Athanasios LiatifisUniversity of Western Macedonia | UOWM · Department of Electrical and Computer Engineering
Athanasios Liatifis
Bachelor of Engineering
About
17
Publications
6,401
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
195
Citations
Introduction
Education
October 2015 - August 2020
Publications
Publications (17)
Data exchange through mobile devices is rapidly increasing due to the high information demands of today's applications. The need for monitoring the exchanged traffic becomes important in order to control and optimize the device and network performance and security. Taking this under consideration, in this paper, we developed a cloud-based system fo...
Thousands of devices are connected to the Internet as part of the Internet of Things (IoT) ecosystems. The next generation of IoT networks is expected to support this growing number of Intelligent IoT devices and tactile Internet solutions to provide real-time applications. In view of this, IoT networks require innovative network architectures that...
The rapid growth of the Internet of Things has shaped the design and deployment of mobile networks to accommodate the need for ubiquitous connectivity and novel applications. The recent advancements in wireless communications and computing technologies allow the connection of a wider range and number of devices and systems, thereby enabling the des...
The electrical grid has significantly evolved over the years, thus creating a smart paradigm, which is well known as the smart electrical grid. However, this evolution creates critical cybersecurity risks due to the vulnerable nature of the industrial systems and the involvement of new technologies. Therefore, in this paper, the ELECTRON architectu...
p>Gamification has been characterized as the usage of video game elements in non-game environments. Gamification in cybersecurity awareness training can lead to more engaging interactions, greater pleasure, and increased security. Serious games are becoming increasingly popular since they allow learning in a natural setting. Although many of the pr...
p>Gamification has been characterized as the usage of video game elements in non-game environments. Gamification in cybersecurity awareness training can lead to more engaging interactions, greater pleasure, and increased security. Serious games are becoming increasingly popular since they allow learning in a natural setting. Although many of the pr...
Software Defined Networking (SDN) marked the beginning of a new era in the field of networking by decoupling the control and forwarding processes through the OpenFlow protocol. The Next Generation SDN is defined by Open Interfaces and full programmability of the data plane. P4 is a domain specific language that fulfills these requirements and has k...
The rapid growth of computer networks in various sectors has led to new services previously hard or impossible to implement. Internet of Things has also assisted in this evolution offering easy access to data but at the same time imposing constraints on both security and quality of service. In this paper, an SDN fault tolerant and resilient SDN con...
Both signature-based and anomaly-based Intrusion Detection and Prevention System (IDPS) have already demonstrated their efficiency towards recognising and mitigating various intrusions. However, the first category cannot detect zero-day attacks, while the second one lacks the presence of appropriate datasets. Therefore, the presence of additional c...
The digitisation of the typical electrical grid introduces valuable services, such as pervasive control, remote monitoring and self-healing. However, despite the benefits, cybersecurity and privacy issues can result in devastating effects or even fatal accidents, given the interdependence between the energy sector and other critical infrastructures...
The rise of the Industrial Internet of Things (IIoT) plays a crucial role in the era of hyper-connected digital economies. Despite the valuable benefits, such as increased resiliency, self-monitoring and pervasive control, IIoT raises severe cybersecurity and privacy risks, allowing cyberattackers to exploit a plethora of vulnerabilities and weakne...
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in Critical Infrastructures (CIs) since they monitor and control the automation processes of the industrial equipment. However, SCADA relies on vulnerable communication protocols without any cybersecurity mechanism, thereby making it possible to endanger the overall op...
The Industrial Control Systems (ICS) are the underlying monitoring and control components of critical infrastruc-tures, which consist of a number of distributed field devices, such as Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs) and Human Machine Interfaces (HMIs). As modern ICS are connected to the Internet, in the context o...
The multiple interconnections and the heterogeneity
of the devices and technologies into the Smart Grid (SG)
generate possible cyber-physical security vulnerabilities that can
be exploited by various cyberattackers. The cyberattacks in SG,
usually target the availability and the information integrity of
the systems. Replay attacks, Denial of Servic...