View by year: 1999 - 2003 2004 2005 2006 2007 2008 2009
  2010 2011 2012 2013 2014 2015 All
Keyword:  model checking static analysis simulation software quality & testing software architecture service systems

Journal Publications (in reverse chronological order)

J23. Stachtiari, E., Katsaros, P., Compositional execution semantics for business process verification, (To appear in) Journal of Systems and Software, Elsevier, 2018
Keywords: business processes, web services, verification
J22. Vesyropoulos, N., Georgiadis, C. K., Katsaros, P., Ensuring business and service requirements in enterprise mashups, (To appear in) Information Systems and e-Business Management, Springer, 2017
(online: http://doi.org/10.1007/s10257-017-0363-x)
Keywords: business processes, web services, verification
J21. Naskos, A., Gounaris, A., Katsaros, P., Cost-aware horizontal scaling of NoSQL databases using probabilistic model checking, Cluster Computing, Vol. 20 (3), 2687-2701, Springer, 2017
(online: http://doi.org/10.1007/s10586-017-0816-5)
Keywords: cloud, horizontal scaling, probabilistic model checking
J20. Stergiopoulos G., Katsaros P., Gritzalis D., Program analysis with risk-based classification of dynamic invariants for logical error detection, Computers & Security, Vol. 71, 36-50, Elsevier, 2017
(online: http://doi.org/10.1016/j.cose.2017.02.007)
Keywords: logical errors, dynamic analysis, symbolic execution
J19. Naskos, A., Gounaris, A., Mouratidis, H., Katsaros, P., Security-aware elasticity for NoSQL databases in multi-cloud environments, International Journal of Intelligent Information and Database Systems, Vol. 10 (3-4), 168-190, Inderscience Publishers, 2017
(online: http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijiids)
Keywords: security-aware elasticity, horizontal scaling, probabilistic model checking
J18. Naskos, A., Gounaris, A., Mouratidis, H., Katsaros, P., Online analysis of security risks in elastic cloud applications, IEEE Cloud Computing Magazine, Vol. 3 (5), 26-33, 2016
(online: http://doi.org/10.1109/MCC.2016.108)
Keywords: cloud, security, probabilistic model checking
J17. Chatzieleftheriou, G., Bonakdarpour, B., Katsaros, P., Smolka, S., Abstract Model Repair, Logical Methods in Computer Science, Vol. 11 (3), Paper 11, 2015
(online: http://dx.doi.org/10.2168/LMCS-11(3:11)2015)
Keywords: model repair, abstraction - refinement
J16. Bozzano, M., Cimatti, A., Katoen, J.-P., Katsaros, P., Mokos, K., Nguyen V. Y., Noll, T., Postmac, B., Roveri, M., Spacecraft early design validation using formal methods, Reliability Engineering and System Safety, Vol. 132, 20-35, Elsevier, 2014
(online: http://dx.doi.org/10.1016/j.ress.2014.07.003)
Keywords: safety & dependability analysis, performance analysis, model checking, spacecraft
J15. Mentis, A., Katsaros, P., Angelis, L., A simulation process for asynchronous event processing systems: evaluating performance and availability in transaction models, Simulation Modelling Practice and Theory, Vol. 29, 66-77, Elsevier, 2012
(online: http://dx.doi.org/10.1016/j.simpat.2012.07.007)
Keywords: asynchronous event processing, simulation, performance evaluation, model checking, transaction processing
J14. Tsiakis, T., Katsaros, P., Gritzalis, D., Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services, Int. J. Electronic Security and Digital Forensics, Vol. 4 (2-3), 164-177, Inderscience Publishers, 2012
Keywords: security economics, spam, internet services
J13. Mentis, A., Katsaros, P., Model checking and code generation for transaction processing software, Concurrency and Computation: Practice and Experience, Vol. 24 (7), 711-722, John Wiley & Sons, 2012
(online: http://dx.doi.org/10.1002/cpe.1876)
Keywords: model checking, transaction processing
J12. Gritzalis, D., Katsaros, P., Basagiannis, S., Soupionis, Y., Formal analysis for robust anti-SPIT protection using model-checking, International Journal of Information Security, Vol. 11 (2), 121-135, Springer, 2012
(online: http://dx.doi.org/10.1007/s10207-012-0159-4)

Keywords: SPam over Internet Telephony, Session Initiation Protocol, model checking, security policies
J11. Basagiannis, S., Petridou, S., Alexiou, N., Papadimitriou, G., Katsaros, P., Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach, Computers & Security, Vol. 30 (4), 257-272, Elsevier, 2011
(online: http://dx.doi.org/10.1016/j.cose.2011.02.001)

Keywords: security protocols, probabilistic model checking, mobile computing
J10. Basagiannis, S., Katsaros, P., Pombortsis, A., Synthesis of attack actions using model checking for the verification of security protocols, Security and Communication Networks, Vol. 4 (2), 147-161, John Wiley & Sons, 2011
(
online: http://dx.doi.org/10.1002/sec.119)
Keywords: security protocols, intruder modeling, model checking
J9. Kakarontzas, G., Katsaros, P., Stamelos, I., Component Certification as a Prerequisite for Widespread OSS Reuse, Electronic Communications of the European Association of Software Science and Technology (EASST), Vol. 33: Foundations and Techniques for Open Source Software Certification, 2010
Keywords: component certification, open source software reuse, component-based development
J8. Mentis, A., Katsaros, P., Angelis, L., Kakarontzas, G., Quantification of interacting runtime qualities in software architectures: insights from transaction processing in client-server architectures, Information and Software Technology, Vol. 52 (12), 1331-1345, Elsevier, 2010
(online:
http://dx.doi.org/10.1016/j.infsof.2010.07.006)
Keywords: software architecture validation, software quality, design tradeoffs,
transaction processing, simulation
J7. Basagiannis, S., Katsaros, P., Pombortsis, A., An intruder model with Message Inspection for model checking security protocols, Computers & Security, Vol. 29 (1), 16-34, Elsevier, 2010
(online: http://dx.doi.org/10.1016/j.cose.2009.08.003)
Keywords: security protocols, verification, model checking, intrusion attacks, formal analysis
J6. Basagiannis, S., Katsaros, P., Pombortsis, A., Alexiou, N., Probabilistic model checking for the quantification of DoS security threats, Computers & Security, Vol. 28 (6), 450-465, Elsevier, 2009
(online: http://dx.doi.org/10.1016/j.cose.2009.01.002)
Keywords:
denial of service, secure authentication, probabilistic model checking, resource exhaustion, attacker model
J5. Katsaros, P., A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach, Information and Software Technology, Vol. 51 (2), 235-257, Elsevier, 2009
(online:
http://dx.doi.org/10.1016/j.infsof.2008.01.005)
Keywords:
electronic payments, atomicity, fault tolerance, e-commerce transactions, security, Colored Petri-Nets, model checking
J4. Katsaros, P., Angelis, L. and Lazos, C., Performance and effectiveness trade-off for checkpointing in fault tolerant distributed systems, Concurrency and Computation: Practice and Experience, Vol. 19 (1), 37-63, John Wiley & Sons, 2007
(online:
http://dx.doi.org/10.1002/cpe.1059)
Keywords:
checkpointing & recovery, fault tolerance, distributed systems, performance evaluation, statistical analysis
J3. Katsaros, P., Iakovidou, N. and Soldatos, T., Evaluation of composite object replication schemes for dependable server applications, Information and Software Technology, Vol. 48 (9), 795-806, Elsevier, 2006
(online:
http://dx.doi.org/10.1016/j.infsof.2005.10.004)
Keywords:
fault tolerance, performance, quality of service, distributed objects, simulation
J2. Katsaros, P. and Lazos, C., A simulation test-bed for the design of dependable e-services, WSEAS Transactions on Computers, WSEAS Press, Vol. 4/2, 915-919, 2003
Keywords:
simulation, quality of service, fault tolerance, load distribution, state transfer& recovery, performance evaluation, distributed objects, e-services
J1. Katsaros, P. and Lazos, C., A technique for determining queuing network simulation length based on desired accuracy, International Journal of Computer Systems Science and Engineering, Vol. 15 (6), CRL Publishing, 399-404, 2000
Keywords:
queuing networks, simulation, regenerative method

Book Chapters (in reverse chronological order) 

BC3. Loizidis, A., Almaliotis, V., Katsaros, P., Static Program Analysis of Multi-Applet JavaCard Applications, Software Engineering for Secure Systems: Industrial and Research Perspectives, Ed. by H. Mouratidis (Un. of East London, UK), IGI Global, 286-304 (online: http://www.igi-global.com/Bookstore/Chapter.aspx?TitleId=48414), 2011
Keywords: static program analysis, security verification, information flow, temporal safety, taint analysis
BC2. Katsaros, P., Lazos, C., Regenerative estimation variants of response times in closed networks of queues, Advances in Multimedia, Video and Signal Processing Systems, Ed. by N. E. Mastorakis & V. V. Kluev, Electrical and Computer Engineering Series, WSEAS Press, 274-279, 2002
Keywords:
queuing networks, regenerative method, simulation output analysis, sequential control, coverage analysis
BC1. Stamelos, J., Refanidis, J., Katsaros, P., Tsoukias, A., Vlahavas, J., Pombortsis, A., An adaptable framework for educational software evaluation, Decision Making: Recent Developments and Worldwide Applications, Ed. by Zanakis & Doukidis, Applied Optimization Vol. 45, 347-360, Kluwer Academics, 2000
Keywords:
software evaluation, educational software, MCDA

Articles in Conference Proceedings (in reverse chronological order)



C62. Poplavko, P., Nouri, A., Angelis, L., Zerzelidis, A., Bensalem, S., Katsaros, P. Regression-based Statistical Bounds on Software Execution Time, In Proceedings of the 11th International Conference on Verification and Evaluation of Computer and Communication Systems (VECoS 2017), Montreal, Canada, Springer Verlag, 2017
Keywords:  Maximal Execution Time, timing analysis
, measurement-based, WCET


C61. Gioulekas, F., Poplavko, P., Kahil, R., Katsaros, P., Bozga, M., Bensalem, S., Palomo, P. Design of embedded systems with complex task dependencies and shared resource interference (Short Paper), In Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM 2017), Trento, Italy, LNCS 10469, Springer Verlag, 2017
Keywords:  model-based design, embedded systems, multi-cores



C60. Mavridou, A., Stachtiari, E., Bliudze, S., Ivanov, A., Katsaros, P., Sifakis, J. Architecture-based design: a satellite on-board software case study, In Proceedings of the 13th International Conference on Formal Aspects of Component Software (FACS 2016), Besançon, France, LNCS 10231, 260-279, Springer Verlag, 2016
(online: http://doi.org/10.1007/978-3-319-57666-4_16)
Online Technical Report (extended version)
Keywords:  on-board software,
satellite, architecture, correctness by construction

C59. Gyftopoulos, S., Efraimidis, P., Katsaros, P. Solving influence problems on the DeGroot model with a probabilistic model checking tool, In Proceedings of the 20th Pan-Hellenic Conference on Informatics (PCI 2016), Article No. 31, Patras, Greece, ACM, 2016
(online: http://doi.org/10.1145/3003733.3003780)
Keywords: opinion diffusion, stochastic games
, probabilistic model checking  


C58. Stergiopoulos, G., Katsaros, P., Gritzalis, D., Apostolopoulos, T. Combining invariant violation with execution path classification for detecting multiple types of logical errors and race conditions, In Proceedings of the 13th International Joint Conference on e-Busines and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, SCITEPRESS, 28-40, 2016
(online: http://dx.doi.org/10.5220/0005947200280040)
Keywords:
logical errors, static analysis, dynamic analysis  


C57. Katsaros, P., Bassiliades, N., Vlahavas, I., The Organon and the logic perspective of computation, In Proceedings of the World Congress “Aristotle 2400 Years”, Thessaloniki, Greece, 2016
Keywords: logic, deduction, computation


C56. Naskos, A., Gounaris, A., Mouratidis, H., Katsaros, P. Security-aware elasticity for NoSQL databases, In Proceedings of the 5th International Conference on Model & Data Engineering (MEDI), Rhodes, Greece, LNCS 9344, 181-197, Springer Verlag, 2015
(online: http://dx.doi.org/10.1007/978-3-319-23781-7_15)
Keywords:
cloud, security, probabilistic model checking  

C55. Naskos, A., Stachtiari, E., Katsaros, P., Gounaris, A. Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources, In Proceedings of the 15th International Conference on Runtime Verification (RV), Vienna, Austria, LNCS 9333, 275-280, Springer Verlag, 2015
(online: http://dx.doi.org/10.1007/978-3-319-23820-3_18)
Keywords:
cloud, probabilistic model checking  

C54. Stergiopoulos, G., Petsanas, P., Katsaros, P., Gritzalis, D. Automated exploit detection using path profiling: the disposition should matter, not the position, In Proceedings of the 12th International Conference on Security and Cryptography (SECRYPT), Colmar, Alsace, France, 100-111, 2015
(online: http://dx.doi.org/10.5220/0005561101000111)
Keywords: source code profiling, logical errors, static analysis, dynamic analysis  
C53. Naskos, A., Stachtiari, E., Gounaris, A., Katsaros, P., Tsoumakos, D., Konstantinou, I., Sioutas, S. Dependable horizontal scaling based on probabilistic model checking, In Proceedings of the 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Shenzhen, Guangdong, China, 31-40, 2015
(online: http://dx.doi.org/10.1109/CCGrid.2015.91)
Keywords: cloud, probabilistic model checking  
C52. Lekidis, A., Stachtiari, E., Katsaros, P., Bozga, M., Georgiadis, C.-K. Using BIP to reinforce correctness of resource-constrained IoT applications, In Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems (SIES), Siegen, Germany, 245-253, 2015
(online: http://dx.doi.org/10.1109/SIES.2015.7185066)
Keywords: rigorous design, Internet of Things, web services  
C51. Stergiopoulos, G., Katsaros, P., Gritzalis, D. Automated detection of logical errors in programs, In Proceedings of the 9th International Conference on Risks and Security of Internet and Systems (CRiSIS), Trento, Italy, LNCS 8924, 35-51, Springer Verlag, 2015
(online: http://dx.doi.org/10.1007/978-3-319-17127-2_3)
Keywords: source code profiling, logical errors, static analysis, dynamic analysis
 
C50. Chatzieleftheriou, G., Chatzopoulos, A., Katsaros, P. Test-Driving Static Analysis Tools in Search of C Code Vulnerabilities II (Extended Abstract), In Proceedings of the 6th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISOLA), Corfu, Greece, LNCS 8803, 486-488, Springer Verlag, 2014
(online: http://dx.doi.org/10.1007/978-3-662-45231-8_39)
Keywords: static analysis, software security, benchmark tests
C49. Stroggylos, K., Mitropoulos, D., Tzermias, D., Papadopoulos, P., Rafailidis, F., Spinellis, D., Ioannidis, S., Katsaros, P. Securing Legacy Code with the TRACER Platform, In Proceedings of the 18th Panhellenic Conference on Informatics (PCI), Athens, Greece, 26:1--26:6, ACM, 2014
(online: http://doi.acm.org/10.1145/2645791.2645796)
Keywords: static analysis, software security
 
C48. Stroggylos, K., Mitropoulos, D., Tzermias, D., Papadopoulos, P., Rafailidis, F., Spinellis, D., Ioannidis, S., Katsaros, P. TRACER: A Platform for Securing Legacy Code, In Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST), Heraklion, Greece, LNCS 8564, 218-219, Springer Verlag, 2014
(online: http://dx.doi.org/10.1007/978-3-319-08593-7_20)
Keywords: static analysis, software security  
 
C47. Stergiopoulos, G., Katsaros, P., Gritzalis, D. Source code profiling and classification for automated detection of logical errors, In Proceedings of the 3rd International Seminar on Program Verification, Automated Debugging and Symbolic Computation (PAS), Vienna, Austria, 2014
Keywords: source code profiling, logical errors, static analysis, dynamic analysis
 
C46. Deshpande, T., Katsaros, P., Smolka, S., Stoller, S. Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model Checking, In Proceedings of the 10th European Dependable Computing Conference (EDCC), Newcastle, UK, IEEE, 226-237, 2014
(online: http://dx.doi.org/10.1109/EDCC.2014.37)
Keywords: bandwidth amplification attack, probabilistic model checking, stochastic games
 
C45. Stachtiari, E., Vesyropoulos, N., Kourouleas, G., Georgiadis, C., Katsaros, P. Correct-by-Construction Web Service Architecture, In Proceedings of the 8th Int. Symposium on Service-Oriented System Engineering (SOSE), Oxford, UK, IEEE, 47-58, 2014
(online: http://dx.doi.org/10.1109/SOSE.2014.12)
Keywords: Service-Oriented Architecture, rigorous design, web services, correctness-by-construction
 
C44. Berger, C., Katsaros, P., Bohlouli , M., Angelis, L. An interdisciplinary perspective to the design and decision support of integral safety systems, In Proceedings of the 4th IFAC Workshop on Dependable Control of Discrete Systems (DCDS 2013), York, UK, IFAC Proceedings Volumes (IFAC-PapersOnline), Vol. 4, Part 1, 145-150, 2013
(online: http://dx.doi.org/10.3182/20130904-3-UK-4041.00045)
Keywords: active control, safety, sensor systems, formal verification
 
C43. Rafailidis, F., Panagos, I., Arvanitidis, A., Katsaros, P. Inlined monitors for security policy enforcement in Web applications, In Proceedings of the 17th Panhellenic Conference on Informatics (PCI 2013), Thessaloniki, Greece, ACM, 75-82, 2013
(online: http://dx.doi.org/10.1145/2491845.2491861) BEST PAPER AWARD
Keywords:
security policy, runtime monitoring, web applications
C42. Gritzalis, D., Soupionis, Y., Katos, V., Psaroudakis, I., Katsaros, P., Mentis, A. The SPHINX Enigma in Critical VoIP Infrastructures: Human or Botnet?, In Proceedings of the 4th Int. Conference on Information, Intelligence, Systems and Applications (IISA 2013), Piraeus, Greece, 2013
(online: http://dx.doi.org/10.1109/IISA.2013.6623704)
Keywords:
VoIP, CAPTCHA, model checking
C41. Stachtiari, E., Soupionis, Y., Katsaros, P., Mentis, A., Gritzalis, D. Probabilistic model checking of CAPTCHA admission control for DoS resistant anti-SPIT protection, In Proceedings of the 7th Int. Conference on Critical Information Infrastructures Security (CRITIS 2012), Lillehammer, Norway, LNCS 7722, 143-154, Springer Verlag, 2013
(online: http://dx.doi.org/10.1007/978-3-642-41485-5_13)

Keywords: a
dmission control, denial of service, CAPTCHA, probabilistic model checking
C40. Stachtiari, E., Mentis, A., Katsaros, P., Rigorous analysis of service composability by embedding WS-BPEL into the BIP component framework, In Proceedings of the 19th IEEE International Conference on Web Services (ICWS), Honolulu, Hawaii, IEEE Computer Society, 319-326, 2012
(online: http://doi.ieeecomputersociety.org/10.1109/ICWS.2012.63)

Keywords: web services, WS-BPEL, formal analysis
C39. Chatzieleftheriou, G., Bonakdarpour, B., Smolka, S., Katsaros, P. Abstract model repair, In Proceedings of the 4th NASA Formal Methods Symposium (NFM), Norfolk, Virginia, LNCS 7226, 341-355, Springer Verlag, 2012
(online: http://dx.doi.org/10.1007/978-3-642-28891-3_32)
Keywords: model repair, abstraction - refinement
C38. Deshpande, T., Katsaros, P., Basagiannis, S., Smolka, S. Formal analysis of the DNS Bandwidth Amplification Attack and its countermeasures using probabilistic model checking, In Proceedings of the 13th IEEE International High Assurance Systems Engineering Symposium (HASE), Boca Raton, Florida, IEEE Computer Society, 360-367, 2011
(online: http://doi.ieeecomputersociety.org/10.1109/HASE.2011.57)

Keywords:
bandwidth amplification attack, probabilistic model checking
C37. Kakarontzas, G., Gerogiannis, V. C., Stamelos, I., Katsaros, P. Elastic component characterization with respect to quality properties: an intuitionistic fuzzy-based approach, In Proceedings of the 15th Panhellenic Conference on Informatics (PCI), Kastoria, Greece, IEEE Computer Society, 270-274, 2011
(online: http://doi.ieeecomputersociety.org/10.1109/PCI.2011.27) BEST PAPER AWARD

Keywords: software quality, component-based software
C36. Tsiakis, T., Katsaros, P., Gritzalis, D. Economic evaluation of Interactive Audio Media for securing Internet services, In Proceedings of the 7th Int. Conference in Global Security, Safety and Sustainability (ICGS3), Thessaloniki, Greece, Springer, 2011
Keywords: security economics, spam, internet services
C35. Katos, V., Vrakas, D., Katsaros, P. A framework for access control with inference constraints, In Proceedings of the 35th IEEE Computer Software and Applications Conference (COMPSAC), Munich, Germany, IEEE Computer Society, 289-297, 2011
(http://doi.ieeecomputersociety.org/10.1109/COMPSAC.2011.45)

Keywords: access control, inference control
C34. Chatzieleftheriou, G., Katsaros, P. Test driving static analysis tools in search of C code vulnerabilities, In Proceedings of the 35th IEEE Computer Software and Applications Conference Workshops (COMPSACW), Munich, Germany, IEEE Computer Society, 96-103, 2011
(http://doi.ieeecomputersociety.org/10.1109/COMPSACW.2011.26)

Keywords: static program analysis, software security, benchmark tests  
C33. Petridou, S., Basagiannis, S., Alexiou, N., Papadimitriou, G., Katsaros, P. Quantitative model checking of an RSA-based email protocol on mobile devices, In Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC), Corfu, Greece, IEEE Computer Society, 639-645, 2011
(http://dx.doi.org/10.1109/ISCC.2011.5983911)

Keywords: security protocols, probabilistic model checking, mobile computing
C32. Bartocci, E., Grosu, R., Katsaros, P., Ramakrishnan, CR, Smolka, S. Model Repair for probabilistic systems, In Proceedings of the 17th Int. Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Saarbrücken, Germany, LNCS 6605, 326-340, Springer Verlag, 2011
(online: http://dx.doi.org/10.1007/978-3-642-19835-9_30)

Keywords: model repair, probabilistic model checking, nonlinear programming
C31. Soupionis, Y., Basagiannis, S., Katsaros, P., Gritzalis, D. A formally verified mechanism for countering SPIT, 5th International Workshop on Critical Information Infrastructure Security (CRITIS'10), Athens, Greece, LNCS 6712, 128-139, Springer Verlag, 2011
Keywords: Spam over Internet Telephony (SPIT), policy management, model checking, formal verification, Voice over IP (VoIP)
C30. Alexiou, N., Deshpande, T., Basagiannis, S., Smolka, S., Katsaros, P. Formal analysis of the Kaminsky DNS cache-poisoning attack using probabilistic model checking, In Proceedings of the 12th IEEE International High Assurance Systems Engineering Symposium (HASE), San Jose, California, IEEE Computer Society, 94-103, 2010
(online:
http://doi.ieeecomputersociety.org/10.1109/HASE.2010.25)
Keywords:
cache-poisoning attack, probabilistic model checking
C29. Mokos, K., Meditskos, G., Katsaros, P., Bassiliades, N., Vasiliades, V. Ontology-based model driven engineering for safety verification, In Proceedings of the 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), Lille, France, IEEE Computer Society, 47-54, 2010
(online: http://doi.ieeecomputersociety.org/10.1109/SEAA.2010.60)
Keywords:
model driven engineering, safety, verification & validation, ontology reasoning, model transformation
C28. Mentis, A., Katsaros, P., Angelis, L. Synthetic metrics for evaluating performance of software architectures with complex tradeoffs, In Proceedings of the 35th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), Patra, Greece, IEEE Computer Society, 237-242, 2009
(
online: http://doi.ieeecomputersociety.org/10.1109/SEAA.2009.84)
Keywords:
C27. Mentis, A., Katsaros, P. The ACID model checker and code generator for transaction processing, In Proceedings of the 2009 High Performance Computing & Simulation Conference  (HPCS), Leipzig, Germany - IEEE, 138-144, 2009
(http://doi.ieeecomputersociety.org/10.1109/HPCSIM.2009.5191824)
Keywords:
C26. Tsiakis, T., Katsaros, P. Hands on Dependability Economics, In Proceedings of the 2nd International Conference on Dependability (DEPEND), IARIA, Athens, Greece - IEEE Computer Society, 117-121, 2009
(online: http://doi.ieeecomputersociety.org/10.1109/DEPEND.2009.24)
Keywords:
C25. Kakarontzas, G., Stamelos, I., Katsaros, P. Product line variability with elastic components and test-driven development, In Proceedings of the International Conference on Innovation in Software Engineering (ISE 2008), Vienna, Austria - IEEE Computer Society, 146-151, 2008
(online: http://doi.ieeecomputersociety.org/10.1109/CIMCA.2008.84)
Keywords:
C24. Mokos, K., Katsaros, P., Bassiliades, N., Vasiliades, V., Perrotin, M. Towards compositional safety analysis via semantic representation of component failure behavior, In: Knowledge-based Software Engineering/Proc. of 8th Joint Conference on Knowledge - Based Software Engineering 2008 (JCKBSE 08) - Piraeus, Greece, Frontiers in Artificial Intelligence and Applications, M. Virvou and T. Nakamura (Eds.) , 405-414, IOS Press, 2008
(online:
http://dx.doi.org/10.3233/978-1-58603-900-4-405)
Keywords:
C23. Almaliotis, V., Loizidis, A., Katsaros, P., Louridas, P., Spinellis, D. Static program analysis for Java Card applets, In Proceedings of the 8th IFIP Smart Card Research and Advanced Application Conference (CARDIS), Royal Holloway, Un. of London, United Kingdom, LNCS 5189, 17-31, Springer Verlag, 2008
(online:
http://dx.doi.org/10.1007/978-3-540-85893-5_2)
Keywords:
C22. Basagiannis, S., Katsaros, P., Pombortsis, A., Alexiou, N., A probabilistic attacker model for quantitative verification of DoS security threats, In Proceedings of the 32nd Annual IEEE International on Computer Software and Applications Conference (COMPSAC 2008), Turku, Finland, IEEE Computer Society, 12-19, 2008
(online: http://doi.ieeecomputersociety.org/10.1109/COMPSAC.2008.48)
Keywords:
C21. Mentis, A., Katsaros, P., Angelis, L., ACID Sim Tools: A simulation framework for distributed transaction processing architectures, In Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems (SimulationWorks Industry Track), Marseille, France, 2008
Keywords:
C20. Basagiannis, S., Katsaros, P., Pombortsis, A., Intrusion Attack Tactics for the model checking of e-commerce security guarantees, In Proceedings of the 26th International Conference on Computer Safety, Reliability and Security (SAFECOMP), Nuremberg, Germany, LNCS 4680, 238-251, Springer Verlag, 2007
(online:
http://dx.doi.org/10.1007/978-3-540-75101-4_22)
Keywords:
C19. Kakarontzas, G., Katsaros, P., Stamelos, I., Elastic Components: Addressing variance of quality properties in components, In Proceedings of the 33rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA), EUROMICRO, Luebeck, Germany, 31-38, IEEE Computer Society, 2007
(online: http://doi.ieeecomputersociety.org/10.1109/EUROMICRO.2007.29)
Keywords:
C18. Basagiannis, S., Katsaros, P., Pombortsis, A., Interlocking control by Distributed Signal Boxes: design and verification with the SPIN model checker, In Proceedings of the International Symposium on Parallel and Distributed Processing and Applications (ISPA 2006), Sorrento, Italy, LNCS 4330, 317-328, Springer Verlag, 2006
(online:
http://dx.doi.org/10.1007/11946441_32)
Keywords:
C17. Katsaros, P., On the design of access control to prevent sensitive information leakage in distributed object systems: a Colored Petri Net based model, In Proceedings of the International Symposium on Distributed Objects and Applications (DOA 2005), Agia Napa, Cyprus, LNCS 3761, 941-959, Springer Verlag, 2005
(online:
http://dx.doi.org/10.1007/11575801_2)
Keywords:
C16. Katsaros, P., Odontidis, V., Gousidou-Koutita, M., Simulation and verification of atomicity properties for an electronic cash system, In Proceedings of the 2005 European Simulation and Modelling Conference (ESM 2005), EUROSIS, Porto, Portugal, 558-563, 2005
Keywords:
C15. Katsaros, P., Odontidis, V., Gousidou-Koutita, M., Colored Petri Net based model checking and failure analysis for e-commerce protocols, In Proceedings of the Sixth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (CPN'05), DAIMI PB-576, Dept. of Computer Science, University of Aarhus, Denmark, 267-283, 2005
Keywords:
C14. Katsaros, P., Simulation and verification of information flow paths for access control policies specified in the CORBA Security setting, In Local Proceedings of the 10th Panhellenic Conference in Informatics (PCI 2005), EPY, Volos, Greece, 225-237, 2005
Keywords:
C13. Katsaros, P., Lazos, C., Optimal object state transfer - recovery policies for fault tolerant distributed systems, In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 04), Florence, Italy, IEEE Computer Society Press, 762-771, 2004
(online:
http://doi.ieeecomputersociety.org /10.1109/DSN.2004.1311947)
Keywords:
C12. Katsaros, P., Angelis, L., Lazos, C., Simulation metamodeling for the design of reliable object based systems, In Proceedings of the EUROSIM 2004 Congress, Special session on Modeling and simulation of object based systems, EUROSIM, Paris, France, 2004
Keywords:
C11. Deligiannis, I., Sfetsos, P., Stamelos, I., Angelis, L., Chatzigeorgiou, A., Katsaros, P., Assessing the modifiability of two object-oriented design alternatives - A controlled experiment replication, In Proceedings of the EUROSIM 2004 Congress, Special session on Modeling and simulation of object based systems, EUROSIM, Paris, France, 2004
Keywords:
C10. Katsaros, P., Lazos, C., Approximate and simulation based analysis for distributed object software performance models, In Proceedings of the 2003 European Simulation and Modelling Conference (ESM 2003), EUROSIS, Naples, Italy, 409-414, 2003
Keywords:
C9. Karaiskos, Z., Katsaros, P. and Lazos, C., Single-pass static semantic check for efficient translation in YAPL, In Proceedings of the 1st Balkan Conference in Informatics, Thessaloniki, Greece, 623-632, 2003
Keywords:
C8. Katsaros, P., Lazos, C., A simulation test-bed for the design of dependable e-services, In Proceedings of the 3rd WSEAS International Conference on Simulation, Modeling and Optimization (ICOSMO), Rethymno, Greece, 2003
Keywords:
C7. Katsaros, P., Lazos, C., Structured performance modeling and analysis for object based distributed software systems, In Proceedings of the 15th ISCA International Conference on Parallel and Distributed Computing Systems, ISCA, Louisville, USA, 96-102, 2002
Keywords:
C6. Katsaros, P., Lazos, C., Regenerative estimation variants of response times in closed networks of queues, In Proc. of the 2nd WSEAS International Conference on Simulation, Modeling and Optimization (ICOSMO), Skiathos, Greece, 2002
Keywords:
C5. Katsaros, P., Lazos, C., Steady-state simulation of queuing processes in parallel time streams: problems and potentialities, In Proc. of the 5th Hellenic European Research Conference on Computer Mathematics and its Applications Conference, Athens, Greece, 370-376, 2001
Keywords:
C4.

Katsaros, P., Angelis, L., Lazos, C., Applied multiresponse metamodeling for queuing network simulation experiments: problems and perspectives, In Proc. of the EUROSIM 2001 Congress, EUROSIM, Delfts, The Netherlands, 2001
Keywords:

C3. Katsaros, P., Lazos, C., Shared memory parallel regenerative queuing network simulation, In Proc. of the 15th European Simulation Multiconference, Society for Computer Simulation, Prague, The Czech Rep., 736-740, 2001
Keywords:
C2. Katsaros, P., Lazos, C., Regenerative queuing network distributed simulation, In Proc. of the 14th European Simulation Multiconference, Society for Computer Simulation, Gent, Belgium, 109-113, 2000
Keywords:
C1. Stamelos, J., Refanidis, J., Katsaros, P., Vlachavas, J., Tsoukias, A., Pombortsis, A., Automating the evaluation of educational software, In Proc. of the 5th International Conference of the Decision Sciences Institute, 1369-1373, Athens, 1999
Keywords:

Books - Dissertations

B4. Lazos, C., Katsaros, P., Karaiskos, Z., Programming Language Compilers: Theory and Practice, Thessaloniki, 2004 (584 pages in Greek)
B3. Katsaros, P., Performance Analysis of Distributed Software Architectures, PhD thesis, Dept. of Informatics, Aristotle University of Thessaloniki, 2002 (172 pages in Greek)
B2. Katsaros, P., Distributed Applications Development, Technical Report, Dept. of Informatics, Aristotle University of Thessaloniki, 1997 (70 pages in Greek)
B1. Katsaros, P., Computer Systems Performance Modelling, MSc thesis, Aston University Birmingham, 1993 (117 pages)

Other publications - presentations

O5. Almaliotis, V., Katsaros, P., Mokos, K. Model checking for generation of test suites in software unit testing, In Work In Progress Session of the 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), Lille, France, 2010

Technical report, Aristotle University of Thessaloniki, 2010

O4. Katsaros, P., Research and Development at Aristotle University of Thessaloniki: Dependebility & Security, Dept. of Computer Science and Electronics, Mälardalen University, 18th of April 2006
O3. Katsaros, P., Towards a formal analysis approach based on the use of Colored Petri Nets, Timed Colored Petri Nets and the CPN Tools, Dept. of Computer Science and Electronics, Mälardalen University, 18th of April 2006
O2.

Katsaros, P., Queuing network simulation in parallel time streams, The TRACS - ACCESS - MINOS User Group Meeting, Edinburgh Parallel Computing Centre, Edinburgh, 26th of March 2001

O1. Katsaros, P., Queuing network simulation output analysis and parallel execution mechanisms, Dept. of Computing and Electrical Engineering, Heriot-Watt University, Edinburgh, June 2000