Skip to main content

Cybersecurity Awareness and Knowledge Systemic High-level Application

Deliverables

Final Evaluation Report

A public report that evaluates the implementation of the YAKSHA pilot deployments including satisfaction of demonstrators with the implementation of YAKSHA and its possible improvements, provide a global picture of security issues in the, produce a global estimate of the financial costs and benefits and investigate success factors leading to the maximal effectiveness of YAKSHA.

Report on YAKSHA pilot projects

A public report that details of both quantitative and qualitative data about the performance of YAKSHA that was collected during the duration of the pilot projects in Vietnam and Greece.

ASEAN Cybersecurity Ecosystem: a co-creation approach

A public report detailing the results and achievement from the co-creative workshops that aims to bring relevant cybersecurity stakeholders in the ASEAN region together to strengthen common vision for an ASEAN cybersecurity ecosystem.

Overview of Cybersecurity Status in ASEAN and the EU

A public report that analyses the EU and ASEAN’s cybersecurity ecosystems status in order to assess the main opportunities for developing new solutions for improving the cybersecurity posture of complex organisations in the ASEAN area.

Ontology definition and interoperability specifications

A report that specifies the needed ontology to store the information in the Sample database of YAKSHA.

Data collection methodology

A public report of the general assumptions, limitations of the platform and identification the different entities involved including their attributes, behaviour, and interactions.

Research and Innovations in malware collection & detection report

A Public report that provides novel methods in malware detection and collection, as well as impact assessment.

Searching for OpenAIRE data...

Publications

Protocol Deployment for Employing Honeypot-as-a-Service

Author(s): Alexandros Kostopoulos, Ioannis P. Chochliouros, Constantinos Patsakis, Miltos Anastasiadis, Alessandro Guarino
Published in: Artificial Intelligence Applications and Innovations. AIAI 2020 IFIP WG 12.5 International Workshops - MHDW 2020 and 5G-PINE 2020, Neos Marmaras, Greece, June 5–7, 2020, Proceedings, Issue 585, 2020, Page(s) 105-115
DOI: 10.1007/978-3-030-49190-1_10

GRYPHON: Drone Forensics in Dataflash and Telemetry Logs

Author(s): Evangelos Mantas, Constantinos Patsakis
Published in: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedings, Issue 11689, 2019, Page(s) 377-390
DOI: 10.1007/978-3-030-26834-3_22

Analysing the fall 2020 Emotet campaign

Author(s): Constantinos Patsakis, Anargyros Chrysanthou
Published in: Arxiv, 2020

Improving Vendor-managed Inventory Strategy Based on Internet of Things (IoT) Applications and Blockchain Technology

Author(s): Tom Dasaklis, Fran Casino
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 50-55
DOI: 10.1109/bloc.2019.8751478

Realising Honeypot-as-a-Service for Smart Home Solutions

Author(s): Alexandros Kostopoulos, Ioannis P. Chochliouros, Thodoris Apostolopoulos, Constantinos Patsakis, George Tsatsanifos, Miltos Anastasiadis, Alessandro Guarino, Bao Tran
Published in: 2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), 2020, Page(s) 1-6
DOI: 10.1109/seeda-cecnsm49515.2020.9221787

Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation

Author(s): Fran Casino, Constantinos Patsakis, Agusti Solanas
Published in: Electronic Commerce Research and Applications, Issue 38, 2019, Page(s) 100895, ISSN 1567-4223
DOI: 10.1016/j.elerap.2019.100895

I know what you streamed last night: On the security and privacy of streaming

Author(s): Alexios Nikas, Efthimios Alepis, Constantinos Patsakis
Published in: Digital Investigation, 2018, ISSN 1742-2876
DOI: 10.1016/j.diin.2018.03.004

HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets

Author(s): Fran Casino, Kim-Kwang Raymond Choo, Constantinos Patsakis
Published in: IEEE Transactions on Information Forensics and Security, 2019, Page(s) 1-1, ISSN 1556-6013
DOI: 10.1109/tifs.2019.2911156

Hydras and IPFS: a decentralised playground for malware

Author(s): Constantinos Patsakis, Fran Casino
Published in: International Journal of Information Security, 2019, ISSN 1615-5262
DOI: 10.1007/s10207-019-00443-0

Encrypted and covert DNS queries for botnets: Challenges and countermeasures

Author(s): Constantinos Patsakis, Fran Casino, Vasilios Katos
Published in: Computers & Security, Issue 88, 2020, Page(s) 101614, ISSN 0167-4048
DOI: 10.1016/j.cose.2019.101614

Exploiting statistical and structural features for the detection of Domain Generation Algorithms

Author(s): Constantinos Patsakis, Fran Casino
Published in: Journal of Information Security and Applications, Issue 58, 2021, Page(s) 102725, ISSN 2214-2126
DOI: 10.1016/j.jisa.2020.102725

NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation

Author(s): Christoforos Ntantogian, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, Christos Xenakis
Published in: Journal of Information Security and Applications, Issue 58, 2021, Page(s) 102752, ISSN 2214-2126
DOI: 10.1016/j.jisa.2021.102752