Home > Research > Researchers > Dr Antonios Gouglidis > Publications

Dr Antonios Gouglidis

Senior Lecturer

  1. Forthcoming

    Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/02/2024, (Accepted/In press) In: IEEE Transactions on Cloud Computing.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience

    Shirazi, S. N. U. H., Gouglidis, A., Syeda, K. N., Simpson, S., Mauthe, A. U., Stephanakis, I. M. & Hutchison, D., 16/08/2016, Resilience Week (RWS), 2016. IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games

    Alshawish, A., Amine Abid, M., de Meer, H., Schauer, S., König, S., Gouglidis, A. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice . Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 129-156 28 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  5. E-pub ahead of print

    General Access Control Guidance for Cloud Systems: SP 800-210(Draft)

    Hu, V. C., Iorga, M., Bao, W., Li, A., Li, Q. & Gouglidis, A., 1/04/2020, (E-pub ahead of print) Computer Security Resource Center.

    Research output: Other contribution

  6. Published

    Grid access control models and architectures

    Gouglidis, A. & Mavridis, I., 1/12/2011, Computational and data grids: principles, applications and design. IGI Global, p. 217-234 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    Human and Organizational Issues for Resilient Communications

    Anderson, T., Busby, J., Gouglidis, A., Hough, K., Hutchison, D. & Rouncefield, M., 2020, Guide to Disaster-Resilient Communication Networks. Rak, J. & Hutchison, D. (eds.). Cham: Springer, p. 791-807 17 p. (Computer Communications and Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  8. Published

    Information assurance techniques: perceived cost effectiveness

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 07/2016, In: Computers and Security. 60, p. 117-133 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. E-pub ahead of print

    Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach

    Bozorgchenani, A., Zarakovitis, C. C., Chien, S. F., Ni, Q., Gouglidis, A., Mallouli, W. & Lim, H. S., 26/01/2024, (E-pub ahead of print) In: IEEE Transactions on Network Science and Engineering. p. 1-14 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks

    Bozorgchenani, A., Zarakovitis, C., Fong Chien, S., Siong Lim, H., Ni, Q., Gouglidis, A. & Mallouli, W., 23/08/2022, ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. New York: ACM, 6 p. 67

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Model Checking Access Control Policies: A Case Study using Google Cloud IAM

    Gouglidis, A., Kagia, A. & Hu, V. C., 29/03/2023, Arxiv.

    Research output: Working paperPreprint

  12. Published

    Modelling security risk in critical utilities: the system at risk as a three player game and agent society

    Busby, J. S., Gouglidis, A., Rass, S. & König, S., 9/10/2016, Proceedings of SMC 2016. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    On the definition of access control requirements for grid and cloud computing systems

    Gouglidis, A. & Mavridis, I., 1/12/2010, Networks for Grid Applications: Third International ICST Conference, GridNets 2009, Athens, Greece, September 8-9, 2009, Revised Selected Papers. Doulamis, A., Mambretti, J., Tomkos, I. & Varvarigou, T. (eds.). Berlin: Springer Verlag, p. 19-26 8 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 25).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    On the Disaster Resiliency within the Context of 5G Networks: The RECODIS Experience

    Esposito, C., Gouglidis, A., Hutchison, D., Gurtov, A., Helvik, B., Heegaard, P., Rizzo, G. & Rak, J., 18/06/2018, European Conference on Networks and Communications 2018. IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Yin, H. & Stavrou, A. (eds.). New York: ACM, p. 3415-3417 3 p. (Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Poster: Multi-Layer Threat Analysis of the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, p. 3419-3421. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  17. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  18. Published

    Protection against Cyber Attacks: Introducing Resilience for SCADA Networks

    Gouglidis, A. & Hutchison, D., 03/2017, 1 p. AIT Austrian Institute of Technology GmbH.

    Research output: Other contribution

  19. Published

    Random Damage in Interconnected Networks

    König, S. & Gouglidis, A., 31/05/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  20. E-pub ahead of print

    Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology

    Staves, A., Gouglidis, A., Maesschalck, S. & Hutchison, D., 30/06/2024, In: Safety Science. 174, 106481.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Forthcoming

    Robust Federated Learning Method against Data and Model Poisoning Attacks with Heterogeneous Data Distribution

    Alharbi, E., Soriano Marcolino, L., Gouglidis, A. & Ni, Q., 15/07/2023, (Accepted/In press) 26th European Conference on Artificial Intelligence ECAI 2023- IOS Press. 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Role-based secure inter-operation and resource usage management in mobile grid systems

    Gouglidis, A. & Mavridis, I., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. Ardagna, C. A. & Zhou, J. (eds.). Berlin: Springer Verlag, p. 38-53 16 p. (Lecture Notes in Computer Science; vol. 6633).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Security policy verification for multi-domains in cloud systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 1/04/2014, In: International Journal of Information Security. 13, 2, p. 97-111 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Specifying and Verifying Usage Control Models and Policies in TLA+

    Grompanopoulos, C., Gouglidis, A. & Mavridou, A., 31/10/2021, In: International Journal on Software Tools for Technology Transfer. 23, 5, p. 685-700

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top