User profiles for Emmanouil Magkos

Emmanouil (Manos) Magkos

Professor, Department of Informatics, Ionian University
Verified email at ionio.gr
Cited by 1486

Modeling security in cyber–physical systems

M Burmester, E Magkos, V Chrissikopoulos - International journal of critical …, 2012 - Elsevier
This paper describes a framework for modeling the security of a cyber–physical system in
which the behavior of the adversary is controlled by a threat model that captures – in a unified …

Receipt-freeness in large-scale elections without untappable channels

E Magkos, M Burmester, V Chrissikopoulos - Towards the E-Society: E …, 2001 - Springer
For an electronic election to be fully democratic there is a need for security mechanisms that
will assure the privacy of the voters. With receipt-free electronic voting, a voter neither …

A digital twin-based cyber range for SOC analysts

…, M Glas, M Dietz, S Karagiannis, E Magkos… - IFIP Annual Conference …, 2021 - Springer
Security Operations Centers (SOCs) provide a holistic view of a company’s security
operations. While aiming to harness this potential, companies are lacking sufficiently skilled …

Towards secure and practical e-elections in the new era

M Burmester, E Magkos - Secure electronic voting, 2003 - Springer
… Mike Burmesterl , Emmanouil Magkos2 … [5] Burmester, M., Chrissikopoulos, V., Kotzanikolaou,
P., and Magkos, E. "Strong Forward Security". In IFIP-SEC '01, Kluwer Academic Publishers …

DEFeND architecture: a privacy by design platform for GDPR compliance

…, JB Bernard, M Fiorani, E Magkos… - Trust, Privacy and …, 2019 - Springer
The advent of the European General Data Protection Regulation (GDPR) imposes organizations
to cope with radical changes concerning user data protection paradigms. GDPR, by …

Strengthening privacy protection in vanets

M Burmester, E Magkos… - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
In the not so far future, vehicles are expected to be able to communicate with each other and
with the road infrastructure, to enhance driving experience and support road safety, among …

Adapting CTF challenges into virtual cybersecurity learning environments

S Karagiannis, E Magkos - Information & Computer Security, 2020 - emerald.com
Emmanouil Magkos (Department of Informatics, Faculty of Information Science and Informatics,
Ionian University, Corfu, Greece) … and Magkos, E. (2021), "Adapting CTF challenges into …

An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools

…, E Maragkos-Belmpas, E Magkos - IFIP World Conference on …, 2020 - Springer
Capture the Flag (CTF) challenges are typically used for hosting competitions related to
cybersecurity. Like any other event, CTF competitions vary in terms of context, topics and …

Lightweight private proximity testing for geospatial social networks

P Kotzanikolaou, C Patsakis, E Magkos… - Computer …, 2016 - Elsevier
The wide adoption of smart phones has enabled Online Social Networks (OSNs) to exploit
the location awareness capabilities offering users better interaction and context aware content…

Engaging students in basic cybersecurity concepts using digital game-based learning: Computer games as virtual learning environments

S Karagiannis, E Magkos - Advances in Core Computer Science-Based …, 2021 - Springer
Teaching various topics using gamification elements or Game-Based Learning (GBL)
methods is a top trend nowadays. Gamification has shown great results towards this direction, …