Εκπαίδευση - Σπουδές

Ερευνητικά Ενδιαφέροντα

Διδασκαλία

Δημοσιεύσεις σε Διεθνή Περιοδικά (Journals)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Επιστημονικά Συνέδρια (Conferences)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


S. Kotsilitis, E. C. Marcoulaki, E. Kalligeros, "High frequency energy disaggregation sampling and analysis towards predictive maintenance applications", European Safety and Reliability Conference (ESREL), pp. 1214-1221, Sep, 2019, http://itekcmsonline.com/rps2prod/e...
 

Abstract
This paper presents the progress of PREDIVIS project, on the development of a novel energy disaggregation hardware/software tool towards energy efficiency and predictive maintenance. The PREDIVIS project involves the use of an edge-cloud hybrid computing architecture, hardware accelerated algorithms, machine/deep learning, and big data approaches for the analysis of high frequency electrical loads. The project will deliver an advanced and innovative solution for energy disaggregation intended for industrial applications, commercial buildings and households. A main scope of the project is to address the problem of predictive maintenance by providing a cost-efficient solution with industry 4.0 features.

S. Kotsilitis, E. C. Marcoulaki, E. Kalligeros, Y. Mousmoulas, "Energy Efficiency and Predictive Maintenance Applications Using Smart Energy Measuring Devices", European Safety and Reliability Conference (ESREL), Jun, 2018, https://www.taylorfrancis.com/books...
 

Abstract
This paper discusses novel technologies for energy efficiency and predictive maintenance using hardware accelerated energy disaggregation. The disaggregation process involves the use of custom designed smart sensors that collect and treat aggregated information on the current and voltage waveforms. The treated data are further on transmitted to the cloud where they are stored and processed to enable the extraction of advanced information on individual device consumption patterns and health status. This information can be extremely useful for the management of electric devices in residential or commercial sites as well as for predictive maintenance in industrial sites. The paper reviews the underlying methodologies, and presents preliminary work and results from data collection in the offices of a software company. The presented work involves the installation of measurement devices and the development of complementary hardware and software. This is part of the ongoing 4-year project PREDIVIS (PREdictive, Disaggregation Intelligent VIS (meaning "power" in Latin)).

M. Anagnostopoulos, G. Kambourakis, P. Drakatos, M. Karavolos, S. Kotsilitis, D. K. Y. Yau, Botnet command and control architectures revisited: Tor Hidden services and Fluxing, The 18th International Conference on Web Information Systems Engineering (WISE 2017), pp. 517-527, Oct, 2017, Moscow, Russia, Springer LNCS Vol. 10570, http://www.wise-conferences.org/
 

Abstract
Botnet armies constitute a major and continuous threat to the Internet. Their number, diversity, and power grows with each passing day, and the last years we are witnessing their rapid expansion to mobile and even IoT devices. The work at hand focuses on botnets which comprise mobile devices (e.g. smartphones), and aims to raise the alarm on a couple of advanced Command and Control (C&C) architectures that capitalize on Tor's hidden services (HS) and DNS protocol. Via the use of such architectures, the goal of the perpetrator is dual; first to further obfuscate their identity and minimize the botnet's forensic signal, and second to augment the resilience of their army. The novelty of the introduced architectures is that it does not rely on static C&C servers, but on rotating ones, which can be reached by other botnet members through their (varied) onion address. Also, we propose a scheme called "Tor fluxing", which opposite to legacy IP or DNS fluxing, does not rely on A type of DNS resource records but on TXT ones. We demonstrate the soundness and effectiveness of the introduced C&C constructions via a proof-of-concept implementation, and suggest possible remedies.

Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Κεφάλαια σε Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Επιμέλεια Πρακτικών Διεθνών Συνεδρίων


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.