres and competence Hub for innovation and Operations (EC/H2020/SU-ICT-3, 01 Nov 2018). In Progress
  • Online Business Models Infringing Illegal IPTV and Cardsharing (EU Intellectual Property Office, 01 Sep 2018). Completed
  • WIDECERT: Widening BU-CERT Threat Intelligence activities (Innovate UK/DCMS, 01 Feb 2018). Completed
  • IDEAL-CITIES: Intelligence-Driven Urban Internet-of-Things Ecosystems for Circular, SAfe and IncLusive Smart CITIES (European Commission, 01 Jan 2018). In Progress
  • CE2016 Exercise incident – Apt Memory Forensics Analysis (European Network and Information Security Agency, 01 Oct 2016). Completed
  • EDUWEB - Combating Digital Exclusion: Children educate digitally illiterate adults in safe and creative web (European Commission, 01 Sep 2016). Completed
  • CE 2016 Incident Development (European Network and Information Security Agency, 01 Apr 2016). Completed
  • ' SENsing SKIN' for Monitoring-Based Maintenance of the Transport Infrastructure (SENSKIN) (H2020, 01 Jun 2015). Completed
  • QB50 and REA CubeSats (General Secretariat for Research and Technology - NSRF, 01 Sep 2012). Completed
  • SPHINX: Robust Internet Services (General Secretariat for Research and Technology - NSRF, 01 Feb 2011). Completed
  • Space-Data Routers (FP-7, 01 Nov 2010). Completed
  • Space Internetworking Center (FP-7, 01 Sep 2010). Completed

External Responsibilities

  • EPSRC/UKRI, Reviewer (2020)
  • EU Agency for Network and Information Security, NIS Expert (2017-2020)
  • CHIST-ERA, Reviewer (-2016)
  • Research Council of Norway, Reviewer (-2015)
  • European Commission, Reviewer (-2016)

Qualifications

  • PGCE in Teaching, HE (Portsmouth University, 2006)
  • PhD in Computer Science (Aston University, 2000)
  • MBA in Business Administration (Keele University, 1996)
  • MEng in Electrical and Computer Engineering (Democritus University of Thrace, 1994)

Memberships

  • UNICRI (United Nations Interregional Crime and Research Institute), External Expert - digital forensics (2022-2024), https://unicri.it/
  • EU Agency for Network and Information Security (ENISA), NIS / CIS Expert (2017-2026),
  • Information Audit and Control Association (ISACA), Academic Advocate (2007-), https://www.isaca.org/pages/default.aspx
  • Institute of Electrical and Electronics Engineers (IEEE), Member,