Skip to main content

Research Repository

Advanced Search

Outputs (60)

Towards Building a Smart Water Management System (SWAMS) in Nigeria (2024)
Presentation / Conference Contribution
Bamgboye, O., Chrysoulas, C., Liu, X., Watt, T., Sodiya, A., Oyeleye, M., & Kalutharage, S. (2024, June). Towards Building a Smart Water Management System (SWAMS) in Nigeria. Presented at The 22nd IEEE Mediterranean Electrotechnical Conference, Porto, Por

The water management landscape in Nigeria struggles with formidable obstacles characterized by a lack of adequate infrastructure, an uneven distribution of resources, and insufficient access to clean water, particularly in rural areas. These challeng... Read More about Towards Building a Smart Water Management System (SWAMS) in Nigeria.

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks (2023)
Presentation / Conference Contribution
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. In 2023 IEEE Globecom Workshops (GC Wkshps). https://doi.org/10.1109/GCWkshps58843.2023.1046

As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, t... Read More about Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution (2023)
Presentation / Conference Contribution
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (2023, March). Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution. Presented at 16th IADIS International Conference on Information Systems (IS 2023)

This article is a report on the lessons learned when conducting an interpretive case study in a developing country. From the literature review, it was apparent that there are few reported lessons from pilot studies about strategic alignment in higher... Read More about Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution.

Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques (2023)
Presentation / Conference Contribution
Gomez, L. R., Watt, T., Babaagba, K. O., Chrysoulas, C., Homay, A., Rangarajan, R., & Liu, X. (2023). Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques. In ICISS '23: Proceedings of the 2023 6th International Conferen

In recent years, text has been the main form of communication on social media platforms such as Twitter, Reddit, Facebook, Instagram and YouTube. Emotion Recognition from these platforms can be exploited for all sorts of applications. Through the mea... Read More about Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques.

Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap (2023)
Journal Article
El Boudani, B., Dagiuklas, T., Kanaris, L., Iqbal, M., & Chrysoulas, C. (2023). Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap. Electronics, 12(19), Article 4150. https://doi.org/10.3390/e

Indoor positioning is a core enabler for various 5G identity and context-aware applications requiring precise and real-time simultaneous localisation and mapping (SLAM). In this work, we propose a K-nearest neighbours and deep neural network (K-DNN)... Read More about Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap.

Edge NLP for Efficient Machine Translation in Low Connectivity Areas (2023)
Presentation / Conference Contribution
Watt, T., Chrysoulas, C., & Gkatzia, D. (2023, October). Edge NLP for Efficient Machine Translation in Low Connectivity Areas. Presented at IEEE 9th World Forum on Internet of Things: 2nd Workshop on Convergence of Edge Intelligence in IoT (EdgeAI-IoT 202

Machine translation (MT) usually requires connectivity and access to the cloud which is often limited in many parts of the world, including hard to reach rural areas. Edge natural language processing (NLP) aims to solve this problem by processing lan... Read More about Edge NLP for Efficient Machine Translation in Low Connectivity Areas.

Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas (2023)
Presentation / Conference Contribution
Josephe, A. O., Chrysoulas, C., Peng, T., El Boudani, B., Iatropoulos, I., & Pitropakis, N. (2023). Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas. In 2023 IEEE IAS Global Conference on Emerging Technologies (GlobConET

Web applications are popular in our world today and every organization or individual either build or access at least one each day. It’s important for every application user to continue accessing contents of a web application irrespective of the netwo... Read More about Progressive Web Apps to Support (Critical) Systems in Low or No Connectivity Areas.

Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System (2023)
Presentation / Conference Contribution
Laing, S., Ludwiniak, R., El Boudani, . B., Chrysoulas, C., Ubakanma, G., & Pitropakis, N. (2023). Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System. In 2023 19th International Conference on the Design of Reliable Communicat

The usage of cloud systems is at an all-time high, and with more organizations reaching for Big Data the forensic implications must be analyzed. The Hadoop Distributed File System is widely used both as a cloud service and with organizations implemen... Read More about Forensic Investigation Using RAM Analysis on the Hadoop Distributed File System.

Attacking Windows Hello for Business: Is It What We Were Promised? (2023)
Journal Article
Haddad, J., Pitropakis, N., Chrysoulas, C., Lemoudden, M., & Buchanan, W. J. (2023). Attacking Windows Hello for Business: Is It What We Were Promised?. Cryptography, 7(1), Article 9. https://doi.org/10.3390/cryptography7010009

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to... Read More about Attacking Windows Hello for Business: Is It What We Were Promised?.

Explainable AI-Based DDOS Attack Identification Method for IoT Networks (2023)
Journal Article
Kalutharage, C. S., Liu, X., Chrysoulas, C., Pitropakis, N., & Papadopoulos, P. (2023). Explainable AI-Based DDOS Attack Identification Method for IoT Networks. Computers, 12(2), Article 32. https://doi.org/10.3390/computers12020032

The modern digitized world is mainly dependent on online services. The availability of online systems continues to be seriously challenged by distributed denial of service (DDoS) attacks. The challenge in mitigating attacks is not limited to identify... Read More about Explainable AI-Based DDOS Attack Identification Method for IoT Networks.

Using Social Media & Sentiment Analysis to Make Investment Decisions (2022)
Journal Article
Hasselgren, B., Chrysoulas, C., Pitropakis, N., & Buchanan, W. J. (2023). Using Social Media & Sentiment Analysis to Make Investment Decisions. Future Internet, 15(1), Article 5. https://doi.org/10.3390/fi15010005

Making investment decisions by utilizing sentiment data from social media (SM) is starting to become a more tangible concept. There has been a broad investigation into this field of study over the last decade, and many of the findings have promising... Read More about Using Social Media & Sentiment Analysis to Make Investment Decisions.

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) (2022)
Presentation / Conference Contribution
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022, September). Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). Presented at 27th European Symposium on Research in Computer Security

Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detecting attacks. However, the lack of transparency in their decision-making pro... Read More about Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract).

Investigating Machine Learning Attacks on Financial Time Series Models (2022)
Journal Article
Gallagher, M., Pitropakis, N., Chrysoulas, C., Papadopoulos, P., Mylonas, A., & Katsikas, S. (2022). Investigating Machine Learning Attacks on Financial Time Series Models. Computers and Security, 123, https://doi.org/10.1016/j.cose.2022.102933

Machine learning and Artificial Intelligence (AI) already support human decision-making and complement professional roles, and are expected in the future to be sufficiently trusted to make autonomous decisions. To trust AI systems with such tasks, a... Read More about Investigating Machine Learning Attacks on Financial Time Series Models.

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture (2022)
Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022). GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291

E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the esta... Read More about GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2022)
Presentation / Conference Contribution
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., Domalis, G., Karacapilidis, N., Tsakalidis, D., & Tsolis, D. (2021, October). GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. Presented at 7th

The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks.... Read More about GLASS: Towards Secure and Decentralized eGovernance Services using IPFS.

An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university (2022)
Presentation / Conference Contribution
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (2023, April). An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university. Presented at 11th World Conference on Information

This study draws attention to less studied areas of middle management role in business strategy formulation, information strategy formulation, and their alignment in developing countries. It was conducted as a case study at a public university in Mal... Read More about An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university.

A security and authentication layer for SCADA/DCS applications (2021)
Journal Article
Homay, A., Chrysoulas, C., El Boudani, B., de Sousa, M., & Wollschlaeger, M. (2021). A security and authentication layer for SCADA/DCS applications. Microprocessors and Microsystems, 87, Article 103479. https://doi.org/10.1016/j.micpro.2020.103479

Mid 2010, a sophisticated malicious computer worm called Stuxnet targeted major ICS systems around the world causing severe damages to Siemens automation products. Stuxnet proved its ability to infect air-gapped-segregated critical computers control... Read More about A security and authentication layer for SCADA/DCS applications.

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure (2021)
Presentation / Conference Contribution
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October). Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analyt

Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from tw... Read More about Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.

Towards An SDN Assisted IDS (2021)
Presentation / Conference Contribution
Sutton, R., Ludwiniak, R., Pitropakis, N., Chrysoulas, C., & Dagiuklas, T. (2021). Towards An SDN Assisted IDS. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). https://doi.org/10.1109/NTMS49979.2021.9432651

Modern Intrusion Detection Systems are able to identify and check all traffic crossing the network segments that they are only set to monitor. Traditional network infrastructures use static detection mechanisms that check and monitor specific types o... Read More about Towards An SDN Assisted IDS.

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT (2021)
Journal Article
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021). Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. http

As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defe... Read More about Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.

Programming Languages: A Usage-based Statistical Analysis and Visualization (2021)
Presentation / Conference Contribution
Orlowska, A., Chrysoulas, C., Jaroucheh, Z., & Liu, X. (2021). Programming Languages: A Usage-based Statistical Analysis and Visualization. In ICISS 2021: 2021 The 4th International Conference on Information Science and Systems (143-148). https://doi.org

Understanding the popularity, and its trend, of programming languages can be important to anticipate which languages are best studied for future use, which are widely supported for use in enterprise projects, and investigate which skills are easiest... Read More about Programming Languages: A Usage-based Statistical Analysis and Visualization.

A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda (2020)
Journal Article
Muller, L., Chrysoulas, C., Pitropakis, N., & Barclay, P. J. (2020). A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda. Big Data and Cognitive Computing, 4(4), Article 38. https://doi.org/10.3390/bdcc404

The shift towards microservisation which can be observed in recent developments of the cloud landscape for applications has led towards the emergence of the Function as a Service (FaaS) concept, also called Serverless. This term describes the event-d... Read More about A Traffic Analysis on Serverless Computing Based on the Example of a File Upload Stream on AWS Lambda.

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing (2020)
Journal Article
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., Haynes, D., Pitropakis, N., & Papadopoulos, P. (2020). Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communic

The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways... Read More about Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.

Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture) (2020)
Journal Article
El Boudani, B., Kanaris, L., Kokkinis, A., Kyriacou, M., Chrysoulas, C., Stavrou, S., & Dagiuklas, T. (2020). Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture). Sensor

In the near future, the fifth-generation wireless technology is expected to be rolled out, offering low latency, high bandwidth and multiple antennas deployed in a single access point. This ecosystem will help further enhance various location-based s... Read More about Implementing Deep Learning Techniques in 5G IoT Networks for 3D Indoor Positioning: DELTA (DeEp Learning-Based Co-operaTive Architecture).

Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM) (2020)
Presentation / Conference Contribution
Seuwou, P., Chrysoulas, C., Banissi, E., & Ubakanma, G. (2020). Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM). In Trends and Innovations in Information Systems and Technolo

The work presented in the paper aims at exploring information technology acceptance in the context of Autonomous Vehicles (AV) with the objectives of identifying and testing the constructs that will influence future AVs acceptance. Most models of tec... Read More about Measuring Consumer Behavioural Intention to Accept Technology: Towards Autonomous Vehicles Technology Acceptance Model (AVTAM).

Multi-label Classifier to Deal with Misclassification in Non-functional Requirements (2020)
Presentation / Conference Contribution
Sabir, M., Chrysoulas, C., & Banissi, E. (2020). Multi-label Classifier to Deal with Misclassification in Non-functional Requirements. In Trends and Innovations in Information Systems and Technologies: Volume 1 (486-493). https://doi.org/10.1007/978-3-03

Automatic classification of software requirements is an active research area; it can alleviate the tedious task of manual labeling and improves transparency in the requirements engineering process. Several attempts have been made towards the identifi... Read More about Multi-label Classifier to Deal with Misclassification in Non-functional Requirements.

Class Feature Pyramids for Video Explanation (2020)
Presentation / Conference Contribution
Stergiou, A., Kapidis, G., Kalliatakis, G., Chrysoulas, C., Poppe, R., & Veltkamp, R. (2020). Class Feature Pyramids for Video Explanation. . https://doi.org/10.1109/iccvw.2019.00524

Deep convolutional networks are widely used in video action recognition. 3D convolutions are one prominent approach to deal with the additional time dimension. While 3D convolutions typically lead to higher accuracies, the inner workings of the tra... Read More about Class Feature Pyramids for Video Explanation.

Granularity Cost Analysis for Function Block as a Service (2020)
Presentation / Conference Contribution
Homay, A., Zoitl, A., de Sousa, M., Wollschlaeger, M., & Chrysoulas, C. (2020). Granularity Cost Analysis for Function Block as a Service. . https://doi.org/10.1109/indin41052.2019.8972205

The main challenge of exposing IEC61499 or IEC61131-3 Function Blocks as a service remains in adopting service-oriented concepts in function block programming. Implementing an IEC61499 or IEC61131-3 Function Block that is being accessed via service-o... Read More about Granularity Cost Analysis for Function Block as a Service.

Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT (2020)
Presentation / Conference Contribution
Ashiq, S., Chrysoulas, C., & Banissi, E. (2020). Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT. . https://doi.org/10.1109/icic48496.2019.8966710

Green Information System/Technology adoption is one of the key solutions sought by organisations, policy makers and governments to promote sustainability and deal with environmental issues. Surprisingly, in the research discipline of management infor... Read More about Conceptualising Green Awareness as Moderator in Technology Acceptance Model for Green IS/IT.

Personalized Micro-Service Recommendation System for Online News (2019)
Presentation / Conference Contribution
Asenova, M., & Chrysoulas, C. (2019). Personalized Micro-Service Recommendation System for Online News. Procedia Computer Science, 160, 610-615. https://doi.org/10.1016/j.procs.2019.11.039

In the era of artificial intelligence and high technology advance our life is dependent on them in every aspect. The dynamic environment forces us to plan our time with conscious and every minute is valuable. To help individuals and corporations see... Read More about Personalized Micro-Service Recommendation System for Online News.

Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions (2019)
Presentation / Conference Contribution
Stergiou, A., Kapidis, G., Kalliatakis, G., Chrysoulas, C., Veltkamp, R., & Poppe, R. (2019). Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions. . https://doi.org/10.1109/icip.2019.8803153

Deep learning approaches have been established as the main methodology for video classification and recognition. Recently, 3-dimensional convolutions have been used to achieve state-of-the-art performance in many challenging video datasets. Because o... Read More about Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions.

Authentication Layer for IEC 61113-3 Applications (2019)
Presentation / Conference Contribution
Homay, A., Chrysoulas, C., & de Sousa, M. (2019). Authentication Layer for IEC 61113-3 Applications. . https://doi.org/10.1109/ntms.2019.8763839

Mid 2010, the Stuxnet ICS attack targeted the Siemens automation products, and after this attack the ICS security was thrust into spotlight, automation products suppliers started to re-examine their business approach to cyber security. The OPC Founda... Read More about Authentication Layer for IEC 61113-3 Applications.

ProMe: A Mentoring Platform for Older Adults Using Machine Learning Techniques for Supporting the “Live and Learn” Concept (2018)
Journal Article
Kostopoulos, G., Neureiter, K., Papatoiu, D., Tscheligi, M., & Chrysoulas, C. (2018). ProMe: A Mentoring Platform for Older Adults Using Machine Learning Techniques for Supporting the “Live and Learn” Concept. Mobile Information Systems, 2018, 1-8. ht

It is well known what an important role employment plays in our lives and how it influences our everyday life. With the help of employment, all of us as individuals manage to create our personal and social net that not only gives meaning and financia... Read More about ProMe: A Mentoring Platform for Older Adults Using Machine Learning Techniques for Supporting the “Live and Learn” Concept.

Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case (2018)
Presentation / Conference Contribution
Chrysoulas, C., Homay, A., & Lemac, M. (2018). Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case. . https://doi.org/10.1109/ithet.2018.8424784

We propose a framework for teaching complex industrial automation concepts with the help of Virtual/Augmented reality. Initially we construct the needed 3D models like conveyors belts, and liquid tanks to be used as testbed examples for the proposed... Read More about Teaching Industrial Automation Concepts with the use of Virtual/Augmented Reality - The IEC 61499 Case.

Traffic Sign Recognition based on Synthesised Training Data (2018)
Journal Article
Stergiou, A., Kalliatakis, G., & Chrysoulas, C. (2018). Traffic Sign Recognition based on Synthesised Training Data. Big Data and Cognitive Computing, 2(3), Article 19. https://doi.org/10.3390/bdcc2030019

To deal with the richness in visual appearance variation found in real-world data, we propose to synthesise training data capturing these differences for traffic sign recognition. The use of synthetic training data, created from road traffic sign tem... Read More about Traffic Sign Recognition based on Synthesised Training Data.

QoS provisioning in a service-oriented architecture targeting the smart grid world (2018)
Journal Article
Chrysoulas, E. (2018). QoS provisioning in a service-oriented architecture targeting the smart grid world. International Journal of Smart Grid and Green Communications, 1(3), 216-226. https://doi.org/10.1504/ijsggc.2018.091350

In today's liberalised market of energy, dynamic selections of services (energy consumption or even energy production) and by extension of service providers are crucial. It is equally important for service providers to spot the one quality of service... Read More about QoS provisioning in a service-oriented architecture targeting the smart grid world.

Building an Adaptive E-Learning System (2017)
Presentation / Conference Contribution
Chrysoulas, C., & Fasli, M. (2017). Building an Adaptive E-Learning System. In Proceedings of the 9th International Conference on Computer Supported Education - Volume 2: CSEDU (375-382). https://doi.org/10.5220/0006326103750382

Research in adaptive learning is mainly focused on improving learners’ learning achievements based mainly on personalization information, such as learning style, cognitive style or learning achievement. In this paper, an innovative adaptive learning... Read More about Building an Adaptive E-Learning System.

Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid (2017)
Journal Article
Chrysoulas, C., & Fasli, M. (2017). Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid. Journal of Communications Software and Systems, 13(2), 77. https://doi.org/10.24138/jcomss.v13i2.375

Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other hand it is equally important for Service Providers to spot the one QoS Module that offers the best QoS level in a give... Read More about Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid.

A service oriented QoS architecture targeting the smart grid world & machine learning aspects (2016)
Presentation / Conference Contribution
Chrysoulas, C., & Fasli, M. (2016). A service oriented QoS architecture targeting the smart grid world & machine learning aspects. . https://doi.org/10.1109/splitech.2016.7555923

Dynamic selection of services and by extension of service providers are vital in today's liberalized market of energy. On the other hand it is equally important for Service Providers to spot the one QoS Module that offers the best QoS level in a give... Read More about A service oriented QoS architecture targeting the smart grid world & machine learning aspects.

Multiply and conquer: A replication framework for building fault tolerant industrial applications (2015)
Presentation / Conference Contribution
de Sousa, M., Chrysoulas, C., & Homay, A. E. (2015). Multiply and conquer: A replication framework for building fault tolerant industrial applications. . https://doi.org/10.1109/indin.2015.7281930

TIEC 61499 defines an execution model for distributed industrial control applications, i.e. a single application distributed among several devices. In such an environment partial failures are likely to occur. In order to avoid probable system malfunc... Read More about Multiply and conquer: A replication framework for building fault tolerant industrial applications.

Tolerating partial failures on IEC 61499 applications (2015)
Journal Article
de Sousa, M., Chrysoulas, C., & Homay, A. (2015). Tolerating partial failures on IEC 61499 applications. ACM SIGBED Review, 12(3), 32-35. https://doi.org/10.1145/2815482.2815488

In a modern industrial environment control programs are distributed among several devices. This raises new challenges, especially in handling the failure modes. Automatic reconfiguration is a possible approach in dealing with partial failures. The au... Read More about Tolerating partial failures on IEC 61499 applications.

Building Fault Tolerant Industrial Applications Based on IEC 61499 (2015)
Presentation / Conference Contribution
de Sousa, M., Chrysoulas, C., & Homay, A. (2015). Building Fault Tolerant Industrial Applications Based on IEC 61499. In FAIM 2015

IEC 61499 defines an execution model for industrial control applications that may be distributed among several devices. In such a heterogeneous environment partial failures are likely to occur. In order to avoid probable system malfunction and breakd... Read More about Building Fault Tolerant Industrial Applications Based on IEC 61499.

Exploiting voting strategies in partially replicated IEC 61499 applications (2015)
Presentation / Conference Contribution
de Sousa, M., Chrysoulas, C., & Homay, A. E. (2015). Exploiting voting strategies in partially replicated IEC 61499 applications. . https://doi.org/10.1109/wfcs.2015.7160589

In a modern industrial environment control programs are distributed among several devices. This raises new issues and challenges especially in failure modes. Building fault tolerant applications can be the solution in order a failure of one sub-compo... Read More about Exploiting voting strategies in partially replicated IEC 61499 applications.

The arrowhead approach for SOA application development and documentation (2014)
Presentation / Conference Contribution
Blomstedt, F., Ferreira, L. L., Klisics, M., Chrysoulas, C., de Soria, I. M., Morin, B., …Varga, P. (2014). The arrowhead approach for SOA application development and documentation. In IECON 2014 - 40th Annual Conference of the IEEE Industrial Electron

The Arrowhead project aims to address the technical and applicative issues associated with cooperative automation based on Service Oriented Architectures. The problems of developing such kind of systems are mainly due to the lack of adequate developm... Read More about The arrowhead approach for SOA application development and documentation.

Arrowhead compliant virtual market of energy (2014)
Presentation / Conference Contribution
Ferreira, L. L., Siksnys, L., Pedersen, P., Stluka, P., Chrysoulas, C., le Guilly, T., …Pedersen, T. (2014). Arrowhead compliant virtual market of energy. In Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA). https://doi.or

Industrial processes use energy to transform raw materials and intermediate goods into final products. Many efforts have been done on the minimization of energy costs in industrial plants. Apart from working on “how” an industrial process is implemen... Read More about Arrowhead compliant virtual market of energy.

Shielding the Grid World: An Overview (2014)
Journal Article
Chrysoulas, C. (2014). Shielding the Grid World: An Overview. International Journal of Electronics and Information Engineering, 1(1), 23-28

Continues research and development efforts within the Grid community have produced protocols, services, and tools that address the challenges arising when we seek to build scalable virtual organizations (VOs). The technologies that have evolved from... Read More about Shielding the Grid World: An Overview.

Resource Management and Service Deployment in Grids (2011)
Book Chapter
Chrysoulas, C., & Sklavos, N. (2011). Resource Management and Service Deployment in Grids. In N. P. Preve (Ed.), Grid Computing: Towards a Global Interconnected Infrastructure (123-143). London: Springer. https://doi.org/10.1007/978-0-85729-676-4_5

Semantic grid refers to an approach to grid computing in which information, computing resources, and services are described in standard ways that can be processed by computer. This makes it easier for resources to be discovered and joined up automati... Read More about Resource Management and Service Deployment in Grids.

Enhancing service portability in upcoming 3G UMTS networks & security aspects (2010)
Presentation / Conference Contribution
Chrysoulas, C., Sklavos, N., & Kakarountas, A. P. (2010). Enhancing service portability in upcoming 3G UMTS networks & security aspects. In Melecon 2010 - 2010 15th IEEE Mediterranean Electrotechnical Conference. https://doi.org/10.1109/melcon.2010.54762

Compared to other wired networks, complexity in the 3G UMTS is due its interactions with different entities. Within the UMTS, services have to deal with a great number of different QoS, small user display, variant bandwidth and small battery power. M... Read More about Enhancing service portability in upcoming 3G UMTS networks & security aspects.

A Web-Services Based Architecture for Dynamic-Service Deployment (2009)
Presentation / Conference Contribution
Chrysoulas, C., Haleplidis, E., Haas, R., Denazis, S., & Koufopavlou, O. (2009). A Web-Services Based Architecture for Dynamic-Service Deployment. . https://doi.org/10.1007/978-3-642-00972-3_19

Due to the increase in both heterogeneity and complexity in today’s networking systems, there arises a demand for an architecture for network-based services, that gives flexibility and efficiency in the definition, deployment and execution of the ser... Read More about A Web-Services Based Architecture for Dynamic-Service Deployment.

Proposing a service-enabled semantic grid model (2009)
Journal Article
Chrysoulas, C., & Koufopavlou, O. (2009). Proposing a service-enabled semantic grid model. International Journal of Autonomous and Adaptive Communications Systems, 2(4), 349-361. https://doi.org/10.1504/ijaacs.2009.029170

The semantic grid refers to an approach to grid computing in which information, computing resources and services are described in standard ways that can be processed by computer. This makes it easier for resources to be discovered and joined up autom... Read More about Proposing a service-enabled semantic grid model.

Integrating QoS management within a Web Service architecture (2009)
Presentation / Conference Contribution
Chrysoulas, C. (2009). Integrating QoS management within a Web Service architecture. In 2009 International Conference on Ultra Modern Telecommunications & Workshops. https://doi.org/10.1109/icumt.2009.5345617

Web Services are applications that expose functionality to consumers via public interfaces. Web-services support the concept of loosely coupled components, which in turn enables the development of more agile and open systems. However, this flexibilit... Read More about Integrating QoS management within a Web Service architecture.

Towards a service-enabled distributed router architecture (2008)
Journal Article
Chrysoulas, C., Haleplidis, E., Kostopoulos, G., Haas, R., Denazis, S., & Koufopavlou, O. (2008). Towards a service-enabled distributed router architecture. IET Circuits, Devices and Systems, 2(1), 60-68. https://doi.org/10.1049/iet-cds%3A20070041

Modelling is an essential tool in the development and assessment of new concepts. The authors propose an architecture for the next-generation gigabit distributed active router that was designed and implemented in the IST project, FlexiNET. In the Fle... Read More about Towards a service-enabled distributed router architecture.

Dynamic deployment of semantic-based services in a highly distributed environment (2007)
Presentation / Conference Contribution
Chrysoulas, C., & Koufopavlou, O. (2007). Dynamic deployment of semantic-based services in a highly distributed environment. In Proceedings of the Third International Conference on Web Information Systems and Technologies - Volume 1: WEBIST (416-419). h

Today’s Networking Systems tend to increase in both heterogeneity and complexity. So there arises the need for an architecture for network-based services that provides flexibility and efficiency in the definition, deployment and execution of the serv... Read More about Dynamic deployment of semantic-based services in a highly distributed environment.

Towards a resource management and service deployment framework (2007)
Journal Article
Chrysoulas, C., Haleplidis, E., Kostopoulos, G., Haas, R., & Koufopavlou, O. (2008). Towards a resource management and service deployment framework. International Journal of Network Management, 18(4), 345-363. https://doi.org/10.1002/nem.672

Owing to the increase in both heterogeneity and complexity in today's networking systems, the need arises for new network‐based services architectures. They must provide flexibility and efficiency in the definition, deployment and execution of the se... Read More about Towards a resource management and service deployment framework.

Dynamic Service Deployment using an Ontologybased Description of Devices and Services (2007)
Presentation / Conference Contribution
Chrysoulas, C., Koumoutsos, G., Denazis, S., Thramboulidis, K., & Koufopavlou, O. (2007). Dynamic Service Deployment using an Ontologybased Description of Devices and Services. . https://doi.org/10.1109/icns.2007.55

In the FlexiNET 1ST research project a service called Dynamic Service Deployment dynamically installs, monitors and uninstalls new services upon user demand, or by a default configuration. There was a need for a module to keep all the required inform... Read More about Dynamic Service Deployment using an Ontologybased Description of Devices and Services.

A Distributed Router's Modeling and Implementation (2006)
Presentation / Conference Contribution
Chrysoulas, C., Haleplidis, E., Kostopoulos, G., Denazis, S., & Koufopavlou, O. (2006, June). A Distributed Router's Modeling and Implementation. Presented at CSNDSP 2006, 5th International Symposium on Communication Systems, Networks and Digital Signal P

Modeling comes to a necessity when there is something new to be developed and there is a need to specify in exact detail a specific architecture. This paper describes a model of a Distributed Router's Architecture specifically suited for the IST proj... Read More about A Distributed Router's Modeling and Implementation.

Security in Wireless Networks: The FlexiNET Approach (2006)
Presentation / Conference Contribution
Kostopoulos, G., Kavadias, C., Chrysoulas, C., Denazis, S., & Koufopavlou, O. (2006, June). Security in Wireless Networks: The FlexiNET Approach. Presented at CSNDSP 2006, 5th International Symposium on Communication Systems, Networks and Digital Signal P

Security is a crucial factor in the provision of the mobile services. The rapid growth of harmful attacks has increased the need for higher security level, especially in the case of wireless networks. In this paper we present a new security approach... Read More about Security in Wireless Networks: The FlexiNET Approach.

A decision making framework for dynamic service deployment (2006)
Presentation / Conference Contribution
Chrysoulas, C., Kostopoulos, G., Haleplidis, E., Haas, R., Denazis, S., & Koufopavlou, O. (2006, June). A decision making framework for dynamic service deployment. Presented at IST 2006, 15th Mobile and Wireless Summit, Myconos, Greece

Owing to the increase in both heterogeneity and complexity in today's networking systems, the need arises for an architecture for network-based services that provides flexibility and efficiency in the definition, deployment and execution of the servi... Read More about A decision making framework for dynamic service deployment.

Applying a Web-Service-Based Model to Dynamic Service-Deployment (2006)
Presentation / Conference Contribution
Chrysoulas, C., Haleplidis, E., Haas, R., Denazis, S., & Koyfopavlou, O. (2006). Applying a Web-Service-Based Model to Dynamic Service-Deployment. In International Conference on Computational Intelligence for Modelling, Control and Automation and Interna

Owing to the increase in both heterogeneity and complexity in today's networking systems, the need arises for an architecture for network-based services that provides flexibility and efficiency in the definition, deployment and execution of the servi... Read More about Applying a Web-Service-Based Model to Dynamic Service-Deployment.