Background and activities
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
- (2021) Communication architecture for autonomous passenger ship. Proceedings of the Institution of Mechanical Engineers. Part O, Journal of risk and reliability.
- (2021) Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems. Sensors. vol. 21 (5).
- (2020) Secure AIS with Identity-Based authentication and Encryption. TransNav, International Journal on Marine Navigation and Safety of Sea Transportation. vol. 14 (2).
- (2020) Shipping 4.0: Security requirements for the Cyber-Enabled Ship. IEEE Transactions on Industrial Informatics. vol. 16 (10).
- (2020) Managing Cyber Security Risks of the Cyber-Enabled Ship. Journal of Marine Science and Engineering. vol. 8 (10).
- (2020) Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey. Future Internet. vol. 12 (4).
- (2020) SafeSec Tropos: Joint security and safety requirements elicitation. Computer Standards & Interfaces. vol. 70:103429.
- (2020) Privacy Preserving Passive DNS. Computers. vol. 9 (3).
- (2020) A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors. vol. 20 (22).
- (2019) A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures. EAI Endorsed Transactions on Security and Safety. vol. 6 (19).
- (2019) Threat Analysis for Smart Homes. Future Internet. vol. 11 (10).
- (2019) Towards automated threat-based risk assessment for cyber security in smarthomes. Proceedings of the ... European conference on information warfare and security. vol. 2019-July.
- (2018) Towards a secure automatic identification system (AIS). Journal of Marine Science and Technology.
- (2018) Towards Improving Existing Online Social Networks’ Privacy Policies. International Journal of Information Privacy, Security and Integrity. vol. 3 (3).
- (2017) Privacy protection of tagged multimedia content in online social networks. International Journal of Electronic Governance. vol. 9 (3-4).
- (2017) A structured methodology for deploying log management in WANs. Journal of Information Security and Applications. vol. 34.
- (2017) User Modeling Validation Over the Security Awareness of Digital Natives. Future Internet. vol. 9 (3).
- (2017) Security Awareness of the Digital Natives. Information. vol. 8 (2).
- (2017) Default OSN privacy settings: Privacy risks. Communications in Computer and Information Science. vol. 792.
- (2016) Design of a log management infrastructure using meta-network analysis. Lecture Notes in Computer Science (LNCS). vol. 9830.