I am a Professor of Cyber Security and Head of Cyber Risk at the Internet of Things and Security Centre (ISEC) directing the Cyber Risk research strategy of the centre and acting also as its liaison with the industry.
ISEC is located at the University of Greenwich, Faculty of Engineering and Science, School of Computing and Mathematical Sciences. With 28 members of staff and PhD students and an annual budget over £2M, ISEC specialises in security and privacy technologies for distributed digital environments where a security breach in cyber space can affect people and systems in physical space, from smart homes and smart buildings to robotics, e-commerce and corporate environments.
Research interests: My research interests lie within the field of decision-making for cyber security including cyber risk modelling and optimisation. One of my main goals is to invent, develop, and evaluate new models and methods that can be adopted by organisations and individuals. This is aligned with ISEC’s impact strategy to contribute to a secure UK society against cyber-physical threats.
Funding: My research has been funded by the National Cyber Security Centre (NCSC), the Research Institute in Sociotechnical Cyber Security (RISCS), the Engineering and Physical Sciences Research Council (EPSRC), the European Commission (H2020) and (Horizon Europe ), and the Greenwich Research & Enterprise (GRE). I have been involved, as Principal and co-Investigator, in grants in worth in excess of £20m, leading tasks, work packages, and the preparation of their bids. In total, I have attracted £1.15M as P.I. and £1.08M as co-I.
PhD in Computer Science (Security for Mobile Ad Hoc Networks), 2012
MSc in Computer Science, 2008
Athens University of Economics and Business
BSc in Informatics and Telecommunications, 2006
National and Kapodistrian University of Athens
Cyber and Privacy Risk Optimisation, Threat Modelling, Security Controls, Security Investments
Small Businesses, Healthcare, Domestic Life
Optimisation, Game Theory, AI
Role: PI. TANGO will establish a stronger cross-sector data sharing, in a citizen-centric, secure and trustworthy manner, by developing innovative solutions while addressing environmental degradation and climate change challenges. The overall outcome is a novel platform exhibiting the following capabilities: user-friendly, secure, trustworthy, compliant, fair, transparent, accountable and environmentally sustainable data management, having at its core technology components for distributed, privacy preserving and environmentally sustainable data collection, processing, analysis, sharing and storage.
Role: PI. SecurityBudget is a cyber security dashboard to support SMEs on how to protect their systems subject to a limited available budget.
Role: Co-I. Artificial Intelligence (AI) is rapidly becoming part of people’s lives at home. Smart speakers, smart thermostats, security cameras with face recognition, and in the near future, brain-computer interfaces and elderly care companion robots can have considerable benefits to energy efficiency, comfort, and even health.
Role: PI. MERIT is addressing the complete cyber security management lifecycle, including asset pricing, threat-based risk assessment and optimal risk control constrained by a financial budget. The value of MERIT to practitioners is to increase the effectiveness of cyber security budget spending as decided by Chief Information Security Officers (CISOs) and boards of directors.
Role: PI. The goal of this PhD is to contribute to situational awareness and alert security manager to suspicious behaviour by monitoring the virtualised and cross-correlating traffic events across different parts of the network, different network slices and different points in time on an individual user/function basis.
Role: PI. SECONDO addresses the question “How can decisions about cyber security investments and cyber insurance pricing be optimised?” SECONDO will support professionals who seek cyber security investments, developed to support human decision making, and a complete well-founded security strategy.
Role: PI. The health sector’s increasing dependence on digital information and communication infrastructures renders it vulnerable to threats to privacy and cybersecurity, especially as the theft of health data has become particularly lucrative for cyber criminals.
Role: PI. Over the last decade, cyber-attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted which may leverage zero-day exploits and highly creative interdisciplinary attack methods. As our society is becoming increasingly dependent on Critical INfrastructures (CIN), new technologies are needed to increase our detection and response capabilities.
Role: Postdoctoral researcher (Queen Mary); visiting researcher (Imperial College). This proposal addresses the challenge “How do we make better security decisions?”. Specifically we propose to develop new approaches to decision support based on mathematical game theory.
Role: Co-I. SESAME targets innovations around three central elements in 5G: the placement of network intelligence and applications in the network edge through Network Functions Virtualisation (NFV) and Edge Cloud Computing; the substantial evolution of the Small Cell concept, already mainstream in 4G but expected to deliver its full potential in the challenging high dense 5G scenarios; and the consolidation of multi-tenancy in communications infrastructures, allowing several operators/service providers to engage in new sharing models of both access capacity and edge computing capabilities.
Role: Co-I. Public Administration (PA) authorities are working towards upgrading the level of their online services through new governance models such as the Open Government. This pushes for greater transparency, accountability and innovation aiming at increasing citizen levels of confidence and trust in PA online services.
Role: Researcher. The transition to next generation networks is often coupled with the vision of innovative services providing personalized and customisable services over an all-IP infrastructure. To enable a smooth transition, next generation all-IP networks need not only support more services but also support current vital services, namely emergency services.
in chronological order
Current responsibilities include: