Publications

2015

  • Tsavli, M., Efraimidis, P., Katos, V., Mitrou L., Reengineering the user: Privacy concerns about personal data on smartphones. Information and Computer Security accepted for publication.
  • Tasidou, A., Soupionis, I., Efraimidis,P. Mitrou, L., Katos, V. Privacy-preserving, User-centric VoIP CAPTCHA Challenges: an Integrated Solution in the SIP Environment. Information and Computer Security accepted for publication.

2014

  • Tsimperidis, I., Katos, V., Clarke, N. Language Independent Gender Identification Through Keystroke Analysis, Information Management and Computer Security accepted for publication.
  • Tsochataridou, C., Arampatzis, A., Katos, V. Improving Digital Forensics Through Data Mining. In 4th International Conference on Advances in Information Mining and Management (IMMM 2014), Paris, France.
  • Tsavli, M., Efraimidis, P., Katos, V. Reengineering the user: Privacy concerns about personal data on smartphones. In 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2014), Furnell S., et al. (Eds.), Plymouth, UK.
  • Sadok, M., Katos, V., Bednar, P. Developing contextual understanding of information security risks. In 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2014), Furnell S., et al. (Eds.), Plymouth, UK.
  • Psaroudakis, I., Katos, V., Saragiotis, P., Mitrou, L. A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description Protocol (SDP). International Journal of Electronic Security and Digital Forensics, 6(4), 2014, pp.241-267
  • Psaroudakis, I., Katos, V., Efraimidis, P. A novel mechanism for anonymizing GSM calls using a resource based SIP community network. Security and Communication Networks, Wiley, doi: 10.1002/sec.995

2013

  • Bednar, P., Sadok, M., Katos, V. Contextual Dependencies in Information Systems Security. AIS SIGSEC Workshop on Information Security & Privacy, WISP 2013, Milan, Italy [pdf].
  • Barmpatsalou , K.,  Damopoulos,D., Kambourakis ,G. , Katos, V. A critical review of 7 years of Mobile Device Forensics, Digital Investigation, in press [link].
  • Provataki, A., Katos, V. Differential malware forensics, Digital Investigation, 10, 2013, pp.311-322.[doi]
  • Shiaeles, S., Chryssanthou, A., Katos, V. On-scene triage open source forensic tool chests: Are they effective? Digital Investigation, 10(2), 2013, pp.99-115[doi]
  • Tsimperidis, I., Katos, V. Keystroke forensics: are you typing on a laptop or a desktop? 6th Balkan Conference on Informatics (BCI 2013), Thessaloniki, pp.89-94 [pdf].
  • Gritzalis, D., Katos, V. Katsaros, P., Soupionis, A., Psaroudakis, I., Mentis, A. The SPHINX Enigma in Critical VoIP Infrastructures: Human or Botnet? Information, Intelligence, Systems and Applications (IISA 2013), Pireaus, Athens. [pdf]
  • Katos, V.,  Stowell, F.,  Bednar, P. “Macroeconomics of privacy and security for identity management and surveillance”, Kybernetes, 42(1), 2013, pp.140 – 163 [link]

2012

  • Spyridopoulos, S. and Katos, V., “Data Recovery Strategies for Cloud Environments”, in Cybercrime and Cloud Forensics,Spyridopoulos, T. & Katos, V. 2013 In: Cybercrime and Cloud Forensics: Applications for Investigation Processes. Ruan, K. (ed.). IGI Global, p. 251-265[doi].
  • Shiaeles S., Katos V., Karakos A., Papadopoulos B. Real Time DDoS  Detection Using Fuzzy Estimators. Computers and Security, 31, 2012, pp.782-790. [pdf]
  • Varka, A.M., Katos, V. On the user acceptance of graphical passwords. In 6th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012), Furnell S., et al. (Eds.). [pdf]
  • Tassidou, A., Efraimidis, P, Soupionis, Y., Mitrou, L., Katos, V. User-centric privacy-preserving adaptation for VoIP CAPTCHA challenges. In  6th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2012), Furnell S., et al. (Eds.). [pdf]
  • Chryssanthou, A., Katos, V. Assessing forensic readiness. In 7th International Workshop on Digital Forensics and Incident Analysis (WDFIA 2012), pp.107-118. [pdf]
  • Clarke, N., Katos, V., Menesidou, S., Ghita, B., Furnell, S. A novell security architecture for a space-data DTN. In 10th International Conference on Wired/Wireless Internet Communications (WWIC 2012), invited paper. [pdf]
  • Karayanni, S., Katos, V., Georgiadis, C. A framework for password harvesting from volatile memory. Int. Journal of Electronic Security and Digital Forensics,4(2/3), 2012, pp. 154-163.[pdf]
  • Katos, V. An integrated model for online transactions: Illuminating the black box. Information Management and Computer Security, 20(3), 2012, pp. 184-206. [doi]
  • Menesidou, S. and Katos, V.  Authenticated Key Exchange (AKE) in Delay Tolerant Networks. Proc. of the 27th IFIP International Information Security and Privacy Conference, Springer IFIP AICT, Greece, June 2012, pp.49-60.
  • Psaroudakis I., Katos V., Efraimidis P. A framework for anonymizing GSM calls over a smartphone VoIP network. Proc. of the 27th IFIP International Information Security and Privacy Conference, Springer IFIP AICT, Greece, June 2012, pp. 543-548. [pdf]

2011

  • Bednar, P, Katos, V. SSD: New challenges for digital forensics. In 8th Conference of the Italian Chapter of AIS, itAIS 2011[pdf].
  • Spyridopoulos, T., Katos, V. Requirements for a forensically ready cloud storage service. Int. Journal of Digital Crime and Forensics, 3(3), 2011, pp.19-36[pdf].
  • Karayanni, S., Katos, V. Practical password harvesting from volatile memory. In 7th International Conference in Global Security, Safety and Sustainability (ICGS3).
  • Spyridopoulos, T., Katos, V. Towards a forensically ready cloud storage service. In 6th International Workshop on Digital Forensics and Incident Analysis (WDFIA 2011)[pdf].
  • Katos, V., Vrakas, D., Katsaros, P. A Framework for Access Control with Inference Constraints. In Proc. 35 Annual IEEE Computer Software and Applications Conference.[pdf]
  • Aggelis, A., Sarris, E., Katos, V. A location privacy extension for DVB-RCS. Radioengineering Journal, 20(1), 2011, pp.151-158.[pdf]

2010

  • Karagianni, S., Katos, V. RAM Foreniscs for Windows based operating systems (in Greek). 4th SFHMMY Conference, 2010, Patra, Greece.
  • Katos, V., Stowell, F., Bednar, P. Surveillance, Privacy and The Law of Requisite Variety. Data Privacy Management 2010, Athens.
  • Kavallaris, T., & Katos, V. “On the detection of pod slurping attacks”. Computers & Security, 29(6), September 2010, pp. 680-685. [doi:10.1016/j.cose.2010.01.002]
    • Press: “USB fingerprints identify ‘pod slurping’ data thieves”, New Scientist
  • Tassidou, A., Efraimidis, P., Katos, V. Economics of Personal Data Management: Fair Personal Information Trades. e-Democracy 2009, Athens, Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 26, 2010, pp. 151-160.[pdf]
  • Pangalos, G., Katos, V. Information Assurance and Forensic Readiness. e-Democracy 2009, Athens, Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 26, 2010, pp.181-188.[pdf]
  • Bednar, P., Katos, V., ”Digital Forensic Investigations: A New Frontier for Informing Systems”, InInformation Systems: People, Organizations,Institutions, and Technologies,A. D’Atri and D. Saccà (eds.), Springer Physica-Verlag, pp.361-371.[pdf]

2009

  • Katos, V. An integrated model for online transactions: Methodological Issues and Challenges. Methodological innovations, 4(3), 2009, pp. 27-40.[pdf]
  • Bednar, P., Katos, V. Addressing the Human Factor in Information Systems Security. 4th Mediterranean Conference on Information Systems, 2009, Athens.
  • Kavallaris, T., Katos, V. Detecting Data Leakage from Pod Slurping Based Attacks on a Windows XP Platform.4th Workshop on Digital Forensics and Incident Analysis, Athens, Greece, 25-26 June 2009, pp.1-8.
  • Bednar, P., Katos, V. Diversity Networks in Digital Investigations. 4th Workshop on Digital Forensics and Incident Analysis, Athens, Greece, 25-26 June 2009, pp.63-71.
  • Katos, V., Stowell, F. and Bednar, P. From synergy to symbiosis: new directions in security and privacy? Int. J. of Information Technologies and Systems Approach, 2(2),2009, pp.1-14.
  • Bednar, P. Katos, V., Hennell, C. On the complexity of collaborative cyber crime investigations. Digital Signature and Law Review, Vol.6,2009, pp.214-219.
  • Efraimidis, P., Katos, V., ”Probability and Information Theory” (in Greek). In Modern Cryptography: Theory and Applications. M. Burmester, S. Gritzalis, S. Katsikas, V. Chryssikopoulos (editors). Papasotiriou, 2009.
  • Katos, V., Efraimidis, P., ”Identity Assurance in the Surveillance Society” (in Greek). In Privacy Protection in ICT: Technical and Legal Aspects. C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. Katsikas (editors). Papasotiriou, 2009.

2008

  • Katos, V. and Furnell, S. The security and privacy impact of criminalising the distribution of hacking tools. Computer Fraud and Security, July 2008, pp.9-16[doi:10.1016/S1361-3723(08)70112-X]
  • Bednar, P., Katos, V., Hennell, C. Cyber-Crime Investigations: Complex Collaborative Decision Making. 3rd Workshop on Digital Forensics and Incident Analysis, IEEE CS Press, Malaga, Spain, 10 October 2008, pp.3-11.
  • Briggs, J. S. Katos, V., Bhaludin, A. On the Security Controls of Portable Computing Devices in Healthcare Environments. International Network Conference, INC 2008, Plymouth 2008.
  • Bednar, P., Welch, C. and Katos, V. “Innovation management through the use of diversity networks”, Int. J. Knowledge and Learning, Vol. 4, No. 4, 2008, pp.357-369[doi:10.1504/IJKL.2008.022056]
  • Katos, V., Patel, A. ”A Partial Equilibrium View on Security and Privacy”, Information Management & Computer Security,16(1), 2008, pp.77-83. [pdf]
  • Katos, V. & Bednar, P. 2008. ”A cyber-crime investigation framework”. Computer Standards & Interfaces, 30, 2008, pp.223-228 [doi:10.1016/j.csi.2007.10.003]
  • Katos, V., ”Managing IS Security and Privacy”, Encyclopedia of Information Science and Technology, 2nd Edition, Mehdi Khosrow-Pour (ed.), IGI Global, 2008.

2007

  • Adams, C., Katos, V., ”Exoinformation space audits: an information richness view of privacy and security obligations”, Journal of Information Privacy and Security,3(3), 2007, pp. 29-44.
  • Katos, V., Stowell, F., Bednar, P. ”Quis Custodiet Ipsos Custodies?”, Systemist, 29(2), 2007, pp. 96-105.
  • Katos, V., ”Network Intrusion Detection: Evaluating Cluster, Discriminant, and Logit analysis”. Information Sciences, 177(15), 2007, pp. 3060-3073.[doi: 10.1016/j.ins.2007.02.034]
  • Katos, V., Doherty, B. ”Exploring confusion in product ciphers through regression analysis”, Information Sciences, Vol. 177, No. 8, 2007, pp. 1789- 131795.[doi: 10.1016/j.ins.2006.09.017]
  • Bednar, P., Katos, V. and Welch, C. Innovation Management through the use of Diversity Networks. EURO XXII Prague, Book of abstracts. 22nd European Conference on Operational Research: OR creates bridges. Prague, July 8-11, 2007. Prague School of Economics, Czech Republic.
  • Bednar, P. Welch, C., Katos, V. Dealing with Complexity in Knowledge Sharing Processes, ECKM 2007, The 8th European Conference on Knowledge Management, Barcelona, Spain, 6-7 September 2007, pp.101-107.
  • Wilson, C., Katos, V., Strevens, C. “An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education”. Workshop on Information Security Education, WISE 5, IFIP TC 11.8, pp.65-72.
  • Hennell, C., Katos, V. “A systemic approach to analysing the implications of the introduction of biometric passports”, 1st International Conference in Human Aspects of Information Security Assurance, HAISA, 2007. [google_books]
  • Bednar, P., Katos, V., Welch, C. “Systems Analysis: Exploring the Spectrum of Diversity”, ECIS 07. [pdf]

2006

  • Bednar, P., Welch, C., Katos, V. “Four valued logic: supporting complexity in knowledge sharing processes”, ECKM 2006, The 7th European Conference on Knowledge Management, Hungary, 4-5 September 2006. [google_books]
  • Katos, V., Bednar, P., Welch, C. “Dealing with epistemic uncertainty in the SST framework”, International Conference on Creativity and Innovation in Decision Making and Decision Support, CIDMDS 2006, IFIP TC8/WG 8.3, 28th June” 1st July 2006, London, UK, pp. 886-903.
  • Katos, V., ”Forecasting Volatility of Active Phising Sites”, Information Risk Management & Audit, IRMA Journal, Vol 16 Νo. 2, BCS, 2006, pp. 8-11
  • Katos, V., Mavridis, I. “A Practical Location Aware Access Control Solution for HTML Content in Wireless Networks”, MediaWiN 2006, pp. 44-50.

2005

  • Furnell, S., Katos, V., Clarke, N. ”The role of academic qualifications in the IT security profession”. Datawatch Winter 05, 2005, pp. 8-14.
  • Katos, V., Adams, C. ”Modelling Corporate Wireless Security and Privacy”. Journal of Strategic Information Systems. Volume 14, Issue 3, 2005, pp. 307-321.[doi:10.1016/j.jsis.2005.07.006]
  • Adams C., Katos, V. ”The Ubiquitous Mobile and Location Aware Technologies Time Bomb”. Cutter IT journal, vol. 18, n. 6, 2005, pp. 20-26.
  • Katos, V., ”Statistical Risk Cluster Analysis for Network Segmentation”, Information Risk Management & Audit, IRMA Journal, BCS, vol. 15, n.1, 2005, pp. 7-11.
  • Katos, V., ”A Randomness Test for Block Ciphers”, Applied Mathematics and Computation, Vol. 162, n. 1, 2005, pp.29-35.[doi:10.1016/j.amc.2003.12.122]
  • Furnell, S., Katos, V., Clarke, N. “Considering the role of academic qualifications for IT security professionals”, 1st Colloquium for Information Systems Security Education” Asia Pacific, 21-22 Nov. 2005, Adelaide, Australia.
  • Adams, C., Katos, V. “Privacy challenges for Location Aware Technologies”, IFIP TC8 Working Conference on Mobile Information Systems, published in Mobile Information Systems II, Springer, 2005.
  • Fouliras, P., Katos, V. “A Novel Security Protocol Enhancement on Distributed Multicasting for Video on Demand”, INC 2005 Fifth International Network Conference, Samos, July, 2005.
  • Katos V., Adams, C., King, T. “Virtual E-learning Game for Cryptographic Teaching (VEGCT): A Role-Playing Tool for Teaching Cryptography on Distance Learning Courses”, WISE 4 Proceedings, Moscow, 18-20 May, 2005.

up to 2004

  • Katos, V., King, T., Adams, C. ”Towards a Computer Based Training Tool for Education in Cryptography”, The Keys of Cryptography, UPGRADE Journal, vol V., issue 6, CEPIS, 2004, pp. 30-35[pdf]
    • Version in Spanish: ”Hacia una herramienta de formación por ordenador para la enseñanza de la Criptografía”, ATI Novatica, n.172, 2004, pp. 28-32.
  • Katos, V., “Risk Cluster Analysis for Network Segmentation”, Proceedings of the Fourth International Network Conference, INC 2004, Plymouth, 6-9 July 2004.
  • Katos, V., “Diffusion Behaviour of Cryptographic Primitives in Feistel Networks”, Proceedings of the 2nd International Workshop on Security in Information Systems, WOSIS 2004, Porto/Portugal 13-14 April, 2004. [pdf]
  • Mavridis, I., Katos, V., Kotini, I., “Security Modules for Access Control in Mobile Applications”, Proceedings in First International Workshop in Wireless Security Technologies, London, UK, April 15-16, 2003.
  • Katos, V., Alyea, W., ”Trust Models for Access Control”, Journal of Information Technology Impact, vol.2, issue 3, 2002.[pdf]
  • Katos, V., Vlachopoulou, M. and Manthou V., “Modeling Virtual Network Processes”, Proceedings, 6th World Multiconference in Systemics, Cybernetics and Informatics, Orlando, Florida, July 14-18, 2002.
  • Kalentzi, E., Katos, V., Batzios, C., “On the scalability of the BRODESSYS decision support system”, Proceedings, 6th World Multiconference in Systemics, Cybernetics and Informatics, Orlando, Florida, July 14-18, 2002.

 

A location privacy extension for DVB-RCS


Copyright © 2017 Information Security and Incident Response Research Unit. All Rights Reserved.
No computers were harmed in the 0.378 seconds it took to produce this page.

Designed/Developed by Lloyd Armbrust & hot, fresh, coffee.