Skip to main content

Research Repository

Advanced Search

Outputs (60)

Towards Building a Smart Water Management System (SWAMS) in Nigeria (2024)
Conference Proceeding
Bamgboye, O., Chrysoulas, C., Liu, X., Watt, T., Sodiya, A., Oyeleye, M., & Kalutharage, S. (in press). Towards Building a Smart Water Management System (SWAMS) in Nigeria.

The water management landscape in Nigeria struggles with formidable obstacles characterized by a lack of adequate infrastructure, an uneven distribution of resources, and insufficient access to clean water, particularly in rural areas. These challeng... Read More about Towards Building a Smart Water Management System (SWAMS) in Nigeria.

Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution (2023)
Conference Proceeding
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (2023). Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution. In P. Kommers, I. Arnedillo Sánchez, & P. Isaías (Eds.), PROCEEDINGS OF THE 16 th IADIS INTERNATIONAL CONFERENCE INFORMATION SYSTEMS 2023 (21-28)

This article is a report on the lessons learned when conducting an interpretive case study in a developing country. From the literature review, it was apparent that there are few reported lessons from pilot studies about strategic alignment in higher... Read More about Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution.

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks (2023)
Conference Proceeding
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. In 2023 IEEE Globecom Workshops (GC Wkshps). https://doi.org/10.1109/GCWkshps58843.2023.10465218

As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, t... Read More about Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques (2023)
Conference Proceeding
Gomez, L. R., Watt, T., Babaagba, K. O., Chrysoulas, C., Homay, A., Rangarajan, R., & Liu, X. (2023). Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques. In ICISS '23: Proceedings of the 2023 6th International Conference on Information Science and Systems (113-118). https://doi.org/10.1145/3625156.3625173

In recent years, text has been the main form of communication on social media platforms such as Twitter, Reddit, Facebook, Instagram and YouTube. Emotion Recognition from these platforms can be exploited for all sorts of applications. Through the mea... Read More about Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques.

Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap (2023)
Journal Article
El Boudani, B., Dagiuklas, T., Kanaris, L., Iqbal, M., & Chrysoulas, C. (2023). Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap. Electronics, 12(19), Article 4150. https://doi.org/10.3390/electronics12194150

Indoor positioning is a core enabler for various 5G identity and context-aware applications requiring precise and real-time simultaneous localisation and mapping (SLAM). In this work, we propose a K-nearest neighbours and deep neural network (K-DNN)... Read More about Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap.

Edge NLP for Efficient Machine Translation in Low Connectivity Areas (2023)
Conference Proceeding
Watt, T., Chrysoulas, C., & Gkatzia, D. (in press). Edge NLP for Efficient Machine Translation in Low Connectivity Areas.

Machine translation (MT) usually requires connectivity and access to the cloud which is often limited in many parts of the world, including hard to reach rural areas. Edge natural language processing (NLP) aims to solve this problem by processing lan... Read More about Edge NLP for Efficient Machine Translation in Low Connectivity Areas.

Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas (2023)
Conference Proceeding
Josephe, A. O., Chrysoulas, C., Peng, T., El Boudani, B., Iatropoulos, I., & Pitropakis, N. (2023). Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas. In 2023 IEEE IAS Global Conference on Emerging Technologies (GlobConET). https://doi.org/10.1109/GlobConET56651.2023.10150058

Web applications are popular in our world today and every organization or individual either build or access at least one each day. It’s important for every application user to continue accessing contents of a web application irrespective of the netwo... Read More about Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas.

Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System (2023)
Conference Proceeding
Laing, S., Ludwiniak, R., El Boudani, . B., Chrysoulas, C., Ubakanma, G., & Pitropakis, N. (2023). Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System. In 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN). https://doi.org/10.1109/DRCN57075.2023.10108330

The usage of cloud systems is at an all-time high, and with more organizations reaching for Big Data the forensic implications must be analyzed. The Hadoop Distributed File System is widely used both as a cloud service and with organizations implemen... Read More about Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System.

Attacking Windows Hello for Business: Is It What We Were Promised? (2023)
Journal Article
Haddad, J., Pitropakis, N., Chrysoulas, C., Lemoudden, M., & Buchanan, W. J. (2023). Attacking Windows Hello for Business: Is It What We Were Promised?. Cryptography, 7(1), Article 9. https://doi.org/10.3390/cryptography7010009

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to... Read More about Attacking Windows Hello for Business: Is It What We Were Promised?.

Explainable AI-Based DDOS Attack Identification Method for IoT Networks (2023)
Journal Article
Kalutharage, C. S., Liu, X., Chrysoulas, C., Pitropakis, N., & Papadopoulos, P. (2023). Explainable AI-Based DDOS Attack Identification Method for IoT Networks. Computers, 12(2), Article 32. https://doi.org/10.3390/computers12020032

The modern digitized world is mainly dependent on online services. The availability of online systems continues to be seriously challenged by distributed denial of service (DDoS) attacks. The challenge in mitigating attacks is not limited to identify... Read More about Explainable AI-Based DDOS Attack Identification Method for IoT Networks.

Using Social Media & Sentiment Analysis to Make Investment Decisions (2022)
Journal Article
Hasselgren, B., Chrysoulas, C., Pitropakis, N., & Buchanan, W. J. (2023). Using Social Media & Sentiment Analysis to Make Investment Decisions. Future Internet, 15(1), Article 5. https://doi.org/10.3390/fi15010005

Making investment decisions by utilizing sentiment data from social media (SM) is starting to become a more tangible concept. There has been a broad investigation into this field of study over the last decade, and many of the findings have promising... Read More about Using Social Media & Sentiment Analysis to Make Investment Decisions.

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) (2022)
Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022). Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8

Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detecting attacks. However, the lack of transparency in their decision-making pro... Read More about Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract).

Investigating Machine Learning Attacks on Financial Time Series Models (2022)
Journal Article
Gallagher, M., Pitropakis, N., Chrysoulas, C., Papadopoulos, P., Mylonas, A., & Katsikas, S. (2022). Investigating Machine Learning Attacks on Financial Time Series Models. Computers and Security, 123, https://doi.org/10.1016/j.cose.2022.102933

Machine learning and Artificial Intelligence (AI) already support human decision-making and complement professional roles, and are expected in the future to be sufficiently trusted to make autonomous decisions. To trust AI systems with such tasks, a... Read More about Investigating Machine Learning Attacks on Financial Time Series Models.

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture (2022)
Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022). GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291

E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the esta... Read More about GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2022)
Conference Proceeding
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., …Tsolis, D. (2022). GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. In Computer Security. ESORICS 2021 International Workshops. https://doi.org/10.1007/978-3-030-95484-0_3

The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks.... Read More about GLASS: Towards Secure and Decentralized eGovernance Services using IPFS.

An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university (2022)
Conference Proceeding
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (in press). An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university. In Information Systems and Technologies: WorldCIST 2023 Volume 1

This study draws attention to less studied areas of middle management role in business strategy formulation, information strategy formulation, and their alignment in developing countries. It was conducted as a case study at a public university in Mal... Read More about An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university.

A security and authentication layer for SCADA/DCS applications (2021)
Journal Article
Homay, A., Chrysoulas, C., El Boudani, B., de Sousa, M., & Wollschlaeger, M. (2021). A security and authentication layer for SCADA/DCS applications. Microprocessors and Microsystems, 87, Article 103479. https://doi.org/10.1016/j.micpro.2020.103479

Mid 2010, a sophisticated malicious computer worm called Stuxnet targeted major ICS systems around the world causing severe damages to Siemens automation products. Stuxnet proved its ability to infect air-gapped-segregated critical computers control... Read More about A security and authentication layer for SCADA/DCS applications.

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure (2021)
Presentation / Conference
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October). Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online

Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from tw... Read More about Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.

Towards An SDN Assisted IDS (2021)
Conference Proceeding
Sutton, R., Ludwiniak, R., Pitropakis, N., Chrysoulas, C., & Dagiuklas, T. (2021). Towards An SDN Assisted IDS. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). https://doi.org/10.1109/NTMS49979.2021.9432651

Modern Intrusion Detection Systems are able to identify and check all traffic crossing the network segments that they are only set to monitor. Traditional network infrastructures use static detection mechanisms that check and monitor specific types o... Read More about Towards An SDN Assisted IDS.

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT (2021)
Journal Article
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021). Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. https://doi.org/10.3390/jcp1020014

As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defe... Read More about Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.

Programming Languages: A Usage-based Statistical Analysis and Visualization (2021)
Conference Proceeding
Orlowska, A., Chrysoulas, C., Jaroucheh, Z., & Liu, X. (2021). Programming Languages: A Usage-based Statistical Analysis and Visualization. In ICISS 2021: 2021 The 4th International Conference on Information Science and Systems (143-148). https://doi.org/10.1145/3459955.3460614

Understanding the popularity, and its trend, of programming languages can be important to anticipate which languages are best studied for future use, which are widely supported for use in enterprise projects, and investigate which skills are easiest... Read More about Programming Languages: A Usage-based Statistical Analysis and Visualization.

A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda (2020)
Journal Article
Muller, L., Chrysoulas, C., Pitropakis, N., & Barclay, P. J. (2020). A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda. Big Data and Cognitive Computing, 4(4), Article 38. https://doi.org/10.3390/bdcc4040038

The shift towards microservisation which can be observed in recent developments of the cloud landscape for applications has led towards the emergence of the Function as a Service (FaaS) concept, also called Serverless. This term describes the event-d... Read More about A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda.

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing (2020)
Journal Article
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., …Papadopoulos, P. (2020). Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communications and Networks, https://doi.org/10.3389/frcmn.2020.583376

The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways... Read More about Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.

Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture) (2020)
Journal Article
El Boudani, B., Kanaris, L., Kokkinis, A., Kyriacou, M., Chrysoulas, C., Stavrou, S., & Dagiuklas, T. (2020). Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture). Sensors, 20(19), Article 5495. https://doi.org/10.3390/s20195495

In the near future, the fifth-generation wireless technology is expected to be rolled out, offering low latency, high bandwidth and multiple antennas deployed in a single access point. This ecosystem will help further enhance various location-based s... Read More about Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture).

Multi-label Classifier to Deal with Misclassification in Non-functional Requirements (2020)
Conference Proceeding
Sabir, M., Chrysoulas, C., & Banissi, E. (2020). Multi-label Classifier to Deal with Misclassification in Non-functional Requirements. In Trends and Innovations in Information Systems and Technologies: Volume 1 (486-493). https://doi.org/10.1007/978-3-030-45688-7_49

Automatic classification of software requirements is an active research area; it can alleviate the tedious task of manual labeling and improves transparency in the requirements engineering process. Several attempts have been made towards the identifi... Read More about Multi-label Classifier to Deal with Misclassification in Non-functional Requirements.

Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM) (2020)
Conference Proceeding
Seuwou, P., Chrysoulas, C., Banissi, E., & Ubakanma, G. (2020). Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM). In Trends and Innovations in Information Systems and Technologies: Volume 1 (507-516). https://doi.org/10.1007/978-3-030-45688-7_51

The work presented in the paper aims at exploring information technology acceptance in the context of Autonomous Vehicles (AV) with the objectives of identifying and testing the constructs that will influence future AVs acceptance. Most models of tec... Read More about Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM).

Class Feature Pyramids for Video Explanation (2020)
Conference Proceeding
Stergiou, A., Kapidis, G., Kalliatakis, G., Chrysoulas, C., Poppe, R., & Veltkamp, R. (2020). Class Feature Pyramids for Video Explanation. . https://doi.org/10.1109/iccvw.2019.00524

Deep convolutional networks are widely used in video action recognition. 3D convolutions are one prominent approach to deal with the additional time dimension. While 3D convolutions typically lead to higher accuracies, the inner workings of the tra... Read More about Class Feature Pyramids for Video Explanation.

Granularity Cost Analysis for Function Block as a Service (2020)
Conference Proceeding
Homay, A., Zoitl, A., de Sousa, M., Wollschlaeger, M., & Chrysoulas, C. (2020). Granularity Cost Analysis for Function Block as a Service. . https://doi.org/10.1109/indin41052.2019.8972205

The main challenge of exposing IEC61499 or IEC61131-3 Function Blocks as a service remains in adopting service-oriented concepts in function block programming. Implementing an IEC61499 or IEC61131-3 Function Block that is being accessed via service-o... Read More about Granularity Cost Analysis for Function Block as a Service.

Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT (2020)
Conference Proceeding
Ashiq, S., Chrysoulas, C., & Banissi, E. (2020). Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT. . https://doi.org/10.1109/icic48496.2019.8966710

Green Information System/Technology adoption is one of the key solutions sought by organisations, policy makers and governments to promote sustainability and deal with environmental issues. Surprisingly, in the research discipline of management infor... Read More about Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT.

Personalized Micro-Service Recommendation System for Online News (2019)
Journal Article
Asenova, M., & Chrysoulas, C. (2019). Personalized Micro-Service Recommendation System for Online News. Procedia Computer Science, 160, 610-615. https://doi.org/10.1016/j.procs.2019.11.039

In the era of artificial intelligence and high technology advance our life is dependent on them in every aspect. The dynamic environment forces us to plan our time with conscious and every minute is valuable. To help individuals and corporations see... Read More about Personalized Micro-Service Recommendation System for Online News.

Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions (2019)
Conference Proceeding
Stergiou, A., Kapidis, G., Kalliatakis, G., Chrysoulas, C., Veltkamp, R., & Poppe, R. (2019). Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions. . https://doi.org/10.1109/icip.2019.8803153

Deep learning approaches have been established as the main methodology for video classification and recognition. Recently, 3-dimensional convolutions have been used to achieve state-of-the-art performance in many challenging video datasets. Because o... Read More about Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions.

Authentication Layer for IEC 61113-3 Applications (2019)
Conference Proceeding
Homay, A., Chrysoulas, C., & de Sousa, M. (2019). Authentication Layer for IEC 61113-3 Applications. . https://doi.org/10.1109/ntms.2019.8763839

Mid 2010, the Stuxnet ICS attack targeted the Siemens automation products, and after this attack the ICS security was thrust into spotlight, automation products suppliers started to re-examine their business approach to cyber security. The OPC Founda... Read More about Authentication Layer for IEC 61113-3 Applications.

ProMe: A Mentoring Platform for Older Adults Using Machine Learning Techniques for Supporting the “Live and Learn” Concept (2018)
Journal Article
Kostopoulos, G., Neureiter, K., Papatoiu, D., Tscheligi, M., & Chrysoulas, C. (2018). ProMe: A Mentoring Platform for Older Adults Using Machine Learning Techniques for Supporting the “Live and Learn” Concept. Mobile Information Systems, 2018, 1-8. https://doi.org/10.1155/2018/9723268

It is well known what an important role employment plays in our lives and how it influences our everyday life. With the help of employment, all of us as individuals manage to create our personal and social net that not only gives meaning and financia... Read More about ProMe: A Mentoring Platform for Older Adults Using Machine Learning Techniques for Supporting the “Live and Learn” Concept.

Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case (2018)
Conference Proceeding
Chrysoulas, C., Homay, A., & Lemac, M. (2018). Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case. . https://doi.org/10.1109/ithet.2018.8424784

We propose a framework for teaching complex industrial automation concepts with the help of Virtual/Augmented reality. Initially we construct the needed 3D models like conveyors belts, and liquid tanks to be used as testbed examples for the proposed... Read More about Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case.

Traffic Sign Recognition based on Synthesised Training Data (2018)
Journal Article
Stergiou, A., Kalliatakis, G., & Chrysoulas, C. (2018). Traffic Sign Recognition based on Synthesised Training Data. Big Data and Cognitive Computing, 2(3), Article 19. https://doi.org/10.3390/bdcc2030019

To deal with the richness in visual appearance variation found in real-world data, we propose to synthesise training data capturing these differences for traffic sign recognition. The use of synthetic training data, created from road traffic sign tem... Read More about Traffic Sign Recognition based on Synthesised Training Data.

QoS provisioning in a service-oriented architecture targeting the smart grid world (2018)
Journal Article
Chrysoulas, E. (2018). QoS provisioning in a service-oriented architecture targeting the smart grid world. International Journal of Smart Grid and Green Communications, 1(3), 216-226. https://doi.org/10.1504/ijsggc.2018.091350

In today's liberalised market of energy, dynamic selections of services (energy consumption or even energy production) and by extension of service providers are crucial. It is equally important for service providers to spot the one quality of service... Read More about QoS provisioning in a service-oriented architecture targeting the smart grid world.

Building an Adaptive E-Learning System (2017)
Conference Proceeding
Chrysoulas, C., & Fasli, M. (2017). Building an Adaptive E-Learning System. In Proceedings of the 9th International Conference on Computer Supported Education - Volume 2: CSEDU (375-382). https://doi.org/10.5220/0006326103750382

Research in adaptive learning is mainly focused on improving learners’ learning achievements based mainly on personalization information, such as learning style, cognitive style or learning achievement. In this paper, an innovative adaptive learning... Read More about Building an Adaptive E-Learning System.

Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid (2017)
Journal Article
Chrysoulas, C., & Fasli, M. (2017). Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid. Journal of Communications Software and Systems, 13(2), 77. https://doi.org/10.24138/jcomss.v13i2.375

Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other hand it is equally important for Service Providers to spot the one QoS Module that offers the best QoS level in a give... Read More about Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid.

A service oriented QoS architecture targeting the smart grid world & machine learning aspects (2016)
Conference Proceeding
Chrysoulas, C., & Fasli, M. (2016). A service oriented QoS architecture targeting the smart grid world & machine learning aspects. . https://doi.org/10.1109/splitech.2016.7555923

Dynamic selection of services and by extension of service providers are vital in today's liberalized market of energy. On the other hand it is equally important for Service Providers to spot the one QoS Module that offers the best QoS level in a give... Read More about A service oriented QoS architecture targeting the smart grid world & machine learning aspects.

Multiply and conquer: A replication framework for building fault tolerant industrial applications (2015)
Conference Proceeding
de Sousa, M., Chrysoulas, C., & Homay, A. E. (2015). Multiply and conquer: A replication framework for building fault tolerant industrial applications. . https://doi.org/10.1109/indin.2015.7281930

TIEC 61499 defines an execution model for distributed industrial control applications, i.e. a single application distributed among several devices. In such an environment partial failures are likely to occur. In order to avoid probable system malfunc... Read More about Multiply and conquer: A replication framework for building fault tolerant industrial applications.

Tolerating partial failures on IEC 61499 applications (2015)
Journal Article
de Sousa, M., Chrysoulas, C., & Homay, A. (2015). Tolerating partial failures on IEC 61499 applications. ACM SIGBED Review, 12(3), 32-35. https://doi.org/10.1145/2815482.2815488

In a modern industrial environment control programs are distributed among several devices. This raises new challenges, especially in handling the failure modes. Automatic reconfiguration is a possible approach in dealing with partial failures. The au... Read More about Tolerating partial failures on IEC 61499 applications.

Building Fault Tolerant Industrial Applications Based on IEC 61499 (2015)
Conference Proceeding
de Sousa, M., Chrysoulas, C., & Homay, A. (2015). Building Fault Tolerant Industrial Applications Based on IEC 61499. In FAIM 2015

IEC 61499 defines an execution model for industrial control applications that may be distributed among several devices. In such a heterogeneous environment partial failures are likely to occur. In order to avoid probable system malfunction and breakd... Read More about Building Fault Tolerant Industrial Applications Based on IEC 61499.

Exploiting voting strategies in partially replicated IEC 61499 applications (2015)
Conference Proceeding
de Sousa, M., Chrysoulas, C., & Homay, A. E. (2015). Exploiting voting strategies in partially replicated IEC 61499 applications. . https://doi.org/10.1109/wfcs.2015.7160589

In a modern industrial environment control programs are distributed among several devices. This raises new issues and challenges especially in failure modes. Building fault tolerant applications can be the solution in order a failure of one sub-compo... Read More about Exploiting voting strategies in partially replicated IEC 61499 applications.

The arrowhead approach for SOA application development and documentation (2014)
Conference Proceeding
Blomstedt, F., Ferreira, L. L., Klisics, M., Chrysoulas, C., de Soria, I. M., Morin, B., …Varga, P. (2014). The arrowhead approach for SOA application development and documentation. In IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society. https://doi.org/10.1109/iecon.2014.7048877

The Arrowhead project aims to address the technical and applicative issues associated with cooperative automation based on Service Oriented Architectures. The problems of developing such kind of systems are mainly due to the lack of adequate developm... Read More about The arrowhead approach for SOA application development and documentation.

Arrowhead compliant virtual market of energy (2014)
Conference Proceeding
Ferreira, L. L., Siksnys, L., Pedersen, P., Stluka, P., Chrysoulas, C., le Guilly, T., …Pedersen, T. (2014). Arrowhead compliant virtual market of energy. In Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA). https://doi.org/10.1109/etfa.2014.7005193

Industrial processes use energy to transform raw materials and intermediate goods into final products. Many efforts have been done on the minimization of energy costs in industrial plants. Apart from working on “how” an industrial process is implemen... Read More about Arrowhead compliant virtual market of energy.

Shielding the Grid World: An Overview (2014)
Journal Article
Chrysoulas, C. (2014). Shielding the Grid World: An Overview. International Journal of Electronics and Information Engineering, 1(1), 23-28

Continues research and development efforts within the Grid community have produced protocols, services, and tools that address the challenges arising when we seek to build scalable virtual organizations (VOs). The technologies that have evolved from... Read More about Shielding the Grid World: An Overview.

Resource Management and Service Deployment in Grids (2011)
Book Chapter
Chrysoulas, C., & Sklavos, N. (2011). Resource Management and Service Deployment in Grids. In N. P. Preve (Ed.), Grid Computing: Towards a Global Interconnected Infrastructure (123-143). London: Springer. https://doi.org/10.1007/978-0-85729-676-4_5

Semantic grid refers to an approach to grid computing in which information, computing resources, and services are described in standard ways that can be processed by computer. This makes it easier for resources to be discovered and joined up automati... Read More about Resource Management and Service Deployment in Grids.

Enhancing service portability in upcoming 3G UMTS networks & security aspects (2010)
Conference Proceeding
Chrysoulas, C., Sklavos, N., & Kakarountas, A. P. (2010). Enhancing service portability in upcoming 3G UMTS networks & security aspects. In Melecon 2010 - 2010 15th IEEE Mediterranean Electrotechnical Conference. https://doi.org/10.1109/melcon.2010.5476242

Compared to other wired networks, complexity in the 3G UMTS is due its interactions with different entities. Within the UMTS, services have to deal with a great number of different QoS, small user display, variant bandwidth and small battery power. M... Read More about Enhancing service portability in upcoming 3G UMTS networks & security aspects.

A Web-Services Based Architecture for Dynamic-Service Deployment (2009)
Conference Proceeding
Chrysoulas, C., Haleplidis, E., Haas, R., Denazis, S., & Koufopavlou, O. (2009). A Web-Services Based Architecture for Dynamic-Service Deployment. . https://doi.org/10.1007/978-3-642-00972-3_19

Due to the increase in both heterogeneity and complexity in today’s networking systems, there arises a demand for an architecture for network-based services, that gives flexibility and efficiency in the definition, deployment and execution of the ser... Read More about A Web-Services Based Architecture for Dynamic-Service Deployment.

Proposing a service-enabled semantic grid model (2009)
Journal Article
Chrysoulas, C., & Koufopavlou, O. (2009). Proposing a service-enabled semantic grid model. International Journal of Autonomous and Adaptive Communications Systems, 2(4), 349-361. https://doi.org/10.1504/ijaacs.2009.029170

The semantic grid refers to an approach to grid computing in which information, computing resources and services are described in standard ways that can be processed by computer. This makes it easier for resources to be discovered and joined up autom... Read More about Proposing a service-enabled semantic grid model.

Integrating QoS management within a Web Service architecture (2009)
Conference Proceeding
Chrysoulas, C. (2009). Integrating QoS management within a Web Service architecture. In 2009 International Conference on Ultra Modern Telecommunications & Workshops. https://doi.org/10.1109/icumt.2009.5345617

Web Services are applications that expose functionality to consumers via public interfaces. Web-services support the concept of loosely coupled components, which in turn enables the development of more agile and open systems. However, this flexibilit... Read More about Integrating QoS management within a Web Service architecture.

Towards a service-enabled distributed router architecture (2008)
Journal Article
Chrysoulas, C., Haleplidis, E., Kostopoulos, G., Haas, R., Denazis, S., & Koufopavlou, O. (2008). Towards a service-enabled distributed router architecture. IET Circuits, Devices and Systems, 2(1), 60-68. https://doi.org/10.1049/iet-cds%3A20070041

Modelling is an essential tool in the development and assessment of new concepts. The authors propose an architecture for the next-generation gigabit distributed active router that was designed and implemented in the IST project, FlexiNET. In the Fle... Read More about Towards a service-enabled distributed router architecture.

Dynamic deployment of semantic-based services in a highly distributed environment (2007)
Conference Proceeding
Chrysoulas, C., & Koufopavlou, O. (2007). Dynamic deployment of semantic-based services in a highly distributed environment. In Proceedings of the Third International Conference on Web Information Systems and Technologies - Volume 1: WEBIST (416-419). https://doi.org/10.5220/0001278504160419

Today’s Networking Systems tend to increase in both heterogeneity and complexity. So there arises the need for an architecture for network-based services that provides flexibility and efficiency in the definition, deployment and execution of the serv... Read More about Dynamic deployment of semantic-based services in a highly distributed environment.

Towards a resource management and service deployment framework (2007)
Journal Article
Chrysoulas, C., Haleplidis, E., Kostopoulos, G., Haas, R., & Koufopavlou, O. (2008). Towards a resource management and service deployment framework. International Journal of Network Management, 18(4), 345-363. https://doi.org/10.1002/nem.672

Owing to the increase in both heterogeneity and complexity in today's networking systems, the need arises for new network‐based services architectures. They must provide flexibility and efficiency in the definition, deployment and execution of the se... Read More about Towards a resource management and service deployment framework.

Dynamic Service Deployment using an Ontologybased Description of Devices and Services (2007)
Conference Proceeding
Chrysoulas, C., Koumoutsos, G., Denazis, S., Thramboulidis, K., & Koufopavlou, O. (2007). Dynamic Service Deployment using an Ontologybased Description of Devices and Services. . https://doi.org/10.1109/icns.2007.55

In the FlexiNET 1ST research project a service called Dynamic Service Deployment dynamically installs, monitors and uninstalls new services upon user demand, or by a default configuration. There was a need for a module to keep all the required inform... Read More about Dynamic Service Deployment using an Ontologybased Description of Devices and Services.

A Distributed Router's Modeling and Implementation (2006)
Conference Proceeding
Chrysoulas, C., Haleplidis, E., Kostopoulos, G., Denazis, S., & Koufopavlou, O. (2006). A Distributed Router's Modeling and Implementation. In Proceedings of the Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)

Modeling comes to a necessity when there is something new to be developed and there is a need to specify in exact detail a specific architecture. This paper describes a model of a Distributed Router's Architecture specifically suited for the IST proj... Read More about A Distributed Router's Modeling and Implementation.

Security in Wireless Networks: The FlexiNET Approach (2006)
Conference Proceeding
Kostopoulos, G., Kavadias, C., Chrysoulas, C., Denazis, S., & Koufopavlou, O. (2006). Security in Wireless Networks: The FlexiNET Approach.

Security is a crucial factor in the provision of the mobile services. The rapid growth of harmful attacks has increased the need for higher security level, especially in the case of wireless networks. In this paper we present a new security approach... Read More about Security in Wireless Networks: The FlexiNET Approach.

A decision making framework for dynamic service deployment (2006)
Conference Proceeding
Chrysoulas, C., Kostopoulos, G., Haleplidis, E., Haas, R., Denazis, S., & Koufopavlou, O. (2006). A decision making framework for dynamic service deployment.

Owing to the increase in both heterogeneity and complexity in today's networking systems, the need arises for an architecture for network-based services that provides flexibility and efficiency in the definition, deployment and execution of the servi... Read More about A decision making framework for dynamic service deployment.

Applying a Web-Service-Based Model to Dynamic Service-Deployment (2006)
Conference Proceeding
Chrysoulas, C., Haleplidis, E., Haas, R., Denazis, S., & Koyfopavlou, O. (2006). Applying a Web-Service-Based Model to Dynamic Service-Deployment. In International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06). https://doi.org/10.1109/cimca.2005.1631253

Owing to the increase in both heterogeneity and complexity in today's networking systems, the need arises for an architecture for network-based services that provides flexibility and efficiency in the definition, deployment and execution of the servi... Read More about Applying a Web-Service-Based Model to Dynamic Service-Deployment.