Professor Vasilis Katos
- u_vkatos at bournemouth dot ac dot uk
- Professor in Cyber Security
Biography
I obtained a Diploma in Electrical Engineering from Democritus University of Thrace in Greece, an MBA from Keele University in the UK and a PhD in Computer Science (network security and cryptography) from Aston University. I am a certified Computer Hacking Forensic Investigator (CHFI). I have worked in the Industry as Information Security Consultant and served as an expert witness in Information Security in the UK and Greece. My research falls in the area of digital forensics and incident response, with the recent years focusing on digital forensics for investigating Intellectual Property infringements, following the close collaboration with the EU Intellectual Property Office (EUIPO) and UN's Interregional Crime and Justice Research Institute, UNICRI. I have participated in a number of EU and nationally funded research projects and in several national and international cyberdefence exercises. I have over 160 publications in journals, book chapters and conference proceedings and serve as a referee on several reputable conferences and journals (for example, IEEE Communications Letters, Computers & Security)... I have coordinated and delivered a number of workshops, both in an academic and a security professionals context. I am member of the editorial board of Computers & Security.
moreJournal Articles
- Czaja, P., Gdowski, B., Niemiec, M., Mees, W., Stoianov, N., Votis, K., Kharchenko, V., Katos, V., Merialdo, M., 2025. Cybersecurity challenges and opportunities of machine learning-based artificial intelligence. Neural Computing and Applications, 37 (33).
- Zacharis, A., Katos, V., Patsakis, C., 2024. Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle. International Journal of Information Security, 23 (4), 2691-2710.
- Shah, R., Cemiloglu, D., Yucel, C., Ali, R., Katos, V., 2024. Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices. International Journal of Information Security, 23 (3).
- Lockett, A., Chalkias, I., Yucel, C., Henriksen-Bulmer, J., Katos, V., 2023. Investigating IPTV Malware in the Wild. Future Internet, 15 (10).
- Zheng, G., Chai, W.K., Zhang, J., Katos, V., 2023. VDGCNeT: A novel network-wide Virtual Dynamic Graph Convolution Neural network and Transformer-based traffic prediction model. Knowledge Based Systems, 275.
- Damianou, A., Vayona, A., Demetriou, G., Katos, V., 2023. An actionable maturity planning model for smart, circular cities. Cities, 140.
- Zheng, G., Chai, W.K., Duanmu, J.L., Katos, V., 2023. Hybrid deep learning models for traffic prediction in large-scale road networks. Information Fusion, 92, 93-114.
- Jarvis, P.D., Damianou, A., Ciobanu, C., Katos, V., 2022. Vulnerability Exposure Driven Intelligence in Smart, Circular Cities. Digital Threats Research and Practice, 3 (4).
- Zheng, G., Chai, W.K., Katos, V., 2022. A dynamic spatial–temporal deep learning framework for traffic speed prediction on large-scale road networks. Expert Systems with Applications, 195.
- Deutrom, J., Katos, V., Al-Mourad, M.B., Ali, R., 2022. The Relationships between Gender, Life Satisfaction, Loneliness and Problematic Internet Use during COVID-19: Does the Lockdown Matter? International Journal of Environmental Research and Public Health, 19 (3).
- Deutrom, J., Katos, V., Ali, R., 2022. Loneliness, life satisfaction, problematic internet use and security behaviours: re-examining the relationships when working from home during COVID-19. Behaviour and Information Technology, 41 (14), 3161-3175.
- Simou, S., Kalloniatis, C., Gritzalis, S., Katos, V., Psalidas, M., 2022. Revised forensic framework validation and cloud forensic readiness. International Journal of Electronic Governance, 14 (1-2).
- Casino, F., Lykousas, N., Katos, V., Patsakis, C., 2021. Unearthing malicious campaigns and actors from the blockchain DNS ecosystem. Computer Communications, 179, 217-230.
- Zheng, G., Chai, W.K., Katos, V., Walton, M., 2021. A joint temporal-spatial ensemble model for short-term traffic prediction. Neurocomputing, 457, 26-39.
- Iliou, C., Kostoulas, T., Tsikrika, T., Katos, V., Vrochidis, S., Kompatsiaris, I., 2021. Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics. Digital Threats Research and Practice, 2 (3).
- Tsimperidis, I., Yucel, C., Katos, V., 2021. Age and gender as cyber attribution features in keystroke dynamic-based user classification processes. Electronics Switzerland, 10 (7).
- Apostolopoulos, T., Katos, V., Choo, K.K.R., Patsakis, C., 2021. Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks. Future Generation Computer Systems, 116, 393-405.
- Tsimperidis, I., Yoo, P.D., Taha, K., Mylonas, A., Katos, V., 2021. R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification. IEEE Transactions on Cybernetics, 50 (2), 525-535.
- Hatzivasilis, G., Soultatos, O., Chatziadam, P., Fysarakis, K., Askoxylakis, I., Ioannidis, S., Alexandris, G., Katos, V., Spanoudakis, G., 2021. WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device. IEEE Transactions on Sustainable Computing, 6 (1), 4-18.
- Qurashi, M.A., Angelopoulos, C.M., Katos, V., 2020. An architecture for resilient intrusion detection in ad-hoc networks. Journal of Information Security and Applications, 53.
- Miaoudakis, A., Fysarakis, K., Petroulakis, N., Alexaki, S., Alexandirs, G., Ioannidis, S., Spanoudakis, G., Katos, V., Verikoukis, C., 2020. Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of “Looping Smart Assets”. IEEE Vehicular Technology Magazine.
- Angelopoulos, K., Katos, V., 2020. DHP Framework: Digital Health Passports Using Blockchain - Use case on international tourism during the COVID-19 pandemic. Arxiv.
- Hatzivasilis, G., Soultatos, O., Ioannidis, S., Spanoudakis, G., Katos, V., Demetriou, G., 2020. MobileTrust: Secure Knowledge Integration in VANETs. ACM Transactions on Cyber Physical Systems, 4 (3).
- Rantos, K., Spyros, A., Papanikolaou, A., Kritsas, A., Ilioudis, C., Katos, V., 2020. Interoperability challenges in the cybersecurity information sharing ecosystem. Computers, 9 (1).
- Patsakis, C., Casino, F., Katos, V., 2020. Encrypted and covert DNS queries for botnets: Challenges and countermeasures. Computers and Security, 88.
- Patsakis, C., Casino, F., Lykousas, N., Katos, V., 2020. Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS. IEEE Access, 8, 118559-118571.
- Walshe, M., Epiphaniou, G., Al-Khateeb, H., Hammoudeh, M., Katos, V., Dehghantanha, A., 2019. Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks, 95.
- Simou, S., Kalloniatis, C., Gritzalis, S., Katos, V., 2019. A framework for designing cloud forensic-enabled services (CFeS). Requirements Engineering, 24 (3), 403-430.
- Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D., Pangalos, G., 2019. Improving forensic triage efficiency through Cyber Threat Intelligence. Future Internet, 11 (7).
- Valkanis, A., Iossifides, A., Chatzimisios, P., Angelopoulos, M., Katos, V., 2019. IEEE 802.11ax Spatial reuse improvement: An interference-based channel-access algorithm. IEEE Vehicular Technology Magazine, 14 (2), 78-84.
- Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D., Pangalos, G.J., 2019. Actionable threat intelligence for digital forensics readiness. Information and Computer Security, 27 (2), 273-291.
- Hatzivasilis, G., Soultatos, O., Chatziadam, P., Fysarakis, K., Askoxylakis, I., Ioannidis, S., Alexandris, G., Katos, V., Spanoudakis, G., 2019. WARDOG: Awareness detection watchbog for Botnet infection on the host device. IEEE Transactions on Sustainable Computing.
- Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D., Pangalos, G., 2018. A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness. International Journal of Systems and Society, 4 (2).
- Nisioti, A., Mylonas, A., Yoo, P.D., Katos, V., 2018. From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods. IEEE Communications Surveys and Tutorials, 20 (4), 3369-3388.
- Menesidou, S.A., Katos, V., Kambourakis, G., 2017. Cryptographic key management in delay tolerant networks: A survey. Future Internet, 9 (3).
- Tsalis, N., Mylonas, A., Nisioti, A., Gritzalis, D., Katos, V., 2017. Exploring the protection of private browsing in desktop browsers. Computers and Security, 67, 181-197.
- Menesidou, S.A., Katos, V., 2017. Opportunistic key management in delay tolerant networks. International Journal of Information and Computer Security, 9 (3), 212-228.
- Tsimperidis, I., Rostami, S., Katos, V., 2017. Age detection through keystroke dynamics from user authentication failures. International Journal of Digital Crime and Forensics, 9 (1), 1-16.
- Menesidou, S.A., Vardalis, D., Katos, V., 2016. Automated key exchange protocol evaluation in delay tolerant networks. Computers and Security, 59, 1-8.
- Tasidou, A., Soupionis, Y., Efraimidis, P., Mitrou, L., Katos, V., 2015. Privacy-preserving, User-centric VoIP CAPTCHA Challenges: an Integrated Solution in the SIP Environment. Information and Computer Security.
- Tsavli, M., Efraimidis, P., Katos, V., Mitrou, L., 2015. Reengineering the user: Privacy concerns about personal data on smartphones. Information and Computer Security.
- Psaroudakis, I., Katos, V., Efraimidis, P.S., 2015. A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network. Security and Communication Networks, 8 (3), 486-500.
- Tsimperidis, I., Katos, V., Clarke, N., 2015. Language Independent Gender Identification Through Keystroke Analysis. Information and Computer Security, 23 (3), 286-301.
- Psaroudakis, I., Katos, V., Saragiotis, P., Mitrou, L., 2014. A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol. International Journal of Electronic Security and Digital Forensics, 6 (4), 241-267.
- Provataki, A., Katos, V., 2013. Differential malware forensics. Digital Investigation, 10 (4), 311-322.
- Barmpatsalou, K., Damopoulos, D., Kambourakis, G., Katos, V., 2013. A critical review of 7 years of Mobile Device Forensics. Digital Investigation, 10 (4), 323-349.
- Shiaeles, S., Chryssanthou, A., Katos, V., 2013. On-scene triage open source forensic tool chests: Are they effective? Digital Investigation, 10 (2), 99-115.
- Katos, V., Stowell, F., Bednar, P., 2013. Macroeconomics of privacy and security for identity management and surveillance. Kybernetes, 42 (1), 140-163.
- Shiaeles, S.N., Katos, V., Karakos, A.S., Papadopoulos, B.K., 2012. Real time DDoS detection using fuzzy estimators. Computers and Security, 31 (6), 782-790.
- Katos, V., 2012. An integrated model for online transactions: Illuminating the black box. Information Management and Computer Security, 20 (3).
- Karayianni, S., Katos, V., Georgiadis, C.K., 2012. A framework for password harvesting from volatile memory. International Journal of Electronic Security and Digital Forensics, 4 (2-3).
- Spyridopoulos, T., Katos, V., 2011. Requirements for a forensically ready cloud storage service. International Journal of Digital Crime and Forensics, 3 (3), 19-36.
- Aggelis, A., Sarris, E.T., Katos, V., 2011. A location privacy extension for DVB-RCS. Radioengineering, 20 (1), 151-158.
- Kavallaris, T., Katos, V., 2010. On the detection of pod slurping attacks. Computers and Security, 29 (6), 680-685.
- Bednar, P.M., Katos, V., Hennell, C.. On the complexity of collaborative cyber crime investigations. Digital Evidence & Elec. Signature L. ….
- Katos, V.. An integrated model for online transactions: methodological issues and challenges. Methodological Innovations.
- Bednar, P.M., Katos, V.. Diversity Networks in Digital Investigations. WDFIA.
- Katos, V., Stowell, F., Bednar, P.. From Synergy to Symbiosis: New Directions in Security and Privacy? International Journal of Information ….
- Katos, V., Furnell, S., 2008. The security and privacy impact of criminalising the distribution of hacking tools. Computer Fraud and Security, 2008 (7).
- Katos, V., Bednar, P.M., 2008. A cyber-crime investigation framework. Computer Standards and Interfaces, 30 (4), 223-228.
- Katos, V., Patel, A., 2008. A partial equilibrium view on security and privacy. Information Management and Computer Security, 16 (1).
- Bednar, P., Welch, C., Katos, V.. Innovation management through the use of diversity networks. International Journal of Knowledge and ….
- Katos, V., Stowell, F., Bednar, P., 2007. Quis Custodiet Ipsos Custodies? Systemist, 29 (2).
- Katos, V., 2007. Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. Information Sciences, 177 (15), 3060-3073.
- Katos, V., Doherty, B., 2007. Exploring confusion in product ciphers through regression analysis. Information Sciences, 177 (8), 1789-1795.
- Katos, V., 2007. Exploring confusion in product ciphers through regression analysis”, Information Sciences. Information Sciences, 177 (8).
- Adams, C., Katos, V.. Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations. Journal of Information Privacy and Security.
- Katos, V., Stowell, F., Bednar, P.. Quis Custodiet Ipsos Custodies? Systemist.
- Katos, V., 2006. Forecasting Volatility of Active Phising Sites. Information Risk Management & Audit, 16 (2).
- Katos, V., Adams, C., 2005. Modelling corporate wireless security and privacy. Journal of Strategic Information Systems, 14 (3), 307-321.
- Katos, V., King, T., Adams, C., 2005. Towards a Computer Based Training Tool for Education in Cryptography. UPGRADE Journal, V (6).
- Adams, C., Katos, V., 2005. The ubiquitous mobile and location-awareness time bomb. Cutter IT Journal, 18 (6).
- Katos, V., 2005. A randomness test for block ciphers. Applied Mathematics and Computation, 162 (1), 29-35.
- Katos, V., 2005. Statistical Risk Cluster Analysis for Network Segmentation. Information Risk Management & Audit, 162 (1).
- Adams, C., Katos, V., 2005. Privacy challenges for location aware technologies. Mobile Information Systems II.
- Katos, V.. Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. WOSIS.
- Katos, V., King, T., Adams, C.. Towards A Computer-Based Training Tool for Education in Cryptography.
- Moffat, A.C., Osselton, M.D., Widdop, B., Clarke, E.G.C.. Clarke's analysis of drugs and poisons. Pharmaceutical Pr.
- Katos, V., Alyea, W.. Trust Models for Access Control. Journal of Information Technology Impact.
- Katos, V., Psaroudakis, I., Saragiotis, P., Mitrou, L.. A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description …. cis.aueb.gr.
Books
- Katos, V.. Symmetric cryptography in computer communications. dl.acm.org.
- Katos, V., Stephanides, G., 2003. Techniques for cryptography and cryptanalysis. Thessaloniki: Zygos.
Chapters
- Katos, V., Efraimidis, P.S., 2025. Privacy in Data-Driven Circular Economy. Encyclopedia of Cryptography Security and Privacy Third Edition.
- Katos, V., Ciobanu, C., 2025. Economics of Software Vulnerability Markets. Encyclopedia of Cryptography Security and Privacy Third Edition.
- Chalkias, I., Yucel, C., Mallis, D., Rajamaki, J., De Vecchis, F., Hagstrom, P., Katos, V., 2024. An Empirical Evaluation of Cyber Threat Intelligence Sharing in the ECHO Early Warning System. 23-40.
- Arogbodo, M.O., Katos, V., 2023. Predicting Cyber Security Behaviors Through Psychosocial and Demographic Conditions During COVID-19. Effective Cybersecurity Operations for Enterprise Wide Systems.
- Katos, V., Ciobanu, C., 2021. Economics of Software Vulnerability Markets. In: Jajodia, S., eds. Encyclopedia of Cryptography, Security and Privacy.. Springer.
- Katos, V., Efraimidis, P., 2021. Privacy in Data-Driven Circular Economy. In: Jajodia, S., eds. Encyclopedia of Cryptography, Security and Privacy. Springer.
- Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D., Pangalos, G.J., 2020. A socio-technical perspective on threat intelligence informed digital forensic readiness. Digital Forensics and Forensic Investigations Breakthroughs in Research and Practice.
- Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D., Pangalos, G.J., 2020. A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness. Cyber Warfare and Terrorism Concepts Methodologies Tools and Applications.
- Fysarakis, K., Askoxylakis, I., Katos, V., Ioannidis, S., Marinos, L., 2017. Security concerns in cooperative intelligent transportation systems. Intrusion Detection and Prevention for Mobile Ecosystems.
- Spyridopoulos, T., Katos, V., 2014. Data recovery strategies for cloud environments. Cloud Technology Concepts Methodologies Tools and Applications.
- Spyridopoulos, T., Katos, V., 2012. Data recovery strategies for cloud environments. Cybercrime and Cloud Forensics Applications for Investigation Processes.
- Katos, V., 2011. Managing IS Security and Privacy. Cyber Crime Concepts Methodologies Tools and Applications.
- Katos, V., Efraimidis, P., 2009. Identity Assurance in the Surveillance Society (in Greek). In: Lambrinoudakis, C., Mitrou, L., Gritzalis, S., Katsikas, S., eds. Privacy Protection in ICT: Technical and Legal Aspects. Athens: Papasotiriou.
- Efraimidis, P., Katos, V., 2009. Probability and Information Theory (in Greek). In: Burmester, M., Gritzalis, S., Katsikas, S., Chryssikopoulos, V., eds. Modern Cryptography: Theory and Applications.. Papasotirou.
- Katos, V.. Managing IS Security and Privacy. mfile.narotama.ac.id.
- Katos, V., Bednar, P., Welch, C.. Dealing with epistemic uncertainty in the SST framework. lup.lub.lu.se.
Conferences
- Abumalloh, R.A., Gurgun, S., Noman, M., Phalp, K., Halabi, O., Katos, V., Ali, R., 2024. Empathy vs Reluctance to Challenge Misinformation: The Mediating Role of Relationship Costs, Perspective Taking, and Need for Cognition. Lecture Notes in Business Information Processing, 513, 376-392.
- Papanikolaou, A., Ilioudis, C., Katos, V., 2023. Introducing responsibly self-healing into the incident management lifecycle. ACM International Conference Proceeding Series, 335-337.
- Papanikolaou, A., Ilioudis, C., Katos, V., 2023. Cyber-pi: Intelligent cyberthreat detection and supervised response. Ceur Workshop Proceedings, 3601.
- Iliou, C., Kostoulas, T., Tsikrika, T., Katos, V., Vrochidis, S., Kompatsiaris, I., 2022. Web Bot Detection Evasion Using Deep Reinforcement Learning. ACM International Conference Proceeding Series.
- Katos, V., Ki-Aries, D., Faily, S., Genchev, A., Bozhilova, M., Stoianov, N., 2022. Cybersecurity User Requirements Analysis: The ECHO Approach. Lecture Notes in Networks and Systems, 344, 405-421.
- Iliou, C., Kostoulas, T., Tsikrika, T., Katos, V., Vrochidis, S., Kompatsiaris, I., 2021. Web bot detection evasion using generative adversarial networks. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience Csr 2021, 115-120.
- McCall, S., Yucel, C., Katos, V., 2021. Education in cyber physical systems security: The case of connected autonomous vehicles. IEEE Global Engineering Education Conference Educon, 2021-April, 1379-1385.
- Tsimperidis, I., Rostami, S., Wilson, K., Katos, V., 2021. User Attribution Through Keystroke Dynamics-Based Author Age Estimation. Lecture Notes in Networks and Systems, 180, 47-61.
- Zheng, G., Chai, W.K., Katos, V., 2021. The Sequence-to-Sequence Architecture with An Embedded Module for Long-Term Traffic Speed Forecasting with Missing Data. 2021 26th International Conference on Automation and Computing System Intelligence Through Automation and Computing Icac 2021.
- Mallis, D., Angelopoulos, C.M., Katos, V., Vogklis, K., 2021. ISUMS: Indoor Space Usage Monitoring System for Sustainable Built Environment Using LoRaWAN. Proceedings 17th Annual International Conference on Distributed Computing in Sensor Systems Dcos 2021, 473-482.
- Bada, A.O., Damianou, A., Angelopoulos, C.M., Katos, V., 2021. Towards a Green Blockchain: A Review of Consensus Mechanisms and their Energy Consumption. Proceedings 17th Annual International Conference on Distributed Computing in Sensor Systems Dcos 2021, 503-511.
- Damianou, A., Khan, M.A., Marios Angelopoulos, C., Katos, V., 2021. Threat Modelling of IoT Systems Using Distributed Ledger Technologies and IOTA. Proceedings 17th Annual International Conference on Distributed Computing in Sensor Systems Dcos 2021, 404-413.
- Danilatou, V., Antonakaki, D., Tzagkarakis, C., Kanterakis, A., Katos, V., Kostoulas, T., 2020. Automated Mortality Prediction in Critically-ill Patients with Thrombosis using Machine Learning. Proceedings IEEE 20th International Conference on Bioinformatics and Bioengineering Bibe 2020, 247-254.
- Qurashi, M.A., Angelopoulos, C.M., Katos, V., 2020. An Architecture for Resilient Intrusion Detection in IoT Networks. IEEE International Conference on Communications, 2020-June.
- Simou, S., Kalloniatis, C., Gritzalis, S., Katos, V., 2020. A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services. Communications in Computer and Information Science, 1111 CCIS, 161-177.
- Heydari, M., Mylonas, A., Katos, V., Balaguer-Ballester, E., Altaf, A., Tafreshi, V.H.F., 2020. Uncertainty-aware authentication model for IoT. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 11980 LNCS, 224-237.
- Rostami, S., Kleszcz, A., Dimanov, D., Katos, V., 2020. A machine learning approach to dataset imputation for software vulnerabilities. Communications in Computer and Information Science, 1284 CCIS, 25-36.
- Yucel, C., Chalkias, I., Mallis, D., Karagiannis, E., Cetinkaya, D., Katos, V., 2020. On the assessment of completeness and timeliness of actionable cyber threat intelligence artefacts. Communications in Computer and Information Science, 1284 CCIS, 51-66.
- Asad, B., Saxena, N., Katos, V., 2020. Analysis of the security and privacy risks and challenges in smart cities' traffic light system. IET Conference Publications, 2020 (CP777), 226-232.
- Heydari, M., Mylonas, A., Katos, V., Balaguer-Ballester, E., Tafreshi, V.H.F., Benkhelifa, E., 2019. A Location-Aware Authentication Model to Handle Uncertainty in IoT. 2019 6th International Conference on Internet of Things Systems Management and Security Iotsms 2019, 43-50.
- Angelopoulos, K., Katos, V., 2019. Efficient Intrusion Detection in P2P IoT Networks. In: The 6th International Symposium for ICS & SCADA Cyber Security 10/09/2019 Piraeus, Greece.
- Iliou, C., Kostoulas, T., Tsikrika, T., Katos, V., Vrochidis, S., Kompatsiaris, Y., 2019. Towards a framework for detecting advanced Web bots. ACM International Conference Proceeding Series.
- Furnell, S., Li, S., Howells, G., Hernandez-Castro, J., Katos, V., 2019. Welcome message from ARES program committee co-chairs and general chair. ACM International Conference Proceeding Series.
- Heydari, M., Mylonas, A., Katos, V., Balaguer-Ballester, E., Tafreshi, V.H.F., Benkhelifa, E., 2019. Uncertainty-aware authentication model for fog computing in IoT. 2019 4th International Conference on Fog and Mobile Edge Computing Fmec 2019, 52-59.
- Angelopoulos, C.M., Katos, V., Kostoulas, T., Miaoudakis, A., Petroulakis, N., Alexandris, G., Demetriou, G., Morandi, G., Rak, U., Waledzik, K., Panayiotou, M., Tsatsoulis, C.I., 2019. IDEAL-CITIES - A trustworthy and sustainable framework for circular smart cities. Proceedings 15th Annual International Conference on Distributed Computing in Sensor Systems Dcoss 2019, 443-450.
- Damianou, A., Angelopoulos, C.M., Katos, V., 2019. An architecture for blockchain over edge-enabled IoT for smart circular cities. Proceedings 15th Annual International Conference on Distributed Computing in Sensor Systems Dcoss 2019, 465-472.
- Zheng, G., Chai, W.K., Katos, V., 2019. An ensemble model for short-term traffic prediction in smart city transportation system. Proceedings IEEE Global Communications Conference Globecom.
- Henriksen-Bulmer, J., Faily, S., Katos, V., 2018. Translating Contextual Integrity into Practice using CLIFOD. In: 21st ACM Conference on computer-supported cooperative work and social computing (CSCS 2018) 03/11/2018 Jersey City, USA. https://networkedprivacycscw2018.wordpress.com/position-papers/.
- Alexandris, G., Katos, V., Alexaki, S., Hatzivasilis, G., 2018. Blockchains as Enablers for Auditing Cooperative Circular Economy Networks. IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks Camad, 2018-September.
- Alexaki, S., Alexandris, G., Katos, V., Nikolaos Petroulakis, E., 2018. Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions. IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks Camad, 2018-September.
- Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D., Pangalos, G., 2018. Towards a Threat Intelligence Informed Digital Forensics Readiness Framework. In: Twenty-Fifth European Conference on Information Systems (ECIS) 06/06/2017 Guimarães, Portugal.
- Saxena, N., Katos, V., Kumar N, 2017. Cyber-Physical Smart Grid Security Tool for Education and Training Purposes. In: International Workshop on Realigning Cyber Security Education 27/11/2017 Canberra, Australia.
- Nisioti, A., Mylonas, A., Katos, V., Yoo, P.D., Chryssanthou, A., 2017. You can run but you cannot hide from memory: Extracting im evidence of Android apps. Proceedings IEEE Symposium on Computers and Communications, 457-464.
- Nisioti, A., Heydari, M., Mylonas, A., Katos, V., Tafreshi, V.H.F., 2017. TRAWL: Protection against rogue sites for the masses. Proceedings International Conference on Research Challenges in Information Science, 120-127.
- Zampoglou, M., Rocha, A., Vrochidis, S., Katos, V., 2017. MFSec 2017 chairs‘ welcome. Mfsec 2017 Proceedings of the 2nd International Workshop on Multimedia Forensics and Security Co Located with Icmr 2017.
- Naik, N., Jenkins, P., Savage, N., Katos, V., 2017. Big data security analysis approach using Computational Intelligence techniques in R for desktop users. 2016 IEEE Symposium Series on Computational Intelligence Ssci 2016.
- Tsikrika, T., Vrochidis, S., Akhgar, B., Burnap, P., Katos, V., Williams, M.L., 2017. 1st international workshop on search and mining terrorist online content & advances in data science for cyber security and risk on the web. Wsdm 2017 Proceedings of the 10th ACM International Conference on Web Search and Data Mining, 823-824.
- Ward, J., Dogan, H., Apeh, E., Mylonas, A., Katos, V., 2017. Using human factor approaches to an organisation’s bring your own device scheme. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 10292 LNCS, 396-413.
- Dimitriadis, A., Efraimidis, P.S., Katos, V., 2016. Malevolent app pairs: An android permission overpassing scheme. 2016 ACM International Conference on Computing Frontiers Proceedings, 431-436.
- Faily, S., Stergiopoulos, G., Katos, V., Gritzalis, D., 2016. “Water, water, every where”: Nuances for a water industry critical infrastructure specification exemplar. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 9578, 243-246.
- Faily, S., Gritzalis, D., Lykou, G., Mylonas, A., Partridge, A., Katos, V., 2016. Human-centered specification exemplars for critical infrastructure environments. Proceedings of the 30th International Bcs Human Computer Interaction Conference Hci 2016, 2016-July.
- Fysarakis, K., Askoxylakis, I., Soultatos, O., Papaefstathiou, I., Manifavas, C., Katos, V., 2016. Which IoT protocol? Comparing standardized approaches over a common M2M application. Proceedings IEEE Global Communications Conference Globecom.
- Ali, R., McAlaney, J., Faily, S., Phalp, K., Katos, V., 2015. Mitigating circumstances in cybercrime: A position paper. Proceedings 15th IEEE International Conference on Computer and Information Technology CIT 2015 14th IEEE International Conference on Ubiquitous Computing and Communications Iucc 2015 13th IEEE International Conference on Dependable Autonomic and Secure Computing Dasc 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing Picom 2015, 1972-1976.
- Vrochidis, S., Katos, V., Weippl, E., Kompatsiaris, I., 2015. Welcome message from the MFSec 2015 workshop organizers. Proceedings 10th International Conference on Availability Reliability and Security Ares 2015.
- Tsochataridou, C., Arampatzis, A., Katos, V.. Improving Digital Forensics Through Data Mining. In: 4th International Conference on Advances in Information Mining and Management (IMMM 2014) 20/07/2014 Paris.
- Tavli, M., Efraimidis, P., Katos, V.. Reengineering the user: Privacy concerns about personal data on smartphones. In: 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2014) 08/07/2014 Plymouth, UK.
- Sadok, M., Katos, V., Bednar, P.. Developing contextual understanding of information security risks. Centre for Security, Communications and Network Research, Plymouth University, UK. Human Aspects of Information Security and Assurance, HAISA 2014.
- Tsimperidis, I., Katos, V., 2013. Keystroke forensics: Are you typing on a desktop or a laptop? ACM International Conference Proceeding Series.
- Gritzalis, D., Soupionis, Y., Katos, V., Psaroudakis, I., Katsaros, P., Mentis, A., 2013. The SPHINX enigma in critical VoIP infrastructures: Human or botnet? Iisa 2013 4th International Conference on Information Intelligence Systems and Applications.
- Furnell, S., Clarke, N., Katos, V., 2013. Preface. Proceedings of the European Information Security Multi Conference Eismc 2013.
- Bednar, P., Sadok, M., Katos, V.. Contextual dependencies in information security systems. In: AIS SIGSEC and IFIP TC 11.1 Workshop on Information Security & Privacy, WISP 2013 14/09/2013 Milan, Italy. eprints.port.ac.uk.
- Gritzalis, D., Soupionis, Y., Katos, V., Psaroudakis, I., Katsaros, P., Mentis, A., 2013. The SPHINX Enigma in Critical VoIP Infrastructures: Human or Botnet? 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 124-129.
- Karayianni, S., Katos, V., 2012. Practical password harvesting from volatile memory. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, 99 LNICST.
- Menesidou, S.A., Katos, V., 2012. Authenticated key exchange (AKE) in delay tolerant networks. IFIP Advances in Information and Communication Technology, 376 AICT, 49-60.
- Psaroudakis, I., Katos, V., Efraimidis, P.S., 2012. A framework for anonymizing GSM calls over a smartphone VoIP network. IFIP Advances in Information and Communication Technology, 376 AICT, 543-548.
- Clarke, N.L., Katos, V., Menesidou, S.A., Ghita, B., Furnell, S., 2012. A novel security architecture for a space-data DTN. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 7277 LNCS.
- Varka, A.M., Katos, V.. On the user acceptance of graphical passwords. HAISA.
- Tasidou, A., Efraimidis, P.S., Soupionis, Y., Mitrou, L., Katos, V.. User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges. HAISA.
- Chryssanthou, A., Katos, V.. Assessing forensic readiness. WDFIA.
- Katos, V., Vrakas, D., Katsaros, P., 2011. A framework for access control with inference constraints. Proceedings International Computer Software and Applications Conference, 289-297.
- Katos, V., Stowell, F., Bednar, P., 2011. Surveillance, privacy and the law of requisite variety. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 6514 LNCS, 123-139.
- Bednar, P., Katos, V.. SSD: New Challenges for Digital Forensics. ItAIS. ItAIS 2011, Proceedings of the 8th Conference of the Italian Chapter of the Association for Information Systems.
- Spyridopoulos, T., Katos, V.. Towards a forensically ready cloud storage service. WDFIA books.google.com.
- Pangalos, G., Katos, V., 2010. Information assurance and forensic readiness. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, 26 LNICST, 181-188.
- Tasidou, A., Efraimidis, P.S., Katos, V., 2010. Economics of personal data management: Fair personal information trades. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, 26 LNICST, 151-160.
- Bednar, P.M., Katos, V., 2010. Digital forensic investigations: A new frontier for informing systems. Information Systems People Organizations Institutions and Technologies Itais the Italian Association for Information Systems, 361-371.
- Strevens, C., Wilson, C., Katos, V.. An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education. … Federation for Information Processing Digital Library.
- Bednar, P., Katos, V.. Addressing the human factor in information systems security. MCIS2009: 4th Mediterranean Conference on … lup.lub.lu.se.
- Kavallaris, T., Katos, V.. Detecting Data Leakage from Pod Slurping Based Attacks on a Windows XP Platform. WDFIA.
- Bednar, P.M., Katos, V., Hennell, C., 2008. Cyber-crime investigations: Complex collaborative decision making. Proceedings 3rd International Annual Workshop on Digital Forensics and Incidents Analysis Wdfia 2008, 3-11.
- Briggs, J., Katos, V., Bhaludin, A., 2008. On the Security Controls of Portable Computing Devices in Healthcare Environments. In: International Network Conference 01/07/2008 Plymouth, UK.
- Bednar, P., Welch, C., Katos, V., 2007. Dealing with complexity in knowledge sharing processes. Proceedings of the European Conference on Knowledge Management Eckm, 101-107.
- Bednar, P.M., Katos, V., Welch, C., 2007. Systems analysis: Exploring the spectrum of diversity. Proceedings of the 15th European Conference on Information Systems Ecis 2007.
- Wilson, C., Katos, V., Strevens, C., 2007. An interdisciplinary approach to forensic IT and forensic psychology education. IFIP International Federation for Information Processing, 237.
- Hennell, C., Katos, V., 2007. A systemic approach to analysing the implications of the introduction of biometric passports. In: Furnell, S., Clarke, N., eds. 1st International Conference in Human Aspects of Information Security Assurance 04/06/2007 Plymouth, UK.
- Bednar, P., Welch, C., Katos, V., 2006. Four valued logic: Supporting complexity in knowledge sharing processes. Proceedings of the European Conference on Knowledge Management Eckm.
- Katos, V., Mavridis, I., 2006. A Practical Location Aware Access Control Solution for HTML Content in Wireless Networks. In: MediaWiN 02/04/2006 Athens.
- Fouliras, P.E., Katos, V.A., 2005. A novel security protocol enhancement on distributed multicasting for video on demand. Proceedings of the 5th International Network Conference INC 2005.
- Moffat, A.C., Osselton, M.D., Widdop, B., Clarke, E.G.C.. Clarke's analysis of drugs and poisons. Pharmaceutical Pr.
- Katos, V., Vlachopoulou, M., Manthou, V., 2002. Modeling virtual network processes. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS, 316-320.
- Kalentzi, E., Katos, V., Batzios, C.. On the Scalability of the BRODESSYS Decision Support System. researchgate.net.
- Katos, V.. Risk Cluster Analysis for Network Segmentation. Proceedings of the Fourth International Network … books.google.com.
Reports
- Borghi, M., Katos, V., Garanasvili, A., Favale, M., Mendis, D., 2019. Illegal IPTV in the European Union. Alicante, Spain: EU IPO.
- Borghi, M., Katos, V., Garanasvili, A., Favale, M., Mendis, D., 2019. Illegal IPTV in the European Union. Alicante, Spain: EU IPO.
- Augustinos, T.P., Bauer, L., Cappelletti, A., Chaudhery, J., Goddijn, I., Heslault, L., Kalfigkopoulos, N., Katos, V., Kitching, N., Krotofil, M., Leverett, E., Mainelli, M., Melliou, M., Moe, M., Moschonas, G., Nimmo, T., Papachristou, C., Parisi, Jr., R.A., Passas, S., Quested, T., Richardson, C., Ruml, D., Sargent, B., Schmidl, A., Toregas, C., 2016. Cyber Insurance - A look at recent advances, good practices & challenges. Heraklion, Greece: European Union Agency For Network and Information Security. Available from: file:///C:/Users/cjrichardson/Downloads/ENISA_Cyber-Insurance_2016-11_FINAL%20(1).pdf [Accessed 01/11/2016].
- Moffat, A.C., Osselton, M.D., Widdop, B., Clarke, E.G.C.. Clarke's analysis of drugs and poisons. Pharmaceutical Pr.
Theses
- Katos, V.. Product cipher negotiation with on-line evaluation for private communication over computer networks.
PhD Students
- Amalia Damianou. Digital Forensics in Smart, Circular Cities, (Completed)
- Mohammed Al Qurashi - Completed. Intrusion Detection for IoT., (Completed)
- Christos Iliou. Machine Learning Based Detection and Evasion Techniques for Advanced Web Bots, (Completed)
- Ioannis Psaroudakis - completed, 2014. VoIP Forensics
- Sofianna Menesidou - completed, 2016. Cryptographic Key Management in Delay Tolerant Networks
- Ioannis Tsimperidis - completed, 2017. Offender Profiling via Keystroke Dynamics
Profile of Teaching PG
- Cyber Security
- Cyber Security (BBC)
Profile of Teaching UG
- Computer Security
- Security Information and Event Management
Grants
- Cyber First Aid for Dorset (Department for Science, Innovation and Technology, 01 Sep 2025). Awarded
- Online business models used to infringe IPR – phase 4 – Vendor accounts on third party trading platforms (EU Intellectual Property Office, 01 Jun 2020). In Progress
- Privacy Throughout (Innovate UK, 23 Sep 2019). Completed
- The state of cybersecurity vulnerabilities in 2018 report (European Network and Information Security Agency, 01 Jul 2019). Completed
- PITCH: Privacy In The Circular Economy (Innovate UK, 01 Apr 2019). Completed
- ECHO: European network of Cybersecurity centres and competence Hub for innovation and Operations (EC/H2020/SU-ICT-3, 01 Nov 2018). In Progress
- Online Business Models Infringing Illegal IPTV and Cardsharing (EU Intellectual Property Office, 01 Sep 2018). Completed
- WIDECERT: Widening BU-CERT Threat Intelligence activities (Innovate UK/DCMS, 01 Feb 2018). Completed
- IDEAL-CITIES: Intelligence-Driven Urban Internet-of-Things Ecosystems for Circular, SAfe and IncLusive Smart CITIES (European Commission, 01 Jan 2018). In Progress
- CE2016 Exercise incident – Apt Memory Forensics Analysis (European Network and Information Security Agency, 01 Oct 2016). Completed
- EDUWEB - Combating Digital Exclusion: Children educate digitally illiterate adults in safe and creative web (European Commission, 01 Sep 2016). Completed
- CE 2016 Incident Development (European Network and Information Security Agency, 01 Apr 2016). Completed
- ' SENsing SKIN' for Monitoring-Based Maintenance of the Transport Infrastructure (SENSKIN) (H2020, 01 Jun 2015). Completed
- QB50 and REA CubeSats (General Secretariat for Research and Technology - NSRF, 01 Sep 2012). Completed
- SPHINX: Robust Internet Services (General Secretariat for Research and Technology - NSRF, 01 Feb 2011). Completed
- SPHINX: Robust Internet Services (General Secretariat for Research and Technology - NSRF, 01 Feb 2011). Completed
- Space-Data Routers (FP-7, 01 Nov 2010). Completed
- Space Internetworking Center (FP-7, 01 Sep 2010). Completed
External Responsibilities
- UNICRI (United Nations Interregional Crime and Research Institute), External Expert - digital forensics (2022-2024), https://unicri.it/
- EPSRC/UKRI, Reviewer (2020)
- EU Agency for Network and Information Security, NIS Expert (2017-2020)
- CHIST-ERA, Reviewer (-162016)
- Research Council of Norway, Reviewer (-3152015)
- European Commission, Reviewer (-3082016)
Qualifications
- PGCE in Teaching, HE (Portsmouth University, 2006)
- PhD in Computer Science (Aston University, 2000)
- MBA in Business Administration (Keele University, 1996)
- MEng in Electrical and Computer Engineering (Democritus University of Thrace, 1994)
Memberships
- European Union Intellectural Property Office (EUIPO), Expert member (2025-), https://www.euipo.europa.eu/en/observatory/about-us/expert-groups
- EU Agency for Network and Information Security (ENISA), NIS / CIS Expert (2017-2026),
- Information Audit and Control Association (ISACA), Academic Advocate (2007-), https://www.isaca.org/pages/default.aspx
- Institute of Electrical and Electronics Engineers (IEEE), Member,