
The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
Journal Publications
- CIRCE: Architectural Patterns for Circular and Trustworthy By-Design IoT Orchestrations, M. Papoutsakis, K. Fysarakis, E. Michalodimitrakis, G. Spanoudakis, and S. Ioannidis, Frontiers in Sustainability, Vol. 3, 2022. (DOI: 10.3389/frsus.2022.792103) Link / PDF
- The Green Blockchains of Circular Economy, G. Hatzivasilis, S. Ioannidis, K. Fysarakis, G. Spanoudakis, and N. Papadakis, MDPI Electronics, 10(16), 2008, 2021. (DOI:10.1109/IOTM.0001.2000162) Link / PDF
- Defining IoT Orchestrations with Security and Privacy by Design: A Gap Analysis, M. Papoutsakis, K. Fysarakis, G. Spanoudakis, and S. Ioannidis, IEEE Internet of Things Magazine, 2021. (DOI:10.1109/IOTM.0001.2000162) Link
- Towards a Collection of Security and Privacy Patterns, M. Papoutsakis, K. Fysarakis, G. Spanoudakis, S. Ioannidis, and K. Koloutsou, MDPI Applied Sciences, 11(4), 1396, 2021. (DOI:10.3390/app11041396) Link / PDF
- SPD-Safe: Secure Administration of Railway Intelligent Transportation Systems, G. Hatzivasilis, K. Fysarakis, S. Ioannidis, I. Hatzakis, G. Vardakis, N. Papadakis, and G. Spanoudakis, MDPI Electronics, 10(1), 92, 2021. (DOI:10.3390/electronics10010092) Link / PDF
- Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of “Looping Smart Assets”, A. Miaoudakis, K. Fysarakis, N. Petroulakis, S. Alexaki, G. Alexandris, S. Ioannidis, G. Spanoudakis, V. Katos, and C. Verikoukis, IEEE Vehicular Technology Magazine, 2020. (DOI:10.1109/MVT.2020.2991788) Link
- Networking-Aware IoT Application Development, A. Bröring, J. Seeger, M. Papoutsakis, K. Fysarakis, and A. Caracalli, MDPI Sensors, 20(3), 897, 2020. (DOI:10.3390/s20030897) Link / PDF
- WARDOG: Awareness detection watchdog for Botnet infection on the host device, G. Hatzivasilis, O. Soultatos, P. Chatziadam, K. Fysarakis, I. Askoxylakis, S. Ioannidis, G. Alexandris, V. Katos, and G. Spanoudakis, IEEE Transactions on Sustainable Computing, 2019 (DOI:10.1109/TSUSC.2019.2914917) Link
- The Industrial Internet of Things as an enabler for a Circular Economy; Hy-LP: A novel IIoT Protocol, evaluated on a Wind Park’s SDN/NFV-enabled 5G Industrial Network, G. Hatzivasilis, K. Fysarakis, O. Soultatos, I. Askoxylakis, I. Papaefstathiou, and G. Demetriou, Computer Communications Journal, Elsevier, 2018 (DOI:10.1016/j.comcom.2018.02.0079) Link / PDF
- Reactive Security for SDN/NFV-enabled Industrial Networks leveraging Service Function Chaining, N. Petroulakis, K. Fysarakis, I. Askoxylakis and George Spanoudakis, Transactions on Emerging Telecommunications Technologies, Wiley, 2017 (DOI:10.1002/ett.3269) Link/ PDF
- A review of lightweight block ciphers, G. Hatzivasilis, K. Fysarakis, I. Papaefstathiou and C. Manifavas, Journal of Cryptographic Engineering (JCEN), Springer, 2017. (DOI:10.1007/s13389-017-0160-y) Link / PDF
- XSACd - Cross-domain Resource Sharing & Access Control for Smart Environments, K. Fysarakis, O. Soultatos, C. Manifavas, I. Papaefstathiou and I. Askoxylakis, Special issue on Security, Privacy and Trust of the User-centric Solutions, Future Generation Computer Systems, Elsevier, 2016. (DOI:10.1016/j.future.2016.05.023) Link / PDF
- A survey of lightweight stream ciphers for embedded systems, C. Manifavas, G. Hatzivasilis, K. Fysarakis and I. Papaefstathiou, Security and Communication Networks, 9: 1226–1246, Wiley, 2015. (DOI:10.1002/sec.1399) Link / PDF
- Insect Biometrics: Optoacoustic Signal Processing and Its Applications to Remote Monitoring of McPhail Type Traps, I. Potamitis, I. Rigakis and K. Fysarakis, PLoS ONE, 10(11):e0140474, 2015. (DOI:10.1371/journal.pone.0140474) Link / PDF
- RtVMF − A secure Real-time Vehicle Management Framework, K. Fysarakis, G. Hatzivasilis, C. Manifavas and I. Papaefstathiou, IEEE Pervasive Computing, vol.15, no.1, pp.22-30, Jan.-Mar. 2016. (DOI:10.1109/MPRV.2016.15) Link / PDF
- Node.DPWS: Efficient Web Services for the IoT, K.Fysarakis, D. Mylonakis, C. Manifavas and I. Papaefstathiou, IEEE Software, vol. 33, no. 3, pp. 60-67, May-June 2016. (DOI:10.1109/MS.2015.155) Link / PDF
- Policy-controlled authenticated access to LLN-connected healthcare resources, K. Rantos, K.Fysarakis, C. Manifavas and I. Askoxylakis, IEEE Systems Journal, vol.PP, no.99, pp.1-11, 2015. (DOI:10.1109/JSYST.2015.2450313) Link / PDF
- The Electronic McPhail Trap, I. Potamitis, I. Rigakis and K. Fysarakis, Sensors, 14(12):22285-22299, 2014. (DOI:10.3390/s141222285) Link / PDF
- Embedded Systems Security: A Survey of EU Research Efforts, C. Manifavas, K. Fysarakis, A. Papanikolaou and I. Papaefstathiou, Security and Communication Networks, Wiley, 2014. (DOI:10.1002/sec.1151) Link / PDF
- How effective is your security awareness program? – An evaluation methodology, K. Rantos, K. Fysarakis and C. Manifavas, Information Security Journal: A Global Perspective, 21:6, 328-345, 2012. (DOI:10.1080/19393555.2012.747234) Link / PDF
Conference Publications
- PHOENI2X - A European Cyber Resilience Framework With Artificial Intelligence -Assisted Orchestration Automation For Business Continuity, Incident Response & Information Exchange, K. Fysarakis, A. Lekidis, V. Mavroeidis, K. Lampropoulos, G. Lyberopoulos, I. G. M. Vidal, J. C. T. Casals, E. Rodriguez, A. A. Moreno, A. Mavrelos, M. Tsantekidis, S. Pape, A. Chatzopoulou, C. Nanou, G. Drivas, V. Photiou, G. Spanoudakis, and O. Koufopavlou, Workshop on Electrical Power and Energy Systems Security, Privacy and Resilience (EPES-SPR), in conjunction with the 2023 IEEE International Conference on Cyber Security and Resilience (IEEE CSR 2023), Venice, Italy Jul. 31 - Aug. 2, 2023.
- A BPMN-Based Approach for Modeling Notation of CACAO Security Playbooks, M. Zych, V. Mavroeidis, K. Fysarakis, and M. Athanatos, Workshop on Data Science for Cyber Security (DS4CS), in conjunction with the 2023 IEEE International Conference on Cyber Security and Resilience (IEEE CSR 2023), Venice, Italy Jul. 31 - Aug. 2, 2023.
- A Blueprint for Collaborative Cybersecurity Operations Centres with Capacity for Shared Situational Awareness, Coordinated Response, and Joint Preparedness, K. Fysarakis, V. Mavroeidis, M. Athanatos, G. Spanoudakis, and S. Ioannidis, 5th Workshop on Cyber Threat Intelligence and Hunting (CyberHunt 2022), in conjunction with the 2022 IEEE International Conference on Big Data (IEEE BigData 2022), Osaka, Japan, Dec. 17-20, 2022. PDF
- IntellIoT: Intelligent IoT Environments, A. Bröring, V. Kulkarni, A. Zirkler, Buschmann P., K. Fysarakis, S. Mayer, B. Soret, L.D. Nguyen, P. Popovski, S. Samarakoon, M. Bennis, J. Härri, M. Rooker, G. Fritz, A. Bucur, G. Spanoudakis, and S. Ioannidis, Global IoT Summit 2022 (GIoTS 2022), Dublin, Ireland, June 20-23, 2022. PDF
- A Pattern–Driven Adaptation in IoT Orchestrations to Guarantee SPDI Properties, M. Papoutsakis, K. Fysarakis, E. Michalodimitrakis, E. Lakka, N. Petroulakis, G. Spanoudakis, and S. Ioannidis, 2nd Model-Driven Simulation and Training Environments for Cybersecurity (MSTEC), co-located with the European Symposium on Research in Computer Security (ESORICS), Guildford, UK, Sept. 17, 2020. PDF
- Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models, M. Smyrlis, K. Fysarakis, G. Spanoudakis and G. Hatzivasilis, 2nd Model-Driven Simulation and Training Environments for Cybersecurity (MSTEC), co-located with the European Symposium on Research in Computer Security (ESORICS), Guildford, UK, Sept. 17, 2020. PDF
- Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees, K. Fysarakis, M. Papoutsakis, N. Petroulakis, and G. Spanoudakis, 2019 IEEE Global Communications Conference (GLOBECOM 2019), Waikoloa, HI, USA, Dec. 9-13, 2019. PDF
- Secure Semantic Interoperability for IoT Applications with Linked Data, G. Hatzivasilis, O. Soultatos, E. Lakka, S. Ioannidis, D. Anicic, A. Bröring, K. Fysarakis, G. Spanoudakis, M. Falchettom, and L. Ciechomski, 2019 IEEE Global Communications Conference (GLOBECOM 2019), Waikoloa, HI, USA, Dec. 9-13, 2019. PDF
- Model-driven Cyber Range Training - A Cyber Security Assurance Perspective, I. Somarakis, M. Smyrlis, K. Fysarakis and G. Spanoudakis, 1st Model-Driven Simulation and Training Environments for Cybersecurity (MSTEC), co-located with the European Symposium on Research in Computer Security (ESORICS), Luxembourg, Sept. 27, 2019. PDF
- The THREAT-ARREST Cyber-Security Training Platform, O. Soultatos, S. Ioannidis, K. Fysarakis, G. Spanoudakis, H. Koshutanski, E. Damiani, K. Beckers, D. Wortmann, G. Bravos and M. Ioannidis, 1st Model-Driven Simulation and Training Environments for Cybersecurity (MSTEC), co-located with the European Symposium on Research in Computer Security (ESORICS), Luxembourg, Sept. 27, 2019. PDF
- Pattern-driven Security, Privacy, Dependability and Interoperability management of IoT environments, O. Soultatos, M. Papoutsakis, K. Fysarakis, G. Hatzivasilis, M. Michalodimitrakis, G. Spanoudakis, and S. Ioannidis, 2019 24th IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD 2019), Limassol, Cyprus, Sept. 11-13, 2019. PDF
- Architectural Patterns for Secure IoT Orchestrations, K. Fysarakis, G. Spanoudakis, N. Petroulakis, O. Soultatos, A. Broring, and T. Marktscheffel, Global IoT Summit 2019 (GIoTS'19), Aarhus, Denmark, June 17-21, 2019. PDF
- SEMIoTICS Architectural Framework: End-to-end Security, Connectivity and Interoperability for Industrial IoT, N. Petroulakis, E. Lakka, E. Sakic, V. Kulkarni, K. Fysarakis, I. Somarakis, J. Serra, L. Sanabria-Russo, D. Pau, M. Falchetto, D. Presenza, T. Marktscheffel, K. Ramantas, P. V. Mekikis, L. Ciechomski, K. Waledzik, Global IoT Summit 2019 (GIoTS'19), Aarhus, Denmark, June 17-21, 2019. PDF
- The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT, G. Hatzivasilis, N. Christodoulakis, C. Tzagkarakis, S. Ioannidis, K. Fysarakis, G. Demetriou and M. Panayiotou, 1st International Workshop on Smart Circular Economy (SmaCE'19), Santorini, Greece, May 30, 2019. PDF
- Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things, O. Soultatos, G. Spanoudakis, K. Fysarakis, I. Askoxylakis, G. Alexandris, A. Miaoudakis, and N. Petroulakis, IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks 2018 (IEEE CAMAD 2018), Barcelona, Spain, Sept. 17-19, 2018. PDF
- The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0, G. Hatzivasilis, I. Askoxylakis, G. Alexandris, D. Anicic, V. Kulkarni, K. Fysarakis, and G. Spanoudakis, IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks 2018 (IEEE CAMAD 2018), Barcelona, Spain, Sept. 17-19, 2018. PDF
- CloudNet Anti-Malware Engine: GPU-Accelerated Network Monitoring for Cloud Services, G. Hatzivasilis, K. Fysarakis, I. Askoxylakis, and A. Bilanakos, International Workshop on Information & Operational Technology (IT & OT) Security Systems (IOSec 2018), collocated with the 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018), Heraklion, Crete, Greece, Sept. 13, 2018. PDF
- SeMIBIoT: Secure Multi-protocol Integration Bridge for the IoT, E. Palavras, K. Fysarakis, I. Papaefstathiou, and I. Askoxylakis, IEEE International Conference on Communications (IEEE ICC 2018), Communications QoS, Reliability, and Modeling Symposium (CQRM), Kansas City, MO, USA, May 20-24, 2018. PDF
- VirtuWind - An SDN- and NFV-based Architecture for Softwarized Industrial Networks, E. Sakic, V. Kulkarni, V. Theodorou, A. Matsiuk, S. Kuenzer, Nikolaos E Petroulakis, and K. Fysarakis, 19th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems” (MMB 2018), Erlangen, Germany, Feb. 26-28, 2018. (DOI: 10.1007/978-3-319-74947-1_17) PDF
- A Reactive Security Framework for Operational Wind Parks Using Service Function Chaining, K. Fysarakis, N. Petroulakis, A. Roos, K. Abbasi, P. Vizarreta, G. Petropoulos, E. Sakic, G. Spanoudakis, and I. Askoxylakis, 22nd IEEE Symposium on Computers and Communications (ISCC 2017), Heraklion, Crete, Greece, July 3-6, 2017. (DOI: 10.1109/ISCC.2017.8024604) PDF
- Lightweight & Secure Industrial IoT Communications via the MQ Telemetry Transport Protocol, S. Katsikeas, K. Fysarakis, A. Miaoudakis, A. V. Bemten, I. Askoxylakis, I. Papaefstathiou and A. Plemenos, 22nd IEEE Symposium on Computers and Communications (ISCC 2017), Heraklion, Crete, Greece, July 3-6, 2017. (DOI: 10.1109/ISCC.2017.8024687) PDF
- SecRoute: End-to-End Secure Communications for Wireless Adhoc Networks, G. Hatzivasilis, I. Papaefstathiou, K. Fysarakis and I. Askoxylakis, 22nd IEEE Symposium on Computers and Communications (ISCC 2017), Heraklion, Crete, Greece, July 3-6, 2017. (DOI: 10.1109/ISCC.2017.8024587) PDF
- Which IoT Protocol? Comparing standardized approaches over a common M2M application, K. Fysarakis, O. Soultatos, I. Askoxylakis, C. Manifavas, I. Papaefstathiou and V. Katos, 2016 IEEE Global Communications Conference (GLOBECOM 2016), Washington, DC, USA, Dec. 4-8, 2016. (DOI: 10.1109/GLOCOM.2016.7842383) PDF
- WSACd - A Usable Access Control Framework for Smart Home Devices, K. Fysarakis, C. Konstantourakis, K. Rantos, C. Manifavas and I. Papaefstathiou, 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), Heraklion, Crete, Greece, Aug. 24-25, 2015. (DOI:10.1007/978-3-319-24018-3_8) PDF
- Secure and Authenticated Access to LLN Resources Through Policy Constraints, K. Rantos, K. Fysarakis, O. Soultatos and I. Askoxylakis, 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), Heraklion, Crete, Greece, Aug. 24-25, 2015. (DOI:10.1007/978-3-319-24018-3_18) PDF
- RT-SPDM: Real-time Security Privacy & Dependability Management of Heterogeneous Systems, K. Fysarakis, G. Hatzivasilis, I. Askoxylakis and C. Manifavas, 3nd Int. Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2015), within the 17th Int. Conference on Human-Computer Interaction (HCII 2015), Los Angeles, USA, Aug. 2-7, 2015. (DOI:10.1007/978-3-319-20376-8_55) PDF
- Hardware implementation of a system classifying the optoacoustic signature of insect wing flap, I. Potamitis, K. Fysarakis, D. Longueville and S. Ntalampiras, 22nd International Congress on Sound and Vibration (ICSV22), Florence, Italy, July 12-16, 2015. PDF
- Policy-based Access Control for DPWS-enabled Ubiquitous Devices, K. Fysarakis, K. Rantos, O. Sultatos, C. Manifavas and I. Papaefstathiou, 19th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2014), Barcelona, Spain, Sept. 16-19, 2014. (DOI:10.1109/ETFA.2014.7005233) PDF
- An efficient Anti-Malware Intrusion Detection System implementation, exploiting GPUs, I. Papaefstathiou, A. Bilanakos, K. Fysarakis, G. Hatzivasilis and C. Manifavas, International Conference on Advanced Technology & Sciences (ICAT 2014), Antalya, Turkey, Aug. 12-15, 2014.
- Policy-based Access Control for Body Sensor Networks, C. Manifavas, K. Fysarakis, K. Rantos, K. Kagiambakis and I. Papaefstathiou, 8th Workshop in Information Security Theory & Practice (WISTP 2014), Heraklion, Crete, Greece, Jun. 30 - Jul. 02, 2014. (DOI:10.1007/978-3-662-43826-8_11) PDF
- DSAPE - Dynamic Security Awareness Program Evaluation, C. Manifavas, K. Fysarakis, K. Rantos and G. Hatzivasilis, Human Aspects of Information Security, Privacy and Trust thematic area, within the 16th International Conference on Human-Computer Interaction (HCI International 2014), Heraklion, Crete, Greece, Jun. 22 - 27, 2014. (DOI:10.1007/978-3-319-07620-1_23) PDF
- Embedded Systems Security Challenges, K. Fysarakis, G. Hatzivasilis, K. Rantos, A. Papanikolaou and C. Manifavas, Measurable security for Embedded Computing and Communication Systems (MeSeCCS 2014), within the International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2014), Lisbon, Portugal, Jan. 7-9, 2014. (DOI:10.5220/0004901602550266) PDF
- A Lightweight Anonymity & Location Privacy Service, K. Fysarakis, A. Adamopoulos, C. Manifavas and I. Papaefstathiou, 13th IEEE Symposium on Signal Processing and Information Technology (ISSPIT 2013), Athens, Greece, Dec. 12-15, 2013. (DOI:10.1109/ISSPIT.2013.6781866) PDF
- Lightweight Cryptography for Embedded Systems – A Comparative Analysis, C. Manifavas, G. Hatzivasilis, K. Fysarakis and K. Rantos. 6th International Workshop on Autonomous and Spontaneous Security (SETOP 2013), Egham, UK, Sep. 12-13, 2013. (DOI:10.1007/978-3-642-54568-9_21) PDF
- Secure Policy-Based Management Solutions in Heterogeneous Embedded Systems Networks, K. Rantos, A. Papanikolaou, K. Fysarakis and C. Manifavas, IEEE International Conference on Telecommunications & Multimedia (TEMU 2012), Heraklion, Greece, Jul. 30 - Aug. 1, 2012. (DOI:10.1109/TEMU.2012.6294723) PDF
- Embedded Systems Security, Aspects of secure embedded systems design and implementation, K. Fysarakis, C. Manifavas and K. Rantos., 10th International Symposium on Ambient Intelligence and Embedded Systems (AMIES 2011), Chania, Greece, Sept. 22-24, 2011. PDF
Book Chapters
- Pattern-driven Security, Privacy, Dependability and Interoperability in IoT, N. Petroulakis, K. Fysarakis, H. C. Pöhls, V. Kulkarni, G. Spanoudakis, A. Bröring, M. Papoutsakis, M. Michalodimitrakis, S. Ioannidis. In “Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection” (J. Soldatos, ed.), Boston-Delft: now publishers, 2020. (DOI: 10.1561/9781680836837.ch7) Link
- Service Chaining Using Software-Defined Networks,N. Petroulakis, K. Fysarakis, A. Miaoudakis, K. Ramantas, P. Chatziadam, and C. Verikoukis. In “Wiley 5G Ref: The Essential 5G Reference Online” (R. Tafazolli, C. L. Wang and P. Chatzimisios, eds.), Wiley, 2019. (DOI: 10.1002/9781119471509.w5GRef101) Link
- Biosensors and Internet of Things in smart healthcare applications: challenges and opportunities, M. Pateraki, K. Fysarakis, V. Sakkalis, G. Spanoudakis, I. Varlamis, M. Maniadakis, M. Lourakis, S. Ioannidis, N. Cummins, B. Schuller, E. Loutsetis, and D. Koutsouris. In “Wearable and implantable medical devices - Applications and challenges” (N. Dey, A. S. Ashour, S. J. Fong, and C. Bhatt, eds.), Academic Press, Elsevier, 2019. (ISBN: 9780128153697) Link / PDF
- SHIELD Technology Demonstrators, M. Cesena, C. Regazzoni, L. Marcenaro, G. Hatzivasilis, K. Fysarakis, C. Manifavas, I. Papaefstathiou, P. Azzoni, and K. Stefanidis. In “Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD Methodology” (G. A. Fiaschetti, J. Noll, P. Azzoni, and R. Uribeetxeberria, eds.), CRC Press, Taylor & Francis LLC, 2017. (ISBN: 9781138042759) Link
- Security Concerns in Co-operative Intelligent Transportation Systems, K. Fysarakis, I. Askoxylakis, V. Katos, S. Ioannidis, L. Marinos. In “Intrusion Detection and Prevention for Mobile Ecosystems” (G. Kambourakis, A. Shabtai, K. Kolias, and D. Damopoulos, eds.), CRC Series in Security, Privacy and Trust, Taylor & Francis LLC, 2017. (ISBN: 9781138033573) Link / PDF
Articles and White Papers
- Teaching Users New IoT Tricks: A Model-driven Cyber Range for IoT Security Training, M. Smyrlis, K. Fysarakis, and G. Spanoudakis, IEEE IoT Newsletter, Mar. 2021. Link / PDF
- Cyber-Ranges as a Means of Security Culture Establishment, G. Hatzivasilis, K. Fysarakis, S. Ioannidis, In "ERCIM News, the quarterly magazine of the European Research Consortium for Informatics and Mathematics", ERCIM 121, Special theme: The Climate Action: Mathematics, Informatics and Socio-Economics Accelerating the Sustainability, Apr. 2020. Link / PDF
- Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS), N. Petroulakis, K. Fysarakis, S. Ioannidis, G. Spanoudakis and V. Kulkarni, In "ERCIM News, the quarterly magazine of the European Research Consortium for Informatics and Mathematics", ERCIM 119, Special theme: Smart Things Everywhere, Oct. 2019. Link / PDF
- Slicing / Virtualisation and Strong Isolation, K. Fysarakis (ed.), In “5G-PPP Phase 1 Security Landscape White Paper” , 5G-PPP Security Working Group, June 2017. Link / PDF
Theses
- Analysis and composition of security primitives towards a framework that safeguards the confidentiality, integrity and availability of embedded systems: uSPBM - Secure Policy-based Management of Ubiquitous Smart Devices, K. Fysarakis. PhD Dissertation, Dept. of Electronic & Computer Engineering, Technical University of Crete, Chania, Greece, April 2016. Supervisor: Ioannis Papaefstathiou. PDF
- Voice over IP Security: Threat Analysis and Countermeasures, K. Fysarakis. MSc Thesis, Information Security Group, Royal Holloway, University of London, United Kingdom, Sept. 2007. Advisor: Allan Tomlinson. (DOI:10.13140/RG.2.1.4500.6561) PDF