Home > Research > Researchers > Dr Antonios Gouglidis > Publications

Dr Antonios Gouglidis

Senior Lecturer

  1. Published

    Verification of secure inter-operation properties in multi-domain RBAC systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 06/2013, Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on . IEEE, p. 35-44 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Verification of Resilience Policies that Assist Attribute Based Access Control

    Gouglidis, A., Hu, V. C., Busby, J. S. & Hutchison, D., 24/03/2017, ABAC '17 Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control. New York: ACM, p. 43-52 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience

    Gouglidis, A. & Hutchison, D., 10/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    ThreatPro: Multi-Layer Threat Analysis in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 29/09/2022, In: arXiv. abs/2209.14795, 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective

    Shirazi, S. N. U. H., Gouglidis, A., Farshad, A. & Hutchison, D., 11/2017, In: IEEE Journal on Selected Areas in Communications. 35, 11, p. 2586-2595 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  8. Published

    Technology-related disasters: a survey towards disaster-resilient software defined networks

    Machuca, C. M., Secci, S., Vizaretta, P., Kuipers, F., Gouglidis, A., Hutchison, D., Jouet, S., Pezaros, D., Elmokashfi, A., Heegaard, P., Ristov, S. & Gusev, M., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on . IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Specifying and Verifying Usage Control Models and Policies in TLA+

    Grompanopoulos, C., Gouglidis, A. & Mavridou, A., 31/10/2021, In: International Journal on Software Tools for Technology Transfer. 23, 5, p. 685-700

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Security policy verification for multi-domains in cloud systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 1/04/2014, In: International Journal of Information Security. 13, 2, p. 97-111 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Role-based secure inter-operation and resource usage management in mobile grid systems

    Gouglidis, A. & Mavridis, I., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. Ardagna, C. A. & Zhou, J. (eds.). Berlin: Springer Verlag, p. 38-53 16 p. (Lecture Notes in Computer Science; vol. 6633).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Forthcoming

    Robust Federated Learning Method against Data and Model Poisoning Attacks with Heterogeneous Data Distribution

    Alharbi, E., Soriano Marcolino, L., Gouglidis, A. & Ni, Q., 15/07/2023, (Accepted/In press) 26th European Conference on Artificial Intelligence ECAI 2023- IOS Press. 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. E-pub ahead of print

    Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology

    Staves, A., Gouglidis, A., Maesschalck, S. & Hutchison, D., 30/06/2024, In: Safety Science. 174, 106481.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Random Damage in Interconnected Networks

    König, S. & Gouglidis, A., 31/05/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  16. Published

    Protection against Cyber Attacks: Introducing Resilience for SCADA Networks

    Gouglidis, A. & Hutchison, D., 03/2017, 1 p. AIT Austrian Institute of Technology GmbH.

    Research output: Other contribution

  17. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  18. Published

    Poster: Multi-Layer Threat Analysis of the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, p. 3419-3421. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  19. Published

    Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Yin, H. & Stavrou, A. (eds.). New York: ACM, p. 3415-3417 3 p. (Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    On the Disaster Resiliency within the Context of 5G Networks: The RECODIS Experience

    Esposito, C., Gouglidis, A., Hutchison, D., Gurtov, A., Helvik, B., Heegaard, P., Rizzo, G. & Rak, J., 18/06/2018, European Conference on Networks and Communications 2018. IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    On the definition of access control requirements for grid and cloud computing systems

    Gouglidis, A. & Mavridis, I., 1/12/2010, Networks for Grid Applications: Third International ICST Conference, GridNets 2009, Athens, Greece, September 8-9, 2009, Revised Selected Papers. Doulamis, A., Mambretti, J., Tomkos, I. & Varvarigou, T. (eds.). Berlin: Springer Verlag, p. 19-26 8 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 25).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Modelling security risk in critical utilities: the system at risk as a three player game and agent society

    Busby, J. S., Gouglidis, A., Rass, S. & König, S., 9/10/2016, Proceedings of SMC 2016. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Model Checking Access Control Policies: A Case Study using Google Cloud IAM

    Gouglidis, A., Kagia, A. & Hu, V. C., 29/03/2023, Arxiv.

    Research output: Working paperPreprint

  24. Published

    Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks

    Bozorgchenani, A., Zarakovitis, C., Fong Chien, S., Siong Lim, H., Ni, Q., Gouglidis, A. & Mallouli, W., 23/08/2022, ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. New York: ACM, 6 p. 67

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. E-pub ahead of print

    Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach

    Bozorgchenani, A., Zarakovitis, C. C., Chien, S. F., Ni, Q., Gouglidis, A., Mallouli, W. & Lim, H. S., 26/01/2024, (E-pub ahead of print) In: IEEE Transactions on Network Science and Engineering. p. 1-14 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 Next

Back to top