Skip to main content

Cybersecurity Awareness and Knowledge Systemic High-level Application


Final Evaluation Report

A public report that evaluates the implementation of the YAKSHA pilot deployments including satisfaction of demonstrators with the implementation of YAKSHA and its possible improvements, provide a global picture of security issues in the, produce a global estimate of the financial costs and benefits and investigate success factors leading to the maximal effectiveness of YAKSHA.

Report on YAKSHA pilot projects

A public report that details of both quantitative and qualitative data about the performance of YAKSHA that was collected during the duration of the pilot projects in Vietnam and Greece.

ASEAN Cybersecurity Ecosystem: a co-creation approach

A public report detailing the results and achievement from the co-creative workshops that aims to bring relevant cybersecurity stakeholders in the ASEAN region together to strengthen common vision for an ASEAN cybersecurity ecosystem.

Overview of Cybersecurity Status in ASEAN and the EU

A public report that analyses the EU and ASEAN’s cybersecurity ecosystems status in order to assess the main opportunities for developing new solutions for improving the cybersecurity posture of complex organisations in the ASEAN area.

Ontology definition and interoperability specifications

A report that specifies the needed ontology to store the information in the Sample database of YAKSHA.

Data collection methodology

A public report of the general assumptions, limitations of the platform and identification the different entities involved including their attributes, behaviour, and interactions.

Research and Innovations in malware collection & detection report

A Public report that provides novel methods in malware detection and collection, as well as impact assessment.


Protocol Deployment for Employing Honeypot-as-a-Service

Author(s): Alexandros Kostopoulos, Ioannis P. Chochliouros, Constantinos Patsakis, Miltos Anastasiadis, Alessandro Guarino
Published in: Artificial Intelligence Applications and Innovations. AIAI 2020 IFIP WG 12.5 International Workshops - MHDW 2020 and 5G-PINE 2020, Neos Marmaras, Greece, June 5–7, 2020, Proceedings, 585, 2020, Page(s) 105-115, ISBN 978-3-030-49189-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-49190-1_10

GRYPHON: Drone Forensics in Dataflash and Telemetry Logs

Author(s): Evangelos Mantas, Constantinos Patsakis
Published in: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedings, 11689, 2019, Page(s) 377-390, ISBN 978-3-030-26833-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26834-3_22

Analysing the fall 2020 Emotet campaign

Author(s): Constantinos Patsakis, Anargyros Chrysanthou
Published in: Arxiv, 2020
Publisher: Arxiv

Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks

Author(s): Theodoros Apostolopoulos, Vasilios Katos, Kim-Kwang Raymond Choo, Constantinos Patsakis
Published in: Future Generation Computer Systems, 116, 2021, Page(s) 393-405, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2020.11.004

I know what you streamed last night: On the security and privacy of streaming

Author(s): Alexios Nikas, Efthimios Alepis, Constantinos Patsakis
Published in: Digital Investigation, 2018, ISSN 1742-2876
Publisher: Elsevier BV
DOI: 10.1016/j.diin.2018.03.004

HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets

Author(s): Fran Casino, Kim-Kwang Raymond Choo, Constantinos Patsakis
Published in: IEEE Transactions on Information Forensics and Security, 2019, Page(s) 1-1, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2019.2911156

Hydras and IPFS: a decentralised playground for malware

Author(s): Constantinos Patsakis, Fran Casino
Published in: International Journal of Information Security, 2019, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-019-00443-0

Encrypted and covert DNS queries for botnets: Challenges and countermeasures

Author(s): Constantinos Patsakis, Fran Casino, Vasilios Katos
Published in: Computers & Security, 88, 2020, Page(s) 101614, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.101614

Exploiting statistical and structural features for the detection of Domain Generation Algorithms

Author(s): Constantinos Patsakis, Fran Casino
Published in: Journal of Information Security and Applications, 58, 2021, Page(s) 102725, ISSN 2214-2126
Publisher: Elsevier
DOI: 10.1016/j.jisa.2020.102725

NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation

Author(s): Christoforos Ntantogian, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, Christos Xenakis
Published in: Journal of Information Security and Applications, 58, 2021, Page(s) 102752, ISSN 2214-2126
Publisher: Elsevier
DOI: 10.1016/j.jisa.2021.102752

Improving Vendor-managed Inventory Strategy Based on Internet of Things (IoT) Applications and Blockchain Technology

Author(s): Tom Dasaklis, Fran Casino
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 50-55, ISBN 978-1-7281-1328-9
Publisher: IEEE
DOI: 10.1109/bloc.2019.8751478

Realising Honeypot-as-a-Service for Smart Home Solutions

Author(s): Alexandros Kostopoulos, Ioannis P. Chochliouros, Thodoris Apostolopoulos, Constantinos Patsakis, George Tsatsanifos, Miltos Anastasiadis, Alessandro Guarino, Bao Tran
Published in: 2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), 2020, Page(s) 1-6, ISBN 978-1-7281-6445-8
Publisher: IEEE
DOI: 10.1109/seeda-cecnsm49515.2020.9221787

Privacy-preserving collaborative filtering: A new approach based on variable-group-size microaggregation

Author(s): Fran Casino, Constantinos Patsakis, Agusti Solanas
Published in: Electronic Commerce Research and Applications, 38, 2019, Page(s) 100895, ISSN 1567-4223
Publisher: Elsevier BV
DOI: 10.1016/j.elerap.2019.100895


HYDRA dataset

Author(s): Fran Casino; Nikolaos Lykousas; Ivan Homoliak; Constantinos Patsakis; Julio Hernandez-Castro
Published in: Zenodo

Exploiting Statistical and Structural Features for the Detection of Domain Generation Algorithms

Author(s): Constantinos Patsakis; Fran Casino
Published in: Zenodo