Yannis Nikoloudakis
YOU?
Author Swipe
View article: The FORTIKA Accelerated Edge Solution for Automating SMEs Security
The FORTIKA Accelerated Edge Solution for Automating SMEs Security Open
Although the recent trend for the term "cyber-attack" is restricted for incidents causing physical damage, it has been traditionally used to describe a broader range of attempts to make unauthorized use of an asset related to computer info…
View article: A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures
A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures Open
Recent studies report that cybersecurity breaches noticed in hospitals are associated with low levels of personnel’s cybersecurity awareness. This work aims to assess the cybersecurity culture in healthcare institutions from middle- to low…
View article: Unification of Edge Energy Grids for Empowering Small Energy Producers
Unification of Edge Energy Grids for Empowering Small Energy Producers Open
The current energy landscape is largely comprised of big stakeholders, who are often the monopolistic drivers of their local market. This fact does not leave any room for smaller players to participate in this procedure by contributing the…
View article: Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation
Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation Open
The ever-increasing number of internet-connected devices, along with the continuous evolution of cyber-attacks, in terms of volume and ingenuity, has led to a widened cyber-threat landscape, rendering infrastructures prone to malicious att…
View article: A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues
A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues Open
These days, cyber-criminals target humans rather than machines since they try to accomplish their malicious intentions by exploiting the weaknesses of end users. Thus, human vulnerabilities pose a serious threat to the security and integri…
View article: A Survey on Human and Personality Vulnerability Assessment in\n Cyber-security: Challenges, Approaches, and Open Issues
A Survey on Human and Personality Vulnerability Assessment in\n Cyber-security: Challenges, Approaches, and Open Issues Open
These days, cyber-criminals target humans rather than machines since they try\nto accomplish their malicious intentions by exploiting the weaknesses of end\nusers. Thus, human vulnerabilities pose a serious threat to the security and\ninte…
View article: 20. An Intuitive Distributed Cyber Situational Awareness Framework Within a Healthcare Environment
20. An Intuitive Distributed Cyber Situational Awareness Framework Within a Healthcare Environment Open
Modern ICT ecosystems are complex, distributed infrastructures with multiple ingress and egress points. Countless network interactions, through different endpoints and terminals, such as IoT devices, web services, specialized appliances, e…
View article: A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues Open
Today is the era of the Internet of Things (IoT). The recent advances in hardware and information technology have accelerated the deployment of billions of interconnected, smart and adaptive devices in critical infrastructures like health,…
View article: A View on Edge caching Applications
A View on Edge caching Applications Open
Devices with the ability to connect to the internet are growing in numbers day by day thus creating the need for a new way of manag-ing the way the produced traffic travels through data networks. Smart Cities, Vehicular Content Networks, H…
View article: Security Assessment as a Service Cross-Layered System for the Adoption of Digital, Personalised and Trusted Healthcare
Security Assessment as a Service Cross-Layered System for the Adoption of Digital, Personalised and Trusted Healthcare Open
The healthcare sector is exploring the incorporation of digital solutions in order to improve access, reduce costs, increase quality and enhance their capacity in reaching a higher number of citizens. However, this opens healthcare organis…
View article: Acceleration at the Edge for Supporting SMEs Security: The FORTIKA Paradigm
Acceleration at the Edge for Supporting SMEs Security: The FORTIKA Paradigm Open
<p>This article presents FORTIKA, an ongoing EU-funded project which is a resilient cyber-security solution that can easily be tailored and adjusted to the versatile and ever changing needs of small and medium-sized enterprises (SMEs…
View article: Composting as a Service: A Real-World IoT Implementation
Composting as a Service: A Real-World IoT Implementation Open
Composting is the delicate procedure of supervised decomposition of organic waste, which gradually transforms waste to nutrient-rich manure. It requires deep knowledge and constant attention by experts to achieve a quality outcome in a tim…