• Conference Object  

      Data protection issues of integrated Electronic Health Records (EHR) 

      Schiza, Eirini C.; Fakas, Georgios John; Pattichis, Constantinos S.; Petkov, N.; Schizas, Christos N. (Springer Verlag, 2016)
      An Electronic Health Record (EHR) of a patient in perspective maintains the medical history of the citizen electronically in medical databanks serviced locally or is cloud based. The ownership and the access control should ...
    • Article  

      Education, risk and ethics 

      Papastephanou, Marianna (Routledge, 2006)
      While the notion of risk remains under-theorised in moral philosophy, risk aversion and moralist self-protection appear as dominant cultural tendencies saturating educational orientation and practice. Philosophy of education ...
    • Article  

      How many attackers can selfish defenders catch? 

      Mavronicolas, Marios; Monien, Burkhard; Lesta, Vicky Papadopoulou (2013)
      In a distributed system with attacks and defenses, both attackers and defenders are self-interested entities. We assume a reward-sharing scheme among interdependent defenders
    • Conference Object  

      Human Mobility Computing and Privacy: Fad or Reality? 

      Lee, A. J.; Pelechrinis, K.; Zeinalipour-Yazdi, Constantinos D. (Institute of Electrical and Electronics Engineers Inc., 2015)
      The advent of mobile computing and sensing technologies, in conjunction with omni-present and high-speed mobile networks, allow nowadays the capture of human mobility data at an extremely high fidelity. Modern mobile ...
    • Conference Object  

      Investigating the resolution of vulnerable dependencies with dependabot security updates 

      Mohayeji, Hamid; Agaronian, Andrei; Constantinou, Eleni; Zannone, Nicola; Serebrenik, Alexander (IEEE, 2023)
      Modern software development practices increasingly rely on third-party libraries due to the inherent benefits of reuse. However, libraries may contain security vulnerabilities that can propagate to the dependent applications. ...
    • Conference Object  

      A national Electronic Health Record System for Cyprus 

      Neokleous,Kleanthis C.; Schiza, Eirini C.; Salameh, E.; Palazis, K.; Schizas, Christos N. (Springer Verlag, 2014)
      This paper presents part of the work done for the "Electronic Health Record (EHR) at National Level project" under the Framework Program for Research, Technological Development and Innovation 2009-2010 of the Research ...
    • Article  

      A network game with attackers and a defender 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2008)
      Consider an information network with threats called attackers
    • Conference Object  

      A novel 3-d model for node and system trust 

      Hadjichristofi, G. C.; Kappos, G.; Hadjicostis, Christoforos N. (2011)
      Nowadays, there is an increasing demand for wireless and mobile networks that guarantee secure and reliable data communication among users. To enable data exchanges, authentication mechanisms need to be in place to dynamically ...
    • Article  

      Opacity-enforcing supervisory strategies via state estimator constructions 

      Saboori, A.; Hadjicostis, Christoforos N. (2012)
      State-based notions of opacity, such as initial-state opacity and infinite-step opacity, emerge as key properties in numerous security applications of discrete event systems. We consider systems that are modeled as partially ...
    • Article  

    • Conference Object  

      Security evaluation methodology for intrusion recovery protocols in wireless sensor networks 

      Stavrou, Eliana; Pitsillides, Andreas (2012)
      Researchers have designed intrusion recovery protocols in Wireless Sensor Networks (WSN) with the aim of restoring compromised services and promoting a secure and reliable environment in WSNs. Currently, evaluation frameworks ...
    • Conference Object  

      Security in future mobile sensor networks - Issues and challenges 

      Stavrou, E.; Pitsillides, A.; Hadjichristofi, G.; Hadjicostis, Christoforos N. (2010)
      Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
    • Conference Object  

      Security in future mobile sensor networks - Issues and challenges 

      Stavrou, Eliana; Pitsillides, Andreas; Hadjichristofi, George C.; Hadjicostis, Christoforos N. (2010)
      Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
    • Article  

      Security in the cache and forward architecture for the next generation Internet 

      Hadjichristofi, G. C.; Hadjicostis, Christoforos N.; Raychaudhuri, D. (2011)
      The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network ...
    • Article  

      A survey on secure multipath routing protocols in WSNs 

      Stavrou, Eliana; Pitsillides, Andreas (2010)
      Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN ...