Home Publications Projects Activities Students Teaching

   

Emmanouil (Manos) Panaousis, PhD, MSc, BSc, PGCert, MIEEE
Lecturer in Secure Systems


Department of Computer Science
Faculty of Engineering and Physical Sciences
University of Surrey
Guildford, Surrey, GU2 7XH, UK
email: e.panaousis (at) surrey.ac.uk

Short bio

I am a Lecturer (Assistant Professor) at the University of Surrey, UK and member of the Surrey Centre for Cyber Security (SCCS), a GCHQ--‐recognised UK Academic Centre of Excellence in Cyber Security Research.

Research interests: I am studying cyber security and privacy engineering and decision-making approaches from both a theoretical and practical perspective. I have expertise in developing new models within the above fields and proposing algorithms or methodologies to tackle emerging challenges. I enjoy assessing my theoretical propositions by either simulations (mainly by using Python tools or network event-based simulators) or real-world testbeds.

Research positions and PhD supervision: I am actively pursuing research in cyber security and privacy. I am currently co-supervising three PhD students (as third supervisor) who are with the University of Brighton. I am seeking talented post-doctoral researchers and doctoral (PhD) students to join our group at SCCS. Interested candidates, please email me with a copy of their CV and a cover letter.

Grants: Through successful research and development bids I have secured 536,722 EUR fund and contributed to attracting 945,144 EUR, as detailed here.

Previous studies and experience: I have received the BSc degree in Informatics and Telecommunications from University of Athens, Greece, in 2006 and the MSc degree in Computer Science from Athens University of Economics and Business, Greece in 2008, and PhD degree in Mobile Communications Security from Kingston University London, UK in 2012. Prior to the University of Surrey, I was a Senior Lecturer of Cybersecurity and Privacy at the University of Brighton; invited researcher at Imperial College; postdoctoral researcher at Queen Mary University of London; and a Research and development consultant at Ubitech Technologies Ltd in the Surrey Research Park.

Teaching and project supervision: I teach Web Publishing and Databases in year 1. I am interested in supervising final year or MSc projects on cyber security and privacy, and have some project ideas. To meet with me during my office hours please send me an email to arrange a meeting.

Activities: After I successfully organised the 6th Conference on Decision and Game Theory for Security (GameSec 2015) in London, I served as the Technical Program Committee Chair (jointly with Tansu Alpcan, University of Melborune) of GameSec 2016 (7th Conference on Decision and Game Theory for Security). Gamesec is a small but high quality peer-reviewed annual conference. It attracts original submissions in the area of analytical security and privacy with an emphasis on game and decision theory. I am also a reviewer for leading journals by the ACM, IEEE, Elsevier, registered expert with the European Commission and EPSRC reviewer. In addition, I have several years of expertise in preparing EU bids and have secured funds through successful FP7 and H2020 proposals.



Selected Research Areas

Internet-of-Things Security and Privacy. Recent advances in information and communication technologies and embedded systems are the major reasons for the proliferation of the Internet of Things (IoT). However, security and privacy issues are a growing concern for consumers and manufacturers of IoT technologies. I am investigating novel methodologies and models that will guarantee the highest possible levels of protection of users' data and devices in presence of different security and privacy threats.

Security and Privacy Games. Game theory can answer the question regarding how the defender will react to the attacker, and vice versa, in cyber security and privacy. The strategic interaction between them is captured by a two-player game in which each player attempts to maximize his or her own interests. The attacker’s strategy depends heavily on the defender’s actions and vice versa. Thus, the effectiveness of a defense mechanism relies on both of the defender’s and attacker’s strategic behaviors. Using a game-theoretic approach, tactical analysis is performed to investigate the attack from a single node or multiple nodes. Hence, game theory is useful to investigate the strategic decision-making situations of the defender and/or to analyze the incentives of the attackers. Besides Shannon’s maxim states "One ought to design systems under the assumption that the enemy will immediately gain full familiarity with them."

5G Security. It is well acknowledged that one of the key enabling factors for the realisation of future 5G networks will be the small cell (SC) technology. Furthermore, recent advances in the fields of network functions virtualisation (NFV) and software-defined networking (SDN) open up the possibility of deploying advanced services at the network edge. In the context of mobile/cellular networks this is referred to as mobile edge computing (MEC). Within the scope of the EU-funded research project SESAME we perform a comprehensive security modelling of MEC-assisted quality-of-experience (QoE) enhancement of fast moving users in a virtualised SC wireless network, and demonstrate it through a representative scenario toward 5G. Our modelling and analysis is based on a formal security requirements engineering methodology called Secure Tropos which has been extended to support MEC-based SC networks. In the proposed model, critical resources which need protection, and potential security threats are identified. Furthermore, we identify appropriate security constraints and select suitable security mechanisms for 5G networks. Thus, we reveal that existing security mechanisms need adaptation to face emerging security threats in 5G networks.

Security Economics. When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge and this is considered as part of the Economics of Security field. Our work has investigated how to support optimal cyber security investments against commodity attacks developing a decision support tool. We have shown that our decision support tool provides the same advice with the one advocated by the UK government with regard to the requirements for basic technical protection from cyber attacks in SMEs.

Prospective students

  • PhDs in University of Surrey.
  • Apart from PhD positions funded by us, if you have your own fund and you wish to pursue a PhD under my supervision please contact me with your CV attached (or a short bio).

Useful links



Publications

  • An Options Approach to Cybersecurity Investment.
    Michail Chronopoulos, Emmanouil Panaousis, Jens Grossklags.
    IEEE Access, (accepted 01/11/2017).
    (IF 2017: 3.244)

  • COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks.
    Dionisis Kandris, George Tselikis, Eleftherios Anastasiadis, Emmanouil Panaousis, Tasos Dagiuklas.
    Sensors 2017, 17, 2502.
    Publisher, (IF 2016: 2.677)

  • A Conceptual Model to Support Security Analysis in the Internet of Things.
    Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis, Christos Kalloniatis.
    Computer Science and Information Systems.
    Publisher

  • Selecting Security Mechanisms in Secure Tropos.
    Michalis Pavlidis, Haralambos Mouratidis, Emmanouil Panaousis, Nikolaos Argyropoulos.
    In Proceedings of the 14th International Conference on Trust, Privacy & Security in Digital Business.
    (TrustBus 2017), Lyon, France, August 28-31, 2017.
    Publisher

  • ASTo: A Tool for Security Analysis of IoT Systems.
    Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis.
    Proceedings of the 1st IEEE SERA Workshop on the Internet of People And Things.
    (IPAT 2017), Old Royal Naval College, London, UK, June 7-9, 2017.
    Publisher

  • Security Requirements Modelling for Virtualized 5G Small Cell Networks.
    Vassilios G. Vassilakis, Haralambos Mouratidis, Emmanouil Panaousis, Ioannis D. Moscholios, Michael D. Logothetis.
    Proceedings of the 24th International Conference on Telecommunications.
    (ICT 2017), Limassol, Cyprus, May, 2017.

  • The applicability of ambient sensors as proximity evidence for NFC transactions.
    Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes.
    Proceedings of the IEEE Security and Privacy Workshops (SPW).
    (MOST 2017), San Jose, CA, May 25, 2017.
    Github

  • Game theoretic path selection to support security in device-to-device communications.
    Emmanouil Panaousis, Eirini Karapistoli, Hadeer Elsemary, Tansu Alpcan, MHR Khuzani, Anastasios A. Economides.
    Ad Hoc Networks (Elsevier), Volume 56, March 2017, Pages 28–42.
    Publisher, (IF 2016: 3.047).

  • Proceedings of the 7th International Conference on Decision and Game Theory for Security.
    Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, William Casey (Eds.)
    Book editorial. (GameSec 2016), New York, NY, USA, November 2-4, 2016.
    Springer online -- Performance

  • Evaluating case-based reasoning knowledge discovery in fraud detection.
    Adeyinka Adedoyin, Stelios Kapetanakis, Miltos Petridis, Emmanouil Panaousis.
    Proceedings of the 24th International Conference in Case-based Reasoning.
    (ICCBR 2016), Atlanta, GA, November 2016.

  • Security challenges of small cell as a service in virtualized mobile edge computing environments.
    Vassilios Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis.
    Proceedings of the 10th WISTP International Conference on Information Security Theory and Practice.
    (WISTP 2016), Crete, Greece, September 26-27, 2016.
    Publisher -- slides -- BibTeX

  • APPARATUS: reasoning about security requirements in the Internet of Things.
    Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis, Christos Kalloniatis.
    Proceedings of CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016.
    Publisher -- slides -- Github -- BibTeX

  • Decision support approaches for cyber security investment.
    Andrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi.
    Decision Support Systems (Elsevier), March 19, 2016.
    case study of DSS submission -- slides -- bib -- Cyber Essentials -- CIS Critical Security Controls -- Common Weakness Enumeration -- BibTeX, (IF 2016: 3.222).

  • Proceedings of the 6th International Conference on Decision and Game Theory for Security
    MHR Khouzani, Emmanouil Panaousis, George Theodorakopoulos (Eds.), Book editorial, GameSec 2015, London, UK, November 4-5, 2015.
    Springer online

  • Game-theoretic model of incentivizing privacy-aware users to consent to location tracking.
    Emmanouil Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan.
    In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
    (IEEE Trustcom/BigDataSE/ISPA 2015), Helsinki, Finland, August 20-22, 2015.
    Slides -- Publisher -- BibTeX

  • A game-theoretic approach for minimizing security risks in the Internet-of-Things.
    George Rontidis, Emmanouil Panaousis, Aron Laszka, Tasos Dagiuklas, Pasquale Malacaria, Tansu Alpcan.
    Proceedings of 2015 IEEE International Conference on Communication Workshop (ICCW).
    IEEE ICC 2015 - IoT/CPS Security 2015, London, UK, June 8-12, 2015.
    slides -- Github -- bib -- Publisher -- BibTeX

  • Cybersecurity games and investments: a decision support approach.
    Emmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi.
    Proceedings of the 5th Conference on Decision and Game Theory for Security.
    (GameSec 2014), Los Angeles, CA, USA, November 6-7, 2014.
    slides -- Publisher -- BibTeX

  • Secure message delivery games for device-to-device communications.
    Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti.
    Proceedings of the 5th Conference on Decision and Game Theory for Security.
    (GameSec 2014), Los Angeles, CA, USA, November 6-7, 2014.
    slides -- Publisher -- Github -- BibTeX

  • Game theory meets information security management.
    Andrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi.
    Proceedings of the 29th IFIP International Information Security and Privacy Conference.
    (IFIP SEC 2014), pp. 15-29, Marrakech, Morocco, June 2-4, 2014.
    slides -- Publisher -- bib -- BibTeX

  • Standardisation Advancements in the Area of Routing for Mobile Ad-hoc Networks.
    Tipu A Ramrekha, Emmanouil Panaousis, Christos Politis.
    (Springer) Journal of Supercomputing, 64(2): 409-434, May 2013.
    Springer -- bib -- © Springer

  • A Probabilistic Algorithm for Secret Matrix Share Size Reduction.
    Eckhard Pfluegel, Emmanouil Panaousis, Christos Politis.
    Proceedings of the 19th European Wireless Conference <
    (EW 2013), Guildford, UK, April 2013.
    IEEE xplore -- bib -- © IEEE

  • Security Model for Emergency Real-time Communications in Autonomous Networks.
    Emmanouil Panaousis, Christos Politis, Konstantinos B Birkos, Christos P Papageorgiou, Tasos Dagiuklas.
    (Springer) Information Systems Frontiers, 14(3): 541-553, July 2012 (published online July 2010, IF 2010: 1.596).
    [Springer link -- bib -- © Springer

  • Grant Millar, Emmanouil Panaousis, Christos Politis.
    Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions.
    Journal of Networks, 7(2): 288-299, February 2012.
    [bib]

  • Recipients' Anonymity in Multihop Ad-hoc Networks.
    Helena Rifa-Pous, Emmanouil Panaousis, Christos Politis.
    (IEICE) Transactions on Information Systems (letter paper), 95(1): 181-184, January 2012.

  • A Novel Lightweight Multi-secret Sharing Technique for Mobile Ad-hoc Networks.
    Georgios Polymerou, Emmanouil Panaousis, Eckhard Pfluegel, Christos Politis.
    Proceedings of the 29th Wireless World Research Forum meeting.
    (WWRF 29), Berlin, Germany, October, 2012.

  • Secure Decentralised Ubiquitous Networking for Emergency Communications.
    Emmanouil Panaousis, Tipu A Ramrekha, Christos Politis, Grant Millar.
    Proceedings of the 5th International Conference on Telecommunications and Multimedia.
    (TEMU 2012), Crete, Greece, July, 2012. 

  • A Case Study of Internet of Things-based on Wireless Sensor Networks and Smartphones.
    Alkiviadis Tsitsigkos, Fariborz Entezami, Tipu A Ramrekha, Christos Politis, Emmanouil Panaousis.
    Proceedings of the 28th Wireless World Research Forum meeting. 
    (WWRF 28), Athens, Greece, April 2012. 

  • Spectrum Crunch.
    S Abdollahi, H Al-Raweshidy, LM Calvo, E Dahlman, K David, M Codreanu, P Demestichas,
    M Dillinger, M Egido, R Foster, M Gruber, S Kaiser, M Latva-aho, P Merz, X Mestre, E Panaousis,
    S Pfletschinger, M Pirmoradian, C Politis, B Raaf, F Schaich, M Schellmann, C Schmelz, R Tafazolli,
    N Vucic, and R Winkelmann.
    Experts Working Group Net!Works European Technology Platform, June 2012. 

  • ICT as Critical National Infrastructure.
    P Demestichas, PS Rodriguez, R Tafazolli, Y Kritikou, A Dekorsy, E Panaousis,
    TA Ramrekha, ME Cortes, H Al-Raweshidy, SR Abdollahi, L Munoz, B Raaf.
    Experts Working Group Net!Works European Technology Platform, May 2012.

  • Performance Evaluation of Secure Video Transmission over WIMAX.
    Farrukh Ehtisham, Emmanouil Panaousis, Christos Politis.
    International Journal of Computer Networks & Communications, 3(6): 131-144, November 2011.

  • Non-cooperative Games Between Legitimate Nodes and Malicious Coalitions in MANETs.
    Emmanouil Panaousis and Christos Politis.
    Proceedings of the 20th Future Network and Mobile Summit (poster paper)
    Warsaw, Poland, June 15-17, 2011.

  • Routing Challenges and Directions for Smart Objects in Future Internet of Things.
    Tipu A Ramrekha, Emmanouil Panaousis, Christos Politis.
    IETF Internet Architecture Board and Internet Area Workshop
    on Interconnecting Smart Objects with the Internet
    Prague, Czech Republic, March 2011. 

  • ChaMeLeon (CML): A Hybrid and Adaptive Routing Protocol for Emergency Situations
    Tipu A Ramrekha, Emmanouil Panaousis, Christos Politis.
    IETF MANET Working Group, August 2010, February 2011.

  • A Test-bed Implementation for Securing OLSR in Mobile Ad-hoc Networks.
    Emmanouil Panaousis, George Drew, Grant Millar, Tipu A Ramrekha, Christos Politis.
    International Journal of Network Security & Its Applications, 2(4): 1-26, October 2010.

  • Secure Techniques to Support Cognitive Access in Spectrum Bands.
    Emmanouil Panaousis and Christos Politis.
    Proceedings of the 3rd International Conference on Telecommunications and Multimedia. 
    (TEMU '10), Crete, Greece, July 2010.

  • A Generic Cognitive and Adaptive Module (CAM) for MANETs.
    Tipu A Ramrekha, Emmanouil Panaousis, Christos Politis.
    Internet Engineering Task Force (IETF) meeting 78, Maastricht, Netherlands, July 2010.

  • ROBUST: Reliable Overlay Based Utilisation of Services and Topology for emergency MANETs.
    Grant Millar, Emmanouil Panaousis, Christos Politis.
    Proceedings of the 19th Future Network and Mobile Summit <.
    Florence, Italy, June 2010. 
    Publisher

  • Secure Routing for Supporting Ad-hoc Extreme Emergency Infrastructures.
    Emmanouil Panaousis, Tipu A Ramrekha, Christos Politis.
    Proceedings of the 19th Future Network and Mobile Summit.
    Florence, Italy, June 2010. 

  • Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks.
    Emmanouil Panaousis, Tipu A Ramrekha, Grant Millar, Christos Politis.
    International Journal of Wireless and Mobile Computing, 2(2): 62-78, May 2010.

  • An Efficient Power Control Algorithm for Supporting Cognitive Communications in Shared Spectrum Areas.
    Mahdi Pirmoradian, Christos Politis, Emmanouil Panaousis.
    Proceedings of the 2nd International Conference on Mobile Lightweight Wireless Systems.
    (Mobilight 2010), pp 496-505, Barcelona, Spain, May 10-12, 2010.

  • End-to-End Security Protection.
    Levon Nazaryan, Emmanouil Panaousis, Christos Politis.
    IEEE Vehicular Technology Magazine, 5(1): 85-90, March 2010.
    Publisher

  • ChaMeLeon (CML): A Hybrid and Adaptive Routing Protocol for Emergency Situations.
    Tipu A Ramrekha, Emmanouil Panaousis, Grant Millar, Christos Politis.
    Internet Engineering Task Force (IETF) meeting 77, Anaheim, California, USA, March 2010.

  • A Game Theoretic Approach for Securing AODV in Emergency Mobile Ad Hoc Networks.
    Proceedings of the 34th IEEE Conference on Local Computer Networks.
    Emmanouil Panaousis and Christos Politis.
    (IEEE LCN 2009), Zurich, Switzerland, October 2009. 
    [Publisher]

  • Spectrum Allocation for Cognitive Radio Use
    Emmanouil Panaousis and Christos Politis.
    Proceedings of the 23rd Wireless World Research Forum meeting.
    (WWRF 23), Beijing, China, October 2009. 

  • Maximizing Network Throughput.
    Emmanouil Panaousis, Christos Politis, George C Polyzos.
    IEEE Vehicular Technology Magazine, 4(3): 33-39, September 2009.
    [Publisher] (2010 JCR IF: 1.184)

  • Emmanouil Panaousis, Levon Nazaryan, Christos Politis.
    Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications.
    Proceedings of the 5th International ICST/ACM Mobile Multimedia Communications Conference.
    (Mobimedia 2009), London, UK, September 2009.
    [Publisher]

  • Emmanouil Panaousis, Christos Politis, George C Polyzos.
    Power Control Using Game Theory in a Shared Open Spectrum.
    Proceedings of the 22nd Wireless World Research Forum meeting. 
    (WWRF 22), Paris, France, May 2009. 

  • Emmanouil Panaousis and Christos Politis.
    Securing Ad-hoc Networks in Extreme Emergency Cases.
    In Proceedings of the 22nd Wireless World Research Forum meeting
    (WWRF 22), Paris, France, May 2009. 

  • Emmanouil Panaousis, Pantelis A Frangoudis, Christopher N Ververidis, George C Polyzos.
    Optimizing the Channel Load Reporting Process in IEEE 802.11 k-enabled WLANs.
    Proceedings of the 16th IEEE Workshop on Local and Metropolitan Area Networks.
    (IEEE LANMAN 2008), Chij-Napoca, Transylvania, Romania, September 2008.
    [IEEE xplore]


  • Projects

    Past

    PhD Students

    • Myrsini Athinaiou, Cyber Security Risk Management for Health-based Critical Infrastructures (University of Brighton, Sep 2016-present)
    • Orestis Mavropoulos, Dynamic Security for Internet of Things (University of Brighton, Sep 2015-present)
    • Adeyinka Adedoyin, Identifying Money Laundering Patterns Using Hybrid Artificial Intelligent Techniques (University of Brighton, Sep 2015-16)
    • Johannes Pohl (University of Applied Sciences Stralsund, 2015)
    • George Rontidis, (Hellenic Open University, 2014-15)
    • Hadeer Elsemary, (University of Gottingen, 2014-15)
    • Hossein Fereidooni (University of Padua, 2014)
    • Nuwan Weerasinghe (Kingston University, 2012)

    Teaching

    2017/18
    • Fall 2017, Web Publishing and Databases (BSc, level 4) [module leader, University of Surrey]
    2016/17
    • Spring 2017, System and Network Security (MSc, level 7) [module leader, University of Brighton]
    • Spring 2017, Mathematics (BSc, level 4) [module leader, University of Brighton]
    • Fall 2016 and Spring 2017, Network Management and Security (BSc, level 6) [module leader, University of Brighton]
    • Fall 2016, Security and Dependability (MSc, level 7) [module leader, University of Brighton]
    • Fall 2016, Network Technologies (BSc, level 5) [co-lecturing, University of Brighton]
    2015/16
    • Spring 2016, Mathematics (BSc, level 4) [module leader, University of Brighton]
    • Fall 2015 and Spring 2016, Network Management and Security (BSc, level 6) [module leader, University of Brighton]
    • Fall 2015, Network Technologies (BSc, level 5) [co-lecturing, University of Brighton]
    2014/15
    • Spring 2015, Mathematics (BSc, level 4) [module leader, University of Brighton]
    • Fall 2014 and Spring 2015, Network Design and Technologies (BSc, level 5) [module leader, University of Brighton]
    • Fall 2014, Distributed System Principles (MSc, level 7) [guest lecturer, University of Brighton]
    2013/14
    • Fall 2013, Distributed Systems and Security (BSc, level 6) [teaching assistant, Queen Mary University of London]
    • Fall 2013, Program Specifications (MSc, level 7) [teaching assistant, Queen Mary University of London]
    2011/12
    • Spring 2012, Network Security (MSc, level 7) [lecturer, Kingston University]
    • Spring 2012, Secure and Dependable Computing (MSc, level 7) [lecturer, Kingston University]
    • Spring 2012, Internet Security (BSc, level 6) [lecturer, Kingston University]
    • Spring 2012, Internet Wireless Networks (MSc, level 7) [lecturer, Kingston University]
    • Spring 2012, Health Information Governance: Privacy and Security Issues (MSc, level 7) [teaching assistant, Kingston University]
    • Fall 2011, Internet Protocols and Services (BSc, level 6) [teaching assistant, Kingston University]
    2010/11
    • Spring 2011, Internet Wireless Networks (MSc, level 7) [lecturer, Kingston University]
    • Spring 2011, Multimedia Communications (MSc, level 7) [teaching assistant, Kingston University]
    • Fall 2010, Internet Protocols and Services (BSc, level 6) [teaching assistant, Kingston University]
    • Fall 2010, Networking Concepts (BSc, level 5) [teaching assistant, Kingston University]
    2009/10
    • Spring 2010, Internet Wireless Networks (MSc, level 7) [lecturer, Kingston University]
    • Spring 2010, Multimedia Communications (MSc, level 7) [teaching assistant, Kingston University]