‘Highly skilled and dedicated software engineer and researcher with a focus on cybersecurity. Demonstrated expertise in developing secure applications for networked embedded devices, software-defined networks, and distributed systems. Experience in both freelance and research positions, contributing to EU-funded projects and consultancy engagements. Proficient in multiple programming languages, including Java and Golang, with a strong emphasis on secure coding practices and adherence to industry standards. Successfully led teams and made critical architectural decisions to ensure the security and integrity of software systems. Strong publication record with 13 journal and conference publications, showcasing a commitment to advancing knowledge in the field. A proactive and detail-oriented professional with a passion for creating innovative solutions and contributing to the cybersecurity domain.’
|
2022-2024
M.Sc. in informatics Engineers |
|
|
2006-2014
B.Sc. in Computer Science |
Worked as a freelance Senior Software Engineer, specializing in cybersecurity, for consultancy companies.
SPHYNX offers products and solutions, and consulting services, in the areas of cyber intelligence, analytics, incident response, assurance, and certification.
Dec 2016 - Mar 2020, Vassilika Vouton, GR-700 13 Heraklion, Crete, Greece
The Institute of Computer Science (ICS) is one the six institutes of the Foundation for Research and Technology - Hellas (FORTH), a major national research center partly funded by the General Secretariat for Research and Technology of the Hellenic Ministry of Education and Religious Affairs
The entire organization of the DGS group is devoted to building added value in response to customer needs: reliability of results, robustness of solutions, constant support over time, listening ability for sharing objectives and assuming responsibility, are the frame in the delivery of each of our projects. Capability and experience in developing the best application and technology architectures are the pillars on which we build comprehensive services of designing, realizing and supporting complex information systems and infrastructures.
BlueSoft delivers IT bespoke solutions for companies around the globe – impacting millions of people since 2002. From our HQ in Poland and office locations in the US and the UK, we cater bespoke solutions to enterprises across multiple industries.
Jan 2016 - Aug 2016,
The Telecommunication Systems Research Institute (T.S.I.) is a Greek Government-sponsored independent Research Institute established by the Greek Ministry of Education in 1995. T.S.I. operates within the framework of the Technical University of Crete (T.U.C.); however, it is an administratively independent and financially self-sustained entity mainly funded by external research contracts and grants.
The Technical University of Crete is particularly active in conducting basic and applied research.The research and development projects, managed by the Research Committee, are funded by the European Union, the General Secretariat for Research and Technology, the Ministry of Education, the Region of Crete, local administration organizations and many private businesses. A large number of TUC undergraduate and postgraduate students are employed in these projects; in this way, they benefit from the best possible training and they familiarize with conducting research.
Assisted in the creation of the project architecture. Lead a Work Package and contributed in writing deliverables and assisting in the project dissemination
Integrated state of the art components in order to provide security and privacy. Developed software components that are responsible to pseudoanonymise FHIR compliant data.
Platforms architecture and security related deliverables contribution. Responsible for the platforms security. Integrated state of the art components in order to provide security and privacy. Developed software components that are responsible to pseudoanonymise FHIR compliant data. Assisted in the devops.
Focused on assisting the creation of the project architecture. Lead a Work Package and contributed in writing deliverables and assisting in the project dissemination.
Focused on integrating the company’s platform in the projects platform at the pilot sites.
Contribution to projects deliverables. Assisting in project dissemination and in writing publications.
Contribution to projects deliverables. Assisting in project dissemination and in writing publications.
Contribution to projects deliverables. Assisting in project dissemination and in writing publications.
Contribution to projects deliverables. Assisting in project dissemination and in writing publications. Dissemination of the project in conferences.
Focused on the development and demonstration of an SDN & NFV ecosystem, based on an open, modular and secure framework, showcasing a prototype for intra-domain and inter-domain scenarios in real wind parks as a representative use case of industrial networks.
H2020 EU Framework Programme for Research and Innovation (H2020-ICT-2014-1 call). Focused on the design and implementation of a novel, comprehensible, ultra-fast, security-aware Cyber-Physical System simulator.
FP7 EU project (ARTEMIS-2010-1 call). Focused on the research of SPD (Security, Privacy, Dependability) in the context of Embedded Systems.
A bot written for retweeting in order to further extend the dissemination activities of the EU projects that I participate. Written in go.
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area….
Interoperability stands for the capacity of a system to interact with the units of another entity. Although it is quite easy to accomplish this within the products of the same brand, it is not facile to provide compatibility for the whole spectrum of the Internet-of-Things (IoT) and the Linked Data (LD) world….
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST….
Semantic interoperability is the designed property where various systems can interact with each other and exchange data with unambiguous, shared meaning. This enables knowledge discovery, machine computable reasoning and federation of different information systems…..
Achieving Security, Privacy, Dependability and Interoperability (SPDI) is of paramount importance for the ubiquitous deployment and impact maximization of Internet of Things (IoT) applications. Nevertheless, said requirements are not only difficult to achieve at system initialization, but also hard to prove and maintain at run-time….
The vast amount of connected devices on the Internet of Things (IoT) creates an enormous potential for new applications, by leveraging synergies arising through the convergence of consumer, business and industrial Internet, and creating open, global networks connecting people, data, and “things”…..
Day-by-day modern circular economy (CE) models gain ground and penetrate the traditional business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay of CE with healthcare. Novel services, like remote sensing, assisting of elder people, and e-visit, enhance the people’s health and convenience, while reducing the per-patient cost for the medical institutions…..
Botnets constitute nowadays one of the most dangerous security threats worldwide. High volumes of infected machines are controlled by a malicious entity and perform coordinated cyber-attacks. The problem will become even worse in the era of the Internet of Things (IoT) as the number of insecure devices is going to be exponentially increased. This paper presents WARDOG - an awareness and digital forensic system…..
Day-by-day modern circular economy (CE) models gain ground and penetrate the traditional business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay of CE with healthcare. Novel services, like remote sensing, assisting of elder people, and e-visit, enhance the people’s health and convenience, while reducing the per-patient cost for the medical institutions….
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment, the system becomes able to provide smart services (e.g. control lights, airconditioning, provide energy management services etc.). IoT is the main enabler of such environments….
Smart interconnected devices, including Cyber-Physical Systems (CPS), permeate our lives and are now an integral part of our daily activities, paving the way towards the Internet of Things (IoT). In the industrial domain, these devices interact with their surroundings and system operators, while often also integrating industrial cloud applications……
Computing devices permeate working and living environments, affecting all aspects of modern everyday lives; a trend which is expected to intensify in the coming years. In the residential setting, the enhanced features and services provided by said computing devices constitute what is typically referred to as a “smart home”….
Computing devices already permeate working and living environments, while researchers and engineers aim to exploit the potential of pervasive systems in order to introduce new types of services and address inveterate and emerging problems. This process will lead us eventually to the era of urban computing and the Internet of Things (IoT)…..
Ubiquitous devices comprising several resource-constrained sensors and actuators while having the long desired Internet connectivity, are becoming part of many solutions that seek to enhance user’s environment smartness and quality of living. Their intrinsic resource limitations however constitute critical requirements, such as security, a great challenge…..
As computing becomes ubiquitous, researchers and engineers aim to exploit the potential of the pervasive systems in order to introduce new types of services and address inveterate and emerging problems. This process will, eventually, lead us to the era of urban computing and the Internet of Things; the ultimate goal being to improve our quality of life….