Security in IoMT communications: A survey D Koutras, G Stergiopoulos, T Dasaklis, P Kotzanikolaou, D Glynos, ... Sensors 20 (17), 4828, 2020 | 132 | 2020 |
Risk mitigation strategies for critical infrastructures based on graph centrality analysis G Stergiopoulos, P Kotzanikolaou, M Theocharidou, D Gritzalis International Journal of Critical Infrastructure Protection 10, 34-44, 2015 | 122 | 2015 |
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures G Stergiopoulos, P Kotzanikolaou, M Theocharidou, G Lykou, D Gritzalis International Journal of Critical Infrastructure Protection 12, 46-60, 2016 | 118 | 2016 |
Insider threat: enhancing BPM through social media D Gritzalis, V Stavrou, M Kandias, G Stergiopoulos 2014 6th International Conference on New Technologies, Mobility and Security …, 2014 | 75 | 2014 |
Critical infrastructure security and resilience D Gritzalis, M Theocharidou, G Stergiopoulos Springer International Publishing 10, 978-3, 2019 | 69 | 2019 |
Cyber-attacks on the Oil & Gas sector: A survey on incident assessment and attack patterns G Stergiopoulos, DA Gritzalis, E Limnaios Ieee Access 8, 128440-128475, 2020 | 50 | 2020 |
Risk assessment methodologies for the internet of medical things: A survey and comparative appraisal V Malamas, F Chantzis, TK Dasaklis, G Stergiopoulos, P Kotzanikolaou, ... IEEE Access 9, 40049-40075, 2021 | 43 | 2021 |
Using centrality measures in dependency risk graphs for efficient risk mitigation G Stergiopoulos, M Theocharidou, P Kotzanikolaou, D Gritzalis Critical Infrastructure Protection IX: 9th IFIP 11.10 International …, 2015 | 43 | 2015 |
Automatic detection of various malicious traffic using side channel features on TCP packets G Stergiopoulos, A Talavari, E Bitsikas, D Gritzalis Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 41 | 2018 |
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0 G Stergiopoulos, P Dedousis, D Gritzalis International Journal of Information Security 21 (1), 37-59, 2022 | 37 | 2022 |
Critical infrastructure protection tools: classification and comparison G Stergiopoulos, E Vasilellis, G Lykou, P Kotzanikolaou, D Gritzalis Proc. of the 10th International Conference on Critical Infrastructure Protection, 2016 | 28 | 2016 |
Using logical error detection in remote-terminal units to predict initiating events of Critical Infrastructures failures G Stergiopoulos, M Theoharidou, D Gritzalis Proc. of the 3rd International Conference on Human Aspects of Information …, 2015 | 28 | 2015 |
Analyzing congestion interdependencies of ports and container ship routes in the maritime network infrastructure G Stergiopoulos, E Valvis, D Mitrodimas, D Lekkas, D Gritzalis IEEE Access 6, 63823-63832, 2018 | 26 | 2018 |
On a security-oriented design framework for medical IoT devices: The hardware security perspective K Nomikos, A Papadimitriou, G Stergiopoulos, D Koutras, M Psarakis, ... 2020 23rd Euromicro Conference on Digital System Design (DSD), 301-308, 2020 | 23 | 2020 |
A process-based dependency risk analysis methodology for critical infrastructures G Stergiopoulos, V Kouktzoglou, M Theocharidou, D Gritzalis International Journal of Critical Infrastructures 13 (2-3), 184-205, 2017 | 23 | 2017 |
Hunting application-level logical errors G Stergiopoulos, B Tsoumas, D Gritzalis Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012 | 23 | 2012 |
Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment G Stergiopoulos, D Gritzalis, V Kouktzoglou Computer Networks 134, 23-45, 2018 | 22 | 2018 |
Automated detection of logical errors in programs G Stergiopoulos, P Katsaros, D Gritzalis Risks and Security of Internet and Systems: 9th International Conference …, 2015 | 21 | 2015 |
Automatic network restructuring and risk mitigation through business process asset dependency analysis G Stergiopoulos, P Dedousis, D Gritzalis Computers & Security 96, 101869, 2020 | 18 | 2020 |
“Water, Water, Every Where”: Nuances for a Water Industry Critical Infrastructure Specification Exemplar S Faily, G Stergiopoulos, V Katos, D Gritzalis Critical Information Infrastructures Security: 10th International Conference …, 2016 | 18 | 2016 |