I am a Senior Lecturer (roughly equivalent to US: Associate Professor, explained here
) at the School of Computing, Engineering and Mathematics, University of Brighton
, UK. I am also a core member of the Secure and Dependable Software Systems
(SenSe) Research Cluster (i.e. Group), a visiting researcher at the Institute for Security Science and Technology
, Imperial College London
and a member of the EPSRC-funded Research Institute in Science of Cyber Security (RISCS) Phase 2.
Previously, I served as a Postdoctoral Research Assistant with the Theory Group
, School of Electronic Engineering and Computer Science
Queen Mary, University of London
, UK working for the Research Institute in Science of Cyber Security (RISCS)
that consists of prestigious UK universities (such as Imperial College and UCL). Prior to that, I was a Research Assistant with the Wireless, Multimedia and Network Research Group
, Faculty of Science, Engineering and Computing, Kingston University, London, UK (Aug ’12 – Jan ’13).
I have received the BSc degree in
Informatics and Telecommunications
National and Kapodistrian University of Athens
Athens (which is ranked internationally within the 201-250 top universities in Computer Science and Information Systems), Greece, in 2006, the MSc degree in Computer Science from the
Department of Informatics
Athens University of Economics and Business
Athens, Greece in 2008 and the PhD degree in Mobile Communications Security from
London, UK in 2012.
I am studying cyber security and privacy engineering and decision-making approaches from both a theoretical and practical perspective.
I have expertise in developing new models within the above fields and proposing algorithms or methodologies to tackle emerging challenges. I enjoy assessing my theoretical propositions by either simulations (mainly by using Python tools or network event-based simulators) or real-world testbeds. In addition, I have several years of expertise in preparing EU bids and have secured funds through successful FP7 and H2020 proposals.
I am teaching cyber security and privacy (theory and penetration testing) related
modules at both undergraduate and postgraduate level. My teaching experience also includes Mathematics (level 4) and Computer networks (level 5). More importantly, I have been developing (jointly with Haris Mouratidis and Michalis
Pavlidis) the MSc Information Security of University of Brighton
(commenced in September 2016), where I am the module leader of two core modules (SEC01 - Security and Reliability; SEC03 - System and Network Security) and co-leader of the Information Security project (SEC05) module. Furthermore, I am an external examiner of various MSc courses of
Staffordshire University from February 2016.
After I successfully organised the 6th Conference on Decision and Game Theory
for Security (GameSec 2015) in London, I served
as the Technical Program Committee Chair (jointly with Tansu Alpcan,
University of Melborune) of GameSec 2016 (7th Conference on
Decision and Game Theory for Security) and I am a reviewer for
leading journals by the ACM, IEEE, and registered expert
with the European Commission. I am also a member of the IEEE
and a professional member of the ACM.
Selected Research Areas
Internet-of-Things Security and Privacy.
Recent advances in information and communication technologies and embedded systems are the major reasons for the proliferation of the Internet of Things (IoT). However, security and privacy issues are a growing concern for consumers and manufacturers of IoT technologies. I am investigating novel methodologies and models that will guarantee the highest possible levels of protection of users' data and devices in presence of different security and privacy threats.
Cyber Security Decision Making.
One of the single largest concerns facing organisations today is how to protect themselves from cyber attacks whose prominence impose the need for organisations to prioritize their cyber security concerns with respect to their perceived threats. We are investigating: How do we make better security decisions? Specifically we are developing new approaches to decision support based on game theory. Our work supports professionals who design secure systems and also those charged with determining if systems have an appropriate level of security – in particular, systems administrators and CISOs.
Cyber Security Investments.
When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge and this is considered as part of the Economics of Security field. Our work has investigated how to support optimal cyber security investments against commodity attacks developing a decision support tool. We have shown that our decision support tool provides the same advice with the one advocated by the UK government with regard to the requirements for basic technical protection from cyber attacks in SMEs.
Secure Routing for Device-to-Device Communications.
Networking based on Device-to-Device (D2D) communication not only facilitates wireless and mobile peer-to-peer services but also provides energy efficient communications, locally offloading computation, offloading connectivity and high throughput. We are developing protocols that support smartphones to securely deliver a message in a multihop D2D network in presence of an adversary who can inject mobile malware into the network. Moreover, we are investigating mobile malware detection techniques that use machine learning.