default search action
Panagiotis Katsaros
Person information
- affiliation: Aristotle University of Thessaloniki, Greece
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j36]Konstantinos Mokos, Panagiotis Katsaros, Preben Bohn:
Model-based safety analysis of requirement specifications. J. Syst. Softw. 219: 112231 (2025) - 2024
- [j35]Charis Eleftheriadis, Andreas L. Symeonidis, Panagiotis Katsaros:
Adversarial robustness improvement for deep neural networks. Mach. Vis. Appl. 35(3): 35 (2024) - [c63]Klaus Havelund, Panagiotis Katsaros, Moran Omer, Doron Peled, Anastasios Temperekidis:
TP-DejaVu: Combining Operational and Declarative Runtime Verification. VMCAI (2) 2024: 249-263 - [i5]Mohamed Abdelsalam, Loai Ali, Saddek Bensalem, Weicheng He, Panagiotis Katsaros, Nikolaos Kekatos, Doron Peled, Anastasios Temperekidis, Changshun Wu:
A Digital Twin prototype for traffic sign recognition of a learning-enabled autonomous vehicle. CoRR abs/2402.09097 (2024) - 2023
- [c62]Mohamed Abdelsalam, Loai Ali, Saddek Bensalem, Weicheng He, Panagiotis Katsaros, Nikolaos Kekatos, Doron Peled, Anastasios Temperekidis, Changshun Wu:
A digital twin prototype for traffic sign recognition of a learning-enabled autonomous vehicle. PoEM Companion 2023 - [c61]Saddek Bensalem, Panagiotis Katsaros, Dejan Nickovic, Brian Hsuan-Cheng Liao, Ricardo Ruiz Nolasco, Mohamed Abd El Salam Ahmed, Tewodros A. Beyene, Filip Cano, Antoine Delacourt, Hasan Esen, Alexandru Forrai, Weicheng He, Xiaowei Huang, Nikolaos Kekatos, Bettina Könighofer, Michael Paulitsch, Doron Peled, Matthieu Ponchant, Lev Sorokin, Son Tong, Changshun Wu:
Continuous Engineering for Trustworthy Learning-Enabled Autonomous Systems. AISoLA 2023: 256-278 - [e3]Panagiotis Katsaros, Laura Nenzi:
Runtime Verification - 23rd International Conference, RV 2023, Thessaloniki, Greece, October 3-6, 2023, Proceedings. Lecture Notes in Computer Science 14245, Springer 2023, ISBN 978-3-031-44266-7 [contents] - 2022
- [j34]Konstantinos Mokos, Theodoros Nestoridis, Panagiotis Katsaros, Nick Bassiliades:
Semantic Modeling and Analysis of Natural Language System Requirements. IEEE Access 10: 84094-84119 (2022) - [j33]Theodoros Toliopoulos, Nikodimos Nikolaidis, Anna-Valentini Michailidou, Andreas Seitaridis, Theodoros Nestoridis, Chrysa Oikonomou, Anastasios Temperekidis, Fotios Gioulekas, Anastasios Gounaris, Nick Bassiliades, Panagiotis Katsaros, Apostolos Georgiadis, Fotios Liotopoulos:
Sboing4Real: A real-time crowdsensing-based traffic management system. J. Parallel Distributed Comput. 162: 59-75 (2022) - [j32]Konstantinos Strantzalis, Fotios Gioulekas, Panagiotis Katsaros, Andreas L. Symeonidis:
Operational State Recognition of a DC Motor Using Edge Artificial Intelligence. Sensors 22(24): 9658 (2022) - [c60]Saddek Bensalem, Chih-Hong Cheng, Xiaowei Huang, Panagiotis Katsaros, Adam Molin, Dejan Nickovic, Doron Peled:
Formal Specification for Learning-Enabled Autonomous Systems. NSV/FoMLAS@CAV 2022: 131-143 - [c59]Charis Eleftheriadis, Nikolaos Kekatos, Panagiotis Katsaros, Stavros Tripakis:
On Neural Network Equivalence Checking Using SMT Solvers. FORMATS 2022: 237-257 - [c58]Ioannis Kozaris, Fotios Gioulekas, Panagiotis Katsaros:
Resource-Constrained Image Processing for Scientific CubeSats. ICACS 2022: 14:1-14:6 - [c57]Jorge David de Hoz Diego, Anastasios Temperekidis, Panagiotis Katsaros, Charalambos Konstantinou:
An IoT Digital Twin for Cyber-Security Defence Based on Runtime Verification. ISoLA (1) 2022: 556-574 - [c56]Anastasios Temperekidis, Nikolaos Kekatos, Panagiotis Katsaros, Weicheng He, Saddek Bensalem, Hisham AbdElSabour, Mohamed Abdelsalam, Ashraf Salem:
Towards a Digital Twin Architecture with Formal Analysis Capabilities for Learning-Enabled Autonomous Systems. MESAS 2022: 163-181 - [c55]Anastasios Temperekidis, Nikolaos Kekatos, Panagiotis Katsaros:
Runtime Verification for FMI-Based Co-simulation. RV 2022: 304-313 - [i4]Charis Eleftheriadis, Nikolaos Kekatos, Panagiotis Katsaros, Stavros Tripakis:
On Neural Network Equivalence Checking using SMT Solvers. CoRR abs/2203.11629 (2022) - 2021
- [j31]Simon Bliudze, Panagiotis Katsaros, Saddek Bensalem, Martin Wirsing:
On methods and tools for rigorous system design. Int. J. Softw. Tools Technol. Transf. 23(5): 679-684 (2021) - [j30]Alexios Lekidis, Panagiotis Katsaros:
Energy characterization of IoT systems through design aspect monitoring. Int. J. Softw. Tools Technol. Transf. 23(5): 765-781 (2021) - 2020
- [j29]Konstantinos Mokos, Panagiotis Katsaros:
A survey on the formalisation of system requirements and their validation. Array 7: 100030 (2020) - [j28]Fotios Gioulekas, Peter Poplavko, Panagiotis Katsaros, Saddek Bensalem, Pedro Palomo:
Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems. Int. J. Softw. Tools Technol. Transf. 22(1): 3-32 (2020) - [j27]Fotios Gioulekas, Peter Poplavko, Panagiotis Katsaros, Saddek Bensalem, Pedro Palomo:
Correction to: Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems. Int. J. Softw. Tools Technol. Transf. 22(1): 33-34 (2020) - [c54]Theodoros Nestoridis, Chrysa Oikonomou, Anastasios Temperekidis, Fotios Gioulekas, Panagiotis Katsaros:
Scalable IoT architecture for balancing performance and security in mobile crowdsensing systems*. IoTSMS 2020: 1-8 - [c53]Eleni Zapridou, Ezio Bartocci, Panagiotis Katsaros:
Runtime Verification of Autonomous Driving Systems in CARLA. RV 2020: 172-183
2010 – 2019
- 2019
- [c52]Alexios Lekidis, Panagiotis Katsaros:
Model-Based Energy Characterization of IoT System Design Aspects. From Reactive Systems to Cyber-Physical Systems 2019: 165-180 - [c51]Stylianos Basagiannis, Panagiotis Katsaros:
Formal Verification of Network Interlocking Control by Distributed Signal Boxes. IMBSA 2019: 204-221 - [e2]Yiannis Papadopoulos, Koorosh Aslansefat, Panagiotis Katsaros, Marco Bozzano:
Model-Based Safety and Assessment - 6th International Symposium, IMBSA 2019, Thessaloniki, Greece, October 16-18, 2019, Proceedings. Lecture Notes in Computer Science 11842, Springer 2019, ISBN 978-3-030-32871-9 [contents] - 2018
- [j26]George Chatzieleftheriou, Panagiotis Katsaros:
Abstract model repair for probabilistic systems. Inf. Comput. 259(1): 142-160 (2018) - [j25]Nikolaos Vesyropoulos, Christos K. Georgiadis, Panagiotis Katsaros:
Ensuring business and service requirements in enterprise mashups. Inf. Syst. E Bus. Manag. 16(1): 205-242 (2018) - [j24]Ayoub Nouri, Peter Poplavko, Lefteris Angelis, Alexandros Zerzelidis, Saddek Bensalem, Panagiotis Katsaros:
Maximal software execution time: a regression-based approach. Innov. Syst. Softw. Eng. 14(2): 101-116 (2018) - [j23]Emmanouela Stachtiari, Panagiotis Katsaros:
Compositional execution semantics for business process verification. J. Syst. Softw. 137: 217-238 (2018) - [j22]Emmanouela Stachtiari, Anastasia Mavridou, Panagiotis Katsaros, Simon Bliudze, Joseph Sifakis:
Early validation of system requirements and design through correctness-by-construction. J. Syst. Softw. 145: 52-78 (2018) - [j21]Sotirios Gyftopoulos, Pavlos S. Efraimidis, Panagiotis Katsaros:
Formal analysis of DeGroot Influence Problems using probabilistic model checking. Simul. Model. Pract. Theory 89: 144-159 (2018) - [j20]Alexios Lekidis, Emmanouela Stachtiari, Panagiotis Katsaros, Marius Bozga, Christos K. Georgiadis:
Model-based design of IoT systems with the BIP component framework. Softw. Pract. Exp. 48(6): 1167-1194 (2018) - [c50]Fotios Gioulekas, Peter Poplavko, Panagiotis Katsaros, Saddek Bensalem, Pedro Palomo:
A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism. FASE 2018: 94-110 - [c49]Alexios Lekidis, Panagiotis Katsaros:
Model-Based Design of Energy-Efficient Applications for IoT Systems. MeTRiD@ETAPS 2018: 24-38 - [c48]Fotios Gioulekas, Peter Poplavko, Panagiotis Katsaros, Pedro Palomo:
Process Network Models for Embedded System Design Based on the Real-Time BIP Execution Engine. MeTRiD@ETAPS 2018: 79-92 - 2017
- [j19]Athanasios Naskos, Anastasios Gounaris, Panagiotis Katsaros:
Cost-aware horizontal scaling of NoSQL databases using probabilistic model checking. Clust. Comput. 20(3): 2687-2701 (2017) - [j18]George Stergiopoulos, Panayiotis Katsaros, Dimitris Gritzalis:
Program analysis with risk-based classification of dynamic invariants for logical error detection. Comput. Secur. 71: 36-50 (2017) - [j17]Athanasios Naskos, Anastasios Gounaris, Haralambos Mouratidis, Panagiotis Katsaros:
Security-aware elasticity for NoSQL databases in multi-cloud environments. Int. J. Intell. Inf. Database Syst. 10(3/4): 168-190 (2017) - [c47]Maria Ntogramatzi, Panagiotis Katsaros, Spyridon Nikolaidis:
Cache activity profiling tool for the LEON4 processor. MOCAST 2017: 1-4 - [c46]Fotios Gioulekas, Peter Poplavko, Rany Kahil, Panagiotis Katsaros, Marius Bozga, Saddek Bensalem, Pedro Palomo:
Design of Embedded Systems with Complex Task Dependencies and Shared Resource Interference (Short Paper). SEFM 2017: 401-407 - [c45]Peter Poplavko, Ayoub Nouri, Lefteris Angelis, Alexandros Zerzelidis, Saddek Bensalem, Panagiotis Katsaros:
Regression-Based Statistical Bounds on Software Execution Time. VECoS 2017: 48-63 - 2016
- [j16]Athanasios Naskos, Anastasios Gounaris, Haralambos Mouratidis, Panagiotis Katsaros:
Online Analysis of Security Risks in Elastic Cloud Applications. IEEE Cloud Comput. 3(5): 26-33 (2016) - [c44]George Kakarontzas, Konstantinos Mokos, Panagiotis Katsaros, Ioannis Stamelos:
OPEN-SME - Component Certification for Open Source Reuse. EPS 2016 - [c43]Anastasia Mavridou, Emmanouela Stachtiari, Simon Bliudze, Anton B. Ivanov, Panagiotis Katsaros, Joseph Sifakis:
Architecture-Based Design: A Satellite On-Board Software Case Study. FACS 2016: 260-279 - [c42]Sotirios Gyftopoulos, Pavlos S. Efraimidis, Panagiotis Katsaros:
Solving Influence Problems on the DeGroot Model with a Probabilistic Model Checking Tool. PCI 2016: 31 - [c41]George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions. SECRYPT 2016: 28-40 - 2015
- [j15]George Chatzieleftheriou, Borzoo Bonakdarpour, Panagiotis Katsaros, Scott A. Smolka:
Abstract Model Repair. Log. Methods Comput. Sci. 11(3) (2015) - [c40]Athanasios Naskos, Emmanouela Stachtiari, Anastasios Gounaris, Panagiotis Katsaros, Dimitrios Tsoumakos, Ioannis Konstantinou, Spyros Sioutas:
Dependable Horizontal Scaling Based on Probabilistic Model Checking. CCGRID 2015: 31-40 - [c39]George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis:
Execution Path Classification for Vulnerability Analysis and Detection. ICETE (Selected Papers) 2015: 293-317 - [c38]Athanasios Naskos, Anastasios Gounaris, Haralambos Mouratidis, Panagiotis Katsaros:
Security-Aware Elasticity for NoSQL Databases. MEDI 2015: 181-197 - [c37]Athanasios Naskos, Emmanouela Stachtiari, Panagiotis Katsaros, Anastasios Gounaris:
Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources. RV 2015: 275-280 - [c36]George Stergiopoulos, Panagiotis Petsanas, Panagiotis Katsaros, Dimitris Gritzalis:
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position. SECRYPT 2015: 100-111 - [c35]Alexios Lekidis, Emmanouela Stachtiari, Panagiotis Katsaros, Marius Bozga, Christos K. Georgiadis:
Using BIP to reinforce correctness of resource-constrained IoT applications. SIES 2015: 245-253 - 2014
- [j14]Marco Bozzano, Alessandro Cimatti, Joost-Pieter Katoen, Panagiotis Katsaros, Konstantinos Mokos, Viet Yen Nguyen, Thomas Noll, Bart Postma, Marco Roveri:
Spacecraft early design validation using formal methods. Reliab. Eng. Syst. Saf. 132: 20-35 (2014) - [c34]George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis:
Automated Detection of Logical Errors in Programs. CRiSIS 2014: 35-51 - [c33]Tushar Deshpande, Panagiotis Katsaros, Scott A. Smolka, Scott D. Stoller:
Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model Checking. EDCC 2014: 226-237 - [c32]George Chatzieleftheriou, Apostolos Chatzopoulos, Panagiotis Katsaros:
Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities II - (Extended Abstract). ISoLA (2) 2014: 486-488 - [c31]Kostantinos Stroggylos, Dimitris Mitropoulos, Zacharias Tzermias, Panagiotis Papadopoulos, Fotios Rafailidis, Diomidis Spinellis, Sotiris Ioannidis, Panagiotis Katsaros:
Securing Legacy Code with the TRACER Platform. Panhellenic Conference on Informatics 2014: 26:1-26:6 - [c30]Emmanouela Stachtiari, Nikos Vesyropoulos, George Kourouleas, Christos K. Georgiadis, Panagiotis Katsaros:
Correct-by-Construction Web Service Architecture. SOSE 2014: 47-58 - [c29]Kostantinos Stroggylos, Dimitris Mitropoulos, Zacharias Tzermias, Panagiotis Papadopoulos, Fotios Rafailidis, Diomidis Spinellis, Sotiris Ioannidis, Panagiotis Katsaros:
TRACER: A Platform for Securing Legacy Code. TRUST 2014: 218-219 - [e1]Antonio Cerone, Donatella Persico, Sara Fernandes, Alexeis Garcia-Perez, Panagiotis Katsaros, Siraj Ahmed Shaikh, Ioannis Stamelos:
Information Technology and Open Source: Applications for Education, Innovation, and Sustainability - SEFM 2012 Satellite Events, InSuEdu, MoKMaDS, and OpenCert, Thessaloniki, Greece, October 1-2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7991, Springer 2014, ISBN 978-3-642-54337-1 [contents] - [i3]Athanasios Naskos, Emmanouela Stachtiari, Anastasios Gounaris, Panagiotis Katsaros, Dimitrios Tsoumakos, Ioannis Konstantinou, Spyros Sioutas:
Cloud elasticity using probabilistic model checking. CoRR abs/1405.4699 (2014) - 2013
- [c28]Dimitris Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, Panajotis Katsaros, Anakreon Mentis:
The Sphinx enigma in critical VoIP infrastructures: Human or botnet? IISA 2013: 1-6 - [c27]Fotios Rafailidis, Ioannis Panagos, Panagiotis Katsaros, Alexandros Arvanitidis:
Inlined monitors for security policy enforcement in web applications. Panhellenic Conference on Informatics 2013: 75-82 - 2012
- [j13]Anakreon Mentis, Panagiotis Katsaros:
Model checking and code generation for transaction processing software. Concurr. Comput. Pract. Exp. 24(7): 711-722 (2012) - [j12]Theodosios Tsiakis, Panagiotis Katsaros, Dimitris Gritzalis:
Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services. Int. J. Electron. Secur. Digit. Forensics 4(2/3): 164-177 (2012) - [j11]Dimitris Gritzalis, Panagiotis Katsaros, Stylianos Basagiannis, Yannis Soupionis:
Formal analysis for robust anti-SPIT protection using model checking. Int. J. Inf. Sec. 11(2): 121-135 (2012) - [j10]Anakreon Mentis, Panagiotis Katsaros, Lefteris Angelis:
A simulation process for asynchronous event processing systems: Evaluating performance and availability in transaction models. Simul. Model. Pract. Theory 29: 66-77 (2012) - [c26]Emmanouela Stachtiari, Yannis Soupionis, Panagiotis Katsaros, Anakreontas Mentis, Dimitris Gritzalis:
Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection. CRITIS 2012: 143-154 - [c25]Emmanouela Stachtiari, Anakreon Mentis, Panagiotis Katsaros:
Rigorous Analysis of Service Composability by Embedding WS-BPEL into the BIP Component Framework. ICWS 2012: 319-326 - [c24]George Chatzieleftheriou, Borzoo Bonakdarpour, Scott A. Smolka, Panagiotis Katsaros:
Abstract Model Repair. NASA Formal Methods 2012: 341-355 - 2011
- [j9]Stylianos Basagiannis, Sophia G. Petridou, Nikolaos Alexiou, Georgios I. Papadimitriou, Panagiotis Katsaros:
Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach. Comput. Secur. 30(4): 257-272 (2011) - [j8]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
Synthesis of attack actions using model checking for the verification of security protocols. Secur. Commun. Networks 4(2): 147-161 (2011) - [c23]George Chatzieleftheriou, Panagiotis Katsaros:
Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities. COMPSAC Workshops 2011: 96-103 - [c22]Vasilios Katos, Dimitris Vrakas, Panagiotis Katsaros:
A Framework for Access Control with Inference Constraints. COMPSAC 2011: 289-297 - [c21]Tushar Deshpande, Panagiotis Katsaros, Stylianos Basagiannis, Scott A. Smolka:
Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking. HASE 2011: 360-367 - [c20]Theodosios Tsiakis, Panagiotis Katsaros, Dimitris Gritzalis:
Economic Evaluation of Interactive Audio Media for Securing Internet Services. ICGS3/e-Democracy 2011: 46-53 - [c19]Sophia G. Petridou, Stylianos Basagiannis, Nikolaos Alexiou, Georgios I. Papadimitriou, Panagiotis Katsaros:
Quantitative model checking of an RSA-based email protocol on mobile devices. ISCC 2011: 639-645 - [c18]George Kakarontzas, Vassilis C. Gerogiannis, Ioannis Stamelos, Panagiotis Katsaros:
Elastic Component Characterization with Respect to Quality Properties: An Intuitionistic Fuzzy-Based Approach. Panhellenic Conference on Informatics 2011: 270-274 - [c17]Ezio Bartocci, Radu Grosu, Panagiotis Katsaros, C. R. Ramakrishnan, Scott A. Smolka:
Model Repair for Probabilistic Systems. TACAS 2011: 326-340 - 2010
- [j7]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
An intruder model with message inspection for model checking security protocols. Comput. Secur. 29(1): 16-34 (2010) - [j6]George Kakarontzas, Panagiotis Katsaros, Ioannis Stamelos:
Component Certification as a Prerequisite forWidespread OSS Reuse. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 33 (2010) - [j5]Anakreon Mentis, Panagiotis Katsaros, Lefteris Angelis, George Kakarontzas:
Quantification of interacting runtime qualities in software architectures: Insights from transaction processing in client-server architectures. Inf. Softw. Technol. 52(12): 1331-1345 (2010) - [c16]Yannis Soupionis, Stylianos Basagiannis, Panagiotis Katsaros, Dimitris Gritzalis:
A Formally Verified Mechanism for Countering SPIT. CRITIS 2010: 128-139 - [c15]Konstantinos Mokos, Georgios Meditskos, Panagiotis Katsaros, Nick Bassiliades, Vangelis Vasiliades:
Ontology-Based Model Driven Engineering for Safety Verification. EUROMICRO-SEAA 2010: 47-54 - [c14]Nikolaos Alexiou, Stylianos Basagiannis, Panagiotis Katsaros, Tushar Deshpande, Scott A. Smolka:
Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking. HASE 2010: 94-103
2000 – 2009
- 2009
- [j4]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou:
Probabilistic model checking for the quantification of DoS security threats. Comput. Secur. 28(6): 450-465 (2009) - [j3]Panagiotis Katsaros:
A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach. Inf. Softw. Technol. 51(2): 235-257 (2009) - [c13]Anakreon Mentis, Panagiotis Katsaros, Lefteris Angelis:
Synthetic Metrics for Evaluating Runtime Quality of Software Architectures with Complex Tradeoffs. EUROMICRO-SEAA 2009: 237-242 - [c12]Anakreon Mentis, Panagiotis Katsaros:
The ACID model checker and code generator for transaction processing. HPCS 2009: 138-144 - [i2]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
Attacking an OT-Based Blind Signature Scheme. CoRR abs/0906.2947 (2009) - [i1]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
State Space Reduction with Message Inspection in Security Protocol Model Checking. CoRR abs/0909.0174 (2009) - 2008
- [c11]Vasilios Almaliotis, Alexandros Loizidis, Panagiotis Katsaros, Panagiotis Louridas, Diomidis Spinellis:
Static Program Analysis for Java Card Applets. CARDIS 2008: 17-31 - [c10]George Kakarontzas, Ioannis Stamelos, Panagiotis Katsaros:
Product Line Variability with Elastic Components and Test-Driven Development. CIMCA/IAWTIC/ISE 2008: 146-151 - [c9]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou:
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. COMPSAC 2008: 12-19 - [c8]Konstantinos Mokos, Panagiotis Katsaros, Nick Bassiliades, Vangelis Vassiliadis, Maxime Perrotin:
Towards Compositional Safety Analysis via Semantic Representation of Component Failure Behaviour. JCKBSE 2008: 405-414 - 2007
- [j2]Panagiotis Katsaros, Lefteris Angelis, Constantine Lazos:
Performance and effectiveness trade-off for checkpointing in fault-tolerant distributed systems. Concurr. Comput. Pract. Exp. 19(1): 37-63 (2007) - [c7]George Kakarontzas, Panagiotis Katsaros, Ioannis Stamelos:
Elastic Components: Addressing Variance of Quality Properties in Components. EUROMICRO-SEAA 2007: 31-38 - [c6]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. SAFECOMP 2007: 238-251 - 2006
- [j1]Panagiotis Katsaros, Nantia Iakovidou, Theodoros Soldatos:
Evaluation of composite object replication schemes for dependable server applications. Inf. Softw. Technol. 48(9): 795-806 (2006) - [c5]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
Interlocking Control by Distributed Signal Boxes: Design and Verification with the SPIN Model Checker. ISPA 2006: 317-328 - 2005
- [c4]Panagiotis Katsaros:
On the Design of Access Control to Prevent Sensitive Information Leakage in Distributed Object Systems: A Colored Petri Net Based Model. OTM Conferences (2) 2005: 941-959 - 2004
- [c3]Panagiotis Katsaros, Constantine Lazos:
Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed Systems. DSN 2004: 762-771 - 2002
- [b1]Panagiotis Katsaros:
Κατανεμημένα υπολογιστικά συστήματα. Aristotle University Of Thessaloniki, Greece, 2002 - 2001
- [c2]Panajotis Katsaros, Constantine Lazos:
Steady state simulations on queuing processes in parallel time streams: Problems and potentialities. HERCMA 2001: 370-376 - 2000
- [c1]Panajotis Katsaros, Constantine Lazos:
Regenerative queuing network distributed simulation. ESM 2000: 109-113
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint