
Konstantinos FysarakisSphynx Analytics Ltd
Konstantinos Fysarakis
PhD Electronic & Computer Engineering, MSc Information Security, BSc Applied Mathematics
About
71
Publications
66,966
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,240
Citations
Introduction
Additional affiliations
February 2021 - present
Sphynx Analytics Ltd
Position
- Chief Technology Officer
Description
- Responsible for scientific and technological activities’ management and coordination.
May 2018 - January 2021
Sphynx Technology Solutions AG
Position
- Chief Technology Officer
Description
- Responsible for scientific and technological activities’ management and coordination.
Publications
Publications (71)
The intelligence being built into modern vehicles significantly improves passenger safety and comfort, and this trend is expected to intensify in the coming years. Smart, eventually self-driving, vehicles are expected to form an important segment of the Internet of Things (IoT) –enabled word, introducing new modes of transportation and new types of...
The use of smart technologies in medicine and healthcare has been steadily increasing over the last years. Health and well-being monitoring systems are now deployed in homes, at work, and in everyday environments to support health, smart homes and age-friendly workplaces. A large variety of different off-the-shelf smart sensors and medical devices...
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be...
With digital technologies now being part of the fabric of our societies, identifying and managing cybersecurity threats becomes imperative. Within the European Union, several initiatives are underway, aiming to motivate, regulate and eventually orchestrate the establishment of capacity and enhancement of situational awareness, incident response, an...
As digital technologies become more pervasive in society and the economy, cybersecurity incidents become more frequent and impactful. According to the NIS and NIS2 Directives, EU Member States and their Operators of Essential Services must establish a minimum baseline set of cybersecurity capabilities and engage in cross-border coordination and coo...
As cyber systems become increasingly complex and cybersecurity threats become more prominent, defenders must prepare, coordinate, automate, document, and share their response methodologies to the extent possible. The CACAO standard was developed to satisfy the above requirements providing a common machine-readable framework and schema to document c...
Traditional IoT setups are cloud-centric and typically focused around a centralized IoT platform to which data is uploaded for further processing. Next generation IoT applications are incorporating technologies such as artificial intelligence, augmented reality, and distributed ledgers to realize semi-autonomous behaviour of vehicles, guidance for...
The adoption of Internet of Things (IoT) devices, applications and services gradually transform our everyday lives. In parallel, the transition from linear to circular economic (CE) models provide an even more fertile ground for novel types of services, and the update and enrichment of legacy ones. To fully realize the potential of the interplay be...
Eco-friendly systems are necessitated nowadays, as the global consumption is increasing. A data-driven aspect is prominent, involving the Internet of Things (IoT) as the main enabler of a Circular Economy (CE). Henceforth, IoT equipment records the system’s functionality, with machine learning (ML) optimizing green computing operations. Entities ex...
Structured approaches to the definition of service orchestrations facilitate the composition of components and services and allow for more capable and powerful applications, while introducing many advantages such as service reusability, cost reduction, and simplification of organization alliances. A variety of such approaches exist in the literatur...
The railway transport system is critical infrastructure that is exposed to numerous man-made and natural threats, thus protecting this physical asset is imperative. Cyber security, privacy, and dependability (SPD) are also important, as the railway operation relies on cyber-physical systems (CPS) systems. This work presents SPD-Safe—an administrati...
In light of the ever-increasing complexity and criticality of applications supported by ICT infrastructures, Cyber Ranges emerge as a promising solution to effectively train people within organisations on cyber-security aspects, thus providing an efficient mechanism to manage the associated risks. Motivated by this, the work presented herein introd...
The orchestration of heterogeneous IoT devices to enable the provision of IoT applications and services poses numerous challenges, especially in contexts where end-to-end security and privacy guarantees are needed. To tackle these challenges, this paper presents a pattern–driven approach for interacting with IoT systems, whereby the required proper...
The increase in the world's population has led to a massive rise in human consumption of the planet's natural resources, well beyond their replacement rate. Traditional recycling concepts and methods are not enough to counter such effects. In this context, a circular economy (CE), that is, a restorative and regenerative by-design economy, can refor...
Modern educational tools and computer technologies are now getting adapted in the cyber-ranges field. Simulation, emulation, as well as serious gaming provide an enhanced training experience under realistic conditions and accurate operational environments. The THREAT-ARREST Horizon-2020 project is developing a model-driven platform for professional...
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization...
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations. Consequently, the need for security-aware employees in every role of an organisation increases in accordance. Cyber Range training emerges as a promising...
Various tools support developers in the creation of IoT applications. In general, such tools focus on the business logic, which is important for application development, however, for IoT applications in particular, it is crucial to consider the network, as they are intrinsically based on interconnected devices and services. IoT application develope...
The advent of the Internet of Things opens a plethora of possibilities, provided the research and industry com- munities are able to overcome a number of challenges such as the dynamicity, scalability, heterogeneity and end-to-end security and privacy requirements of such environments. Motivated by these challenges, this paper proposes leveraging a...
Interoperability stands for the capacity of a system to interact with the units of another entity. Although it is quite easy to accomplish this within the products of the same brand, it is not facile to provide compatibility for the whole spectrum of the Internet-of-Things (IoT) and the Linked Data (LD) world. Currently, the different applications...
The innovative capabilities of 5G technologies, such as software‐defined networking (SDN) and network function virtualization (NFV), open up a variety of possibilities for improved and novel service provisioning. Nevertheless, technologies such as SDN expand the attack surface of the communication infrastructure, thus necessitating the introduction...
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization...
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations. Consequently, the need for security-aware employees in every role of an organisation increases in accordance. Cyber Range training emerges as a promising...
Achieving Security, Privacy, Dependability and In-teroperability (SPDI) is of paramount importance for the ubiquitous deployment and impact maximization of Internet of Things (IoT) applications. Nevertheless, said requirements are not only difficult to achieve at system initialization, but also hard to prove and maintain at run-time. This paper hig...
Next generation networks, as the Internet of Things (IoT), aim to create open and global networks for connecting smart objects, network elements, applications, web services and end-users. Research and industry attempt to integrate this evolving technology and the exponential growth of IoT by overcoming significant hurdles such as dynamicity, scalab...
The vast amount of connected devices on the Internet of Things (IoT) creates an enormous potential for new applications, by leveraging synergies arising through the convergence of consumer, business and industrial Internet, and creating open, global networks connecting people, data, and "things". In this context, the SEMIoTICS project aims to devel...
The growth of the global middle class provokes significant increment in product consumption. As the available resources are limited, Circular Economy (CE) raises as a promising initiative towards the sustainable development. Except from the traditional approaches of reusing or recycling products, the current trend utilizes modern computer technolog...
Botnets constitute nowadays one of the most dangerous security threats worldwide. High volumes of infected machines are controlled by a malicious entity and perform coordinated cyber-attacks. The problem will become even worse in the era of the Internet of Things (IoT) as the number of insecure devices is going to be exponentially increased. This p...
In the modern applications for Internet-of-Things (IoT) and Cyber-Physical Systems (CPSs) heterogeneous embedded devices exchange high volumes of data. Interconnection with cloud services is becoming popular. Thus, enhanced security is imperative but network monitoring is computational intensive. Parallel programming utilizing Graphics Processing U...
This paper presents an overview of the interoperability concepts along with the challenges for the IoT domain and the upcoming Web 3.0. We identify four levels of interoperability and the relevant solutions for accomplishing vertical and horizontal compatibility between the various layers of a modern IoT ecosystem, referred to as: technological, sy...
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment the system
becomes able to provide smart services (e.g. control lights, airconditioning, provide energy management services etc.). IoT is the main enabler of such environments. However,...
In the modern applications for Internet-of-Things (IoT) and Cyber-Physical Systems (CPSs) heterogeneous embedded devices exchange high volumes of data. Interconnection with cloud services is becoming popular. Thus, enhanced security is imperative but network monitoring is computational intensive. Parallel programming utilizing Graphics Processing U...
Embedded systems are deployed in various domains, including industrial installations, critical and nomadic environments, private spaces and public infrastructures. Their operation typically involves access, storage and communication of sensitive and/or critical information that requires protection, making the security of their resources and service...
The Internet of Things (IoT) is gradually becoming a reality, supported by an assortment of heterogeneous devices, varying from resource-starved wireless sensors to embedded devices and resource-rich backend systems, which are supplemented by a range of networking technologies and protocols. Nevertheless, this diverse ecosystem of platforms and pro...
Smart interconnected devices, including Cyber-Physical Systems (CPS), permeate our lives and are now an integral part of our daily activities, paving the way towards the Internet of Things (IoT). In the industrial domain, these devices interact with their surroundings and system operators, while often also integrating industrial cloud applications....
VirtuWind proposes the application of Software Defined Networking (SDN) and Network Functions Virtualization (NFV) in critical infrastructure networks. We aim at introducing network programmability, reconfigurability and multi-tenant capability both inside isolated and inter-connected industrial networks. Henceforth, we present the design of the Vi...
The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional secur...
Railways constitute a main means of mass transportation, used by public, private, and military entities to traverse long distances every day. Railway control software must collect spatial information and effectively manage these systems. Wireless sensor networks (WSNs) are an attractive solution to cover the area along-side the railway routes. In-c...
The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional secur...
Massive advancements in computing and communication technologies have enabled the ubiquitous presence of interconnected computing devices in all aspects of modern life, forming what is typically referred to as the “Internet of Things”. These major changes could not leave the industrial environment unaffected, with “smart” industrial deployments gra...
Computing devices already permeate working and living environments, while researchers and engineers aim to exploit the potential of pervasive systems in order to introduce new types of services and address inveterate and emerging problems. This process will lead us eventually to the era of urban computing and the Internet of Things (IoT). However,...
Computing devices permeate working and living environments, affecting all aspects of modern everyday lives; a trend which is expected to intensify in the coming years. In the residential setting, the enhanced features and services provided by said computing devices constitute what is typically referred to as a “smart home”. However, the direct inte...
Computing devices already permeate working and living environments, a trend affecting all aspects of modern everyday lives, and one that is expected to intensify in the coming years. As computing becomes ubiquitous, researchers and engineers aim to exploit the potential of pervasive systems in order to introduce new types of services and address in...
Pervasive computing constitutes a growing trend, aiming to embed smart devices into everyday objects. The limited resources of these devices and the ever-present need for lower production costs, lead to the research and development of lightweight cryptographic mechanisms. Block ciphers, the main symmetric key cryptosystems, perform well in this fie...
Monitoring traps are important components of integrated pest management applied against important fruit fly pests, including Bactrocera oleae (Gmelin) and Ceratitis capitata (Widemann), Diptera of the Tephritidae family, which effect a crop-loss/per year calculated in billions of euros worldwide. Pests can be controlled with ground pesticide sprays...
Ubiquitous devices comprising several resource-constrained sensors & actuators while having the long desired Internet connectivity, are becoming part of many solutions that seek to enhance user's environment smartness and quality of living. Their intrinsic resource limitations however constitute critical requirements, such as security, a great chal...
Computing devices already permeate working and living environments; a trend which is expected to intensify in the coming years. However, the direct interaction smart devices often have with the physical world, along with the processing, storage and communication of private sensitive data pertaining to users’ lives, bring security concerns into the...
The need to manage embedded systems, brought forward by the wider adoption of pervasive computing, is particularly vital in the context of secure and safety-critical applications. This work presents RT-SPDM, a framework for the real-time management of devices populating ambient environments. The proposed frame-work utilizes a formally validated app...
In this paper we present a standalone hardware-implemented system that performs all signal processing stages necessary to classify the species of insects based on their wing-flap imprint as they fly. The recognizer classifies insect’s wing-beat recordings from an array of phototransistors receiving light from an infrared LED or laser. The wing-beat...
Interconnected computing systems, in various forms, are expected to permeate
our lives, realizing the vision of the Internet of Things (IoT) and allowing us
to enjoy novel, enhanced services that promise to improve our everyday lives.
Nevertheless, this new reality also introduces significant challenges in terms
of performance, scaling, usability a...
Ubiquitous devices comprising several resource-constrained nodes with sensors, actuators and networking capabilities, are becoming part of many solutions that seek to enhance user’s environment smartness and quality of living, prominently including enhanced healthcare services. In such an environment, security issues are of primary concern as a pot...
Interconnected computing systems, in various forms, will soon permeate our lives, realizing the Internet of Things (IoT) and allowing us to enjoy novel, enhanced services that promise to improve our everyday life. Nevertheless, this new reality introduces significant challenges in terms of performance, scaling, usability and interoperability. Lever...
The intelligence being built into various vehicle types, will not only improve their safety and comfort but also enable new modes of transportation and new types of services, creating the corresponding markets. In all cases, it will be important to be able to monitor, preferably in real-time, various parameters of the smart vehicles’ condition. Thi...
Certain insects affect cultivations in a detrimental way. A notable case is the olive fruit fly (Bactrocera oleae (Rossi)), that in Europe alone causes billions of euros in crop-loss/per year. Pests can be controlled with aerial and ground bait pesticide sprays, the efficiency of which depends on knowing the time and location of insect infestations...
Embedded systems security is a recurring theme in current research efforts, brought in the limelight by the wide adoption of ubiquitous devices. Significant funding has been allocated to various European projects on this subject area, in order to investigate and overcome the various security challenges. This paper provides an overview of recent EU...