default search action
Antonios Gouglidis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments. IEEE Trans. Cloud Comput. 12(1): 319-336 (2024) - [j13]Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Qiang Ni, Antonios Gouglidis, Wissam Mallouli, Heng Siong Lim:
Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach. IEEE Trans. Netw. Sci. Eng. 11(3): 3039-3052 (2024) - [c24]Ovini V. W. Gunasekera, Andrew Sogokon, Antonios Gouglidis, Neeraj Suri:
Real Arithmetic in TLAPM. NFM 2024: 136-143 - [i7]Igor Ivkic, Dominik Thiede, Nicholas J. P. Race, Matthew Broadbent, Antonios Gouglidis:
Security Evaluation in Software-Defined Networks. CoRR abs/2408.11486 (2024) - 2023
- [c23]Igor Ivkic, Dominik Thiede, Nicholas J. P. Race, Matthew Broadbent, Antonios Gouglidis:
A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments. CLOSER 2023: 277-288 - [c22]Ebtisaam Alharbi, Leandro Soriano Marcolino, Antonios Gouglidis, Qiang Ni:
Robust Federated Learning Method Against Data and Model Poisoning Attacks with Heterogeneous Data Distribution. ECAI 2023: 85-92 - [i6]Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Qiang Ni, Antonios Gouglidis, Wissam Mallouli, Heng Siong Lim:
Joint Security-vs-QoS Game Theoretical Optimization for Intrusion Response Mechanisms for Future Network Systems. CoRR abs/2303.08544 (2023) - [i5]Antonios Gouglidis, Anna Kagia, Vincent C. Hu:
Model Checking Access Control Policies: A Case Study using Google Cloud IAM. CoRR abs/2303.16688 (2023) - [i4]Igor Ivkic, Dominik Thiede, Nicholas J. P. Race, Matthew Broadbent, Antonios Gouglidis:
A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments. CoRR abs/2304.05776 (2023) - 2022
- [j12]Armin Stocker, Ali Alshawish, Martin C. Bor, John Vidler, Antonios Gouglidis, Andrew Scott, Angelos K. Marnerides, Hermann de Meer, David Hutchison:
An ICT architecture for enabling ancillary services in Distributed Renewable Energy Sources based on the SGAM framework. Energy Inform. 5 (2022) - [j11]Alexander Staves, Tom Anderson, Harry Balderstone, Benjamin Green, Antonios Gouglidis, David Hutchison:
A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems. Int. J. Crit. Infrastructure Prot. 37: 100505 (2022) - [j10]Igor Ivkic, Patrizia Sailer, Antonios Gouglidis, Andreas Mauthe, Markus Tauber:
A Security Cost Modelling Framework for Cyber-Physical Systems. ACM Trans. Internet Techn. 22(2): 53:1-53:31 (2022) - [c21]Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Heng Siong Lim, Qiang Ni, Antonios Gouglidis, Wissam Mallouli:
Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks. ARES 2022: 67:1-67:6 - [c20]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. CCS 2022: 3415-3417 - [c19]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Poster: Multi-Layer Threat Analysis of the Cloud. CCS 2022: 3419-3421 - [i3]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
ThreatPro: Multi-Layer Threat Analysis in the Cloud. CoRR abs/2209.14795 (2022) - 2021
- [j9]Christos Grompanopoulos, Antonios Gouglidis, Anastasia Mavridou:
Specifying and verifying usage control models and policies in TLA+. Int. J. Softw. Tools Technol. Transf. 23(5): 685-700 (2021) - [c18]Patrizia Sailer, Igor Ivkic, Markus Tauber, Andreas Mauthe, Antonios Gouglidis:
Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems. IM 2021: 908-913 - [i2]Patrizia Sailer, Igor Ivkic, Markus Tauber, Andreas Mauthe, Antonios Gouglidis:
Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems. CoRR abs/2107.07745 (2021) - [i1]Igor Ivkic, Patrizia Sailer, Antonios Gouglidis, Andreas Mauthe, Markus Tauber:
A Security Cost Modelling Framework for Cyber-Physical Systems. CoRR abs/2107.07784 (2021) - 2020
- [j8]Anish Jindal, Jakob Kronawitter, Ramona Kühn, Martin C. Bor, Hermann de Meer, Antonios Gouglidis, David Hutchison, Angelos K. Marnerides, Andrew Scott, Andreas Mauthe:
A flexible ICT architecture to support ancillary services in future electricity distribution networks: an accounting use case for DSOs. Energy Inform. 3(1) (2020) - [j7]Sarandis Mitropoulos, Antonios Gouglidis, Vasileios Giotsas:
A categorisation of policy conflicts in distributed systems and network management. Int. J. Inf. Priv. Secur. Integr. 4(4): 276-295 (2020) - [c17]Alexander Staves, Harry Balderstone, Benjamin Green, Antonios Gouglidis, David Hutchison:
A Framework to Support ICS Cyber Incident Response and Recovery. ISCRAM 2020: 638-651 - [p3]Sandra König, Antonios Gouglidis, Stefan Rass, Neil Adams, Paul Smith, David Hutchison:
Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach. Guide to Disaster-Resilient Communication Networks 2020: 769-789 - [p2]Tom Anderson, Jeremy Busby, Antonios Gouglidis, Karen Hough, David Hutchison, Mark Rouncefield:
Human and Organizational Issues for Resilient Communications. Guide to Disaster-Resilient Communication Networks 2020: 791-807
2010 – 2019
- 2019
- [c16]Anish Jindal, Angelos K. Marnerides, Antonios Gouglidis, Andreas Mauthe, David Hutchison:
Communication Standards for Distributed Renewable Energy Sources Integration in Future Electricity Distribution Networks. ICASSP 2019: 8390-8393 - [p1]Stavros Salonikias, Antonios Gouglidis, Ioannis Mavridis, Dimitris Gritzalis:
Access Control in the Industrial Internet of Things. Security and Privacy Trends in the Industrial Internet of Thing 2019: 95-114 - 2018
- [j6]Antonios Gouglidis, Benjamin Green, David Hutchison, Ali Alshawish, Hermann de Meer:
Surveillance and security: protecting electricity utilities and other critical infrastructures. Energy Inform. 1(1) (2018) - [c15]Antonios Gouglidis, Christos Grompanopoulos, Anastasia Mavridou:
Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+. MeTRiD@ETAPS 2018: 52-64 - 2017
- [j5]William Knowles, Jose M. Such, Antonios Gouglidis, Gaurav Misra, Awais Rashid:
All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications. Computer 50(12): 60-71 (2017) - [j4]Syed Noorulhassan Shirazi, Antonios Gouglidis, Arsham Farshad, David Hutchison:
The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective. IEEE J. Sel. Areas Commun. 35(11): 2586-2595 (2017) - [c14]Antonios Gouglidis, Vincent C. Hu, Jeremy Busby, David Hutchison:
Verification of Resilience Policies that Assist Attribute Based Access Control. ABAC@CODASPY 2017: 43-52 - 2016
- [j3]Jose M. Such, Antonios Gouglidis, William Knowles, Gaurav Misra, Awais Rashid:
Information assurance techniques: Perceived cost effectiveness. Comput. Secur. 60: 117-133 (2016) - [c13]Syed Noorulhassan Shirazi, Steven Simpson, Antonios Gouglidis, Andreas Mauthe, David Hutchison:
Anomaly Detection in the Cloud Using Data Density. CLOUD 2016: 616-623 - [c12]Ioannis M. Stephanakis, Syed Noor-ul-Hassan Shirazi, Antonios Gouglidis, David Hutchison:
A Multi-commodity Network Flow Model for Cloud Service Environments. EANN 2016: 186-197 - [c11]Antonios Gouglidis, Syed Noorulhassan Shirazi, Steven Simpson, Paul Smith, David Hutchison:
A multi-level approach to resilience of critical infrastructures and services. ICT 2016: 1-5 - [c10]Carmen Mas Machuca, Stefano Secci, Petra Vizarreta, Fernando A. Kuipers, Antonios Gouglidis, David Hutchison, Simon Jouet, Dimitrios Pezaros, Ahmed Elmokashfi, Poul E. Heegaard, Sasko Ristov, Marjan Gusev:
Technology-related disasters: A survey towards disaster-resilient Software Defined Networks. RNDM 2016: 35-42 - [c9]Antonios Gouglidis, Benjamin Green, Jeremy Busby, Mark Rouncefield, David Hutchison, Stefan Schauer:
Threat awareness for critical infrastructures resilience. RNDM 2016: 196-202 - [c8]Jerry S. Busby, Antonios Gouglidis, Stefan Rass, Sandra König:
Modelling security risk in critical utilities: The system at risk as a three player game and agent society. SMC 2016: 1758-1763 - 2015
- [c7]William Knowles, Jose M. Such, Antonios Gouglidis, Gaurav Misra, Awais Rashid:
Assurance Techniques for Industrial Control Systems (ICS). CPS-SPC@CCS 2015: 101-112 - 2014
- [j2]Antonios Gouglidis, Ioannis Mavridis, Vincent C. Hu:
Security policy verification for multi-domains in cloud systems. Int. J. Inf. Sec. 13(2): 97-111 (2014) - 2013
- [b1]Antonios Gouglidis:
Access control requirements engineering, modeling and verification in multi-domain grid and cloud computing systems. University of Macedonia Economic and Social Sciences, Greece, 2013 - [c6]Antonios Gouglidis, Ioannis Mavridis:
A Methodology for the Development and Verification of Access Control Systems in Cloud Computing. I3E 2013: 88-99 - [c5]Antonios Gouglidis, Ioannis Mavridis, Vincent C. Hu:
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems. SERE (Companion) 2013: 35-44 - 2012
- [j1]Antonios Gouglidis, Ioannis Mavridis:
domRBAC: An access control model for modern collaborative systems. Comput. Secur. 31(4): 540-556 (2012) - [c4]Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis:
A Use-Based Approach for Enhancing UCON. STM 2012: 81-96 - 2011
- [c3]Antonios Gouglidis, Ioannis Mavridis:
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems. WISTP 2011: 38-53
2000 – 2009
- 2009
- [c2]Antonios Gouglidis, Ioannis Mavridis:
On the Definition of Access Control Requirements for Grid and Cloud Computing Systems. GridNets 2009: 19-26 - [c1]Antonios Gouglidis, Ioannis Mavridis:
A Foundation for Defining Security Requirements in Grid Computing. Panhellenic Conference on Informatics 2009: 180-184
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-28 01:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint