Nick Pitropakis
nick pitropakis

Dr Nick Pitropakis

Associate Professor

Biography

Dr Nick Pitropakis is an Associate Professor of cybersecurity at the School of Computing of Edinburgh Napier University, and a Fellow of the HEA. He is also a core member of the Blockpass Identity Lab. Dr Pitropakis has a strong research background in attacks against machine learning. His current research interests include adversarial machine learning, trust and privacy using distributed ledger technology, advanced cyber attack attribution, and data science applied to cyber security and IoT device security. Dr Pitropakis is leading the integrated apprenticeship scheme BSc Cyber Security, which is the first in the UK to receive full NCSC accreditation. He is teaching Cyber-related graduate apprenticeship degrees, both running in Scotland and England. He is also the external examiner of The American College in Greece (ACG), covering the BSc (Hons) Information Technology and BSc (Hons) Cyber Security and Networking programmes provided by The Open University, and the Lead External Examiner for MSc Cyber Security (Newcastle and London campuses) of Northumbria University.
Dr Pitropakis is currently leading the Horizon Europe project Trust and Privacy-Preserving Computing Platform for Crossborder Federation of Personal Data (TRUSTEE). Prior to joining ENU in 2016, he worked as a Postdoctoral Researcher for the Georgia Institute of Technology, where he was involved in a U.S. Department of Defense project (Methods for producing standardized and transparent attribution) worth 17.3 million dollars aiming at advanced attribution of malicious parties. His work has impacted major trademark holders and especially average users, whose awareness was increased against combosquatting abuse.
His recent work has included £310,843 for the EU TRUSTEE project and over £300,000 through Edinburgh Napier’s latest spinout TRUEDEPLOY. Dr Pitropakis has established synergies around the UK with other centres of excellence in cyber security like Royal Holloway and the University of Lancaster. Additionally, he has been working with leading European and international partners such as Fraunhofer, Panasonic, Norwegian University of Science and Technology and Ericsson Nikola Tesla to name a few.
Based on the outcomes of these projects, Dr Pitropakis has published 60 quality scholarly articles. His research has been awarded multiple times and recently one of his projects as well as his last PhD graduate won the Scottish Cyber Awards. Dr Pitropakis has also been invited to serve as an organizing and program committee member of major international conferences and as an editor for prestigious journals. In addition, Dr Pitropakis has been involved in supervising Research MSc and PhD students since he accomplished his PhD in 2015. Currently, Dr Pitropakis is supervising 2 PhD students, and their research activities are being disseminated in high-quality conferences and journals. His latest PhD graduate Dr Pavlos Papadopoulos is leading the ENU spinout TRUEDEPLOY.

Research Areas

Events

Esteem

Conference Organising Activity

  • International Conference on Information and Communications Security (ICICS )
  • International Workshop on AI-driven Trustworthy, Secure, and Privacy-Preserving Computing (INFOCOM 2023 AidTSP)
  • IEEE World Forum on Public Safety Technology (WF-PST)
  • SecureComm, International Conference on Security and Privacy in Communication Networks
  • SRC, SUSTAINABILITY AND RESILIENCE CONFERENCE: DESIGN INNOVATION
  • MSN, International Conference on Mobility, Sensing and Networking
  • IEEE DSC 2022, 2022 IEEE Conference on Dependable and Secure Computing (Local Arrangements Co-chair)
  • ISC, International Conference on Information Security
  • UbiSec, International Conference on Ubiquitous Security
  • ISPEC, International Conference on Information Security Practice and Experience
  • STM, International Workshop on Security and Trust Management
  • DPSC, Digital Privacy and Security Conference
  • ICISSP, The International Conference on Information Systems Security and Privacy
  • CRYPIS, International Conference on Cryptography and Information Securit
  • CyberICPS, International Workshop On The Security Of Industrial Control Systems & Of Cyber- Physical Systems
  • TrustCom, The IEEE International Conference on Trust, Security and Privacy in Computing and Communications
  • TrustBus, International Conference on Trust, Privacy and Security in Digital Business
  • SECURWARE, The International Conference on Emerging Security Information, Systems and Technologies

 

Editorial Activity

  • Editor of Cybersecurity and Privacy (specialty section of Frontiers in Big Data)
  • Guest Editor in Frontiers in Sociology
  • MDPI SENSORS - Journal Topical Advisory Panel Member
  • MDPI SENSORS Guest Editor of Special Issue "Cyber Situational Awareness in Computer Networks"

 

External Examining/Validations

  • Lead examiner for MSc Cyber Security (Newcastle and London campuses)
  • External Examiner for Open University

 

Fellowships and Awards

  • Best Paper award at ICEET 2023
  • CyberFirst won the LLeading Education Programme Award at Scottish Cyber Awards 2023
  • GLASS won the Leading Light Innovation Award at Scottish Cyber Awards 2022
  • Pavlos Papadopoulos won Outstanding Young Person in Cyber at Scottish Cyber Awards 2022
  • Truedeploy was nominated for the Leading Light Innovation Award at Scottish Cyber Awards 2022
  • MDPI Computers Journal Cover: Hughes K, Papadopoulos P, Pitropakis N, Smales A, Ahmad J, Buchanan WJ. Browsers Private Mode: Is It What We Were Promised? Computers. 2021; 10(12):165.
  • SINCONF 2021, Best Paper Award: Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2021). PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.
  • MDPI SENSORS Editor’s Choice Article: Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., & Buchanan, W. J. (2020). A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors, 20(22), 6587.
  • MDPI Computers Journal Cover: Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020). Privacy-Preserving Passive DNS. Computers, 9(3), 64.

 

Grant Reviewer

  • Israel Science Foundation (ISF)
  • Reviewer of Greek General Secretariat for Research and Innovation
  • European Research Council Starting Grant

 

Invited Speaker

  • Cyber Scotland Week 2024: Domain Name Abuse: Can I trust that URL?
  • Invited Lecture at ATHENA Talks
  • Truth or Dare? Attacking the AI
  • Connect Week 2022
  • Man Versus The Machine: The Adversarial Era
  • Attacks against machine learning: Influencing cybersecurity and our everyday life
  • “Man Against The Machine: Losing My Perception”
  • NTNU CISaR Workshop
  • 5G and the Pathway to Privacy-Preserving Infection Tracking and Contact Tracing in SANCUS Project
  • SANCUS: Redefining security and Privacy in Modern ICT Infrastructures
  • Domain Name System abuse

 

Media Activity

  • Interview/Discussion about Computer Science studies pcsteps.gr (YouTube)
  • Discussion at Radio Forth

 

Research Degree External Examining

  • Security and Privacy Enhancing Mechanisms for The Android Operating System

 

Reviewing

  • Artificial Intelligence Review (Springer)
  • Ad Hoc Networks (Elsevier)
  • Elsevier Journal of Information Security And Applications
  • Artificial Intelligence Review - Springer
  • Sustainability - MDPI
  • PeerJ Computer Science
  • IEEE Journal on Selected Areas in Communications (J-SAC)
  • International Journal of Medical Informatics
  • Personal and Ubiquitous Computing, Springer
  • Journal of Parallel and Distributed Computing, Elsevier
  • IET Information Security
  • Security and Communication Networks - Hindawi
  • Information Sciences - Elsevier
  • Personal and Ubiquitous Computing - Springer
  • IEEE Journal of Biomedical and Health Informatics
  • Algorithms MDPI
  • IEEE Access
  • The Computer Journal - Oxford University Press
  • Information - MDPI
  • Cybersecurity - Springer
  • Computer Communications - Elsevier
  • Sensors - MDPI
  • Computers - MDPI
  • Computers and Security (COSE)
  • Open Journal of Information Systems (OJIS), RonPub
  • Electronics - MDPI
  • Future Internet - MDPI
  • Machine Learning and Knowledge Extraction (MAKE) - MDPI
  • Technologies - MDPI
  • IEEE Transactions on Neural Networks and Learning Systems
  • International Journal of Machine Learning and Cybernetics
  • Applied Sciences - MDPI
  • Applied Computing and Informatics - Emerald
  • Wireless Communications and Mobile Computing - Hindawi
  • Symmetry - MDPI
  • European Symposium on Research in Computer Security (ESORICS)
  • Journal Of Cloud Computing (JOCCASA), Springer
  • Journal of Cyber Security Technology - Taylor & Francis
  • Systems - MDPI

 

Spin-outs and Licences

  • TrueDeploy

 

Visiting Positions

  • Visiting Researcher

 

Date


71 results

Building a modern data platform based on the data lakehouse architecture and cloud-native ecosystem

Journal Article
AbouZaid, A., Barclay, P. J., Chrysoulas, C., & Pitropakis, N. (2025)
Building a modern data platform based on the data lakehouse architecture and cloud-native ecosystem. Discover Applied Sciences, 7, Article 166. https://doi.org/10.1007/s42452-025-06545-w
In today’s Big Data world, organisations can gain a competitive edge by adopting data-driven decision-making. However, a modern data platform that is portable, resilient, and ...

ICT Systems Security and Privacy Protection: 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12–14, 2024, Proceedings

Book
Pitropakis, N., Katsikas, S., Furnell, S., & Markantonakis, K. (Eds.)
(2024). ICT Systems Security and Privacy Protection: 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12–14, 2024, Proceedings. Springer. https://doi.org/10.1007/978-3-031-65175-5
This book constitutes the proceedings of the 39th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2024, held in Edinburgh, UK, during June 1...

Evaluating Language Model Vulnerability to Poisoning Attacks in Low-Resource Settings

Journal Article
Plant, R., Giuffrida, M. V., Pitropakis, N., & Gkatzia, D. (2024)
Evaluating Language Model Vulnerability to Poisoning Attacks in Low-Resource Settings. IEEE/ACM Transactions on Audio, Speech and Language Processing, 33, 54-67. https://doi.org/10.1109/taslp.2024.3507565
Pre-trained language models are a highly effective source of knowledge transfer for natural language processing tasks, as their development represents an investment of resourc...

A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments

Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Driss, M., & Buchanan, W. J. (2024, September)
A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. Presented at 28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Spain
With the widespread use of the Internet of Things (IoT), securing the storage and transmission of multimedia content across IoT devices is a critical concern. Chaos-based Pseu...

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography

Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July)
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia
In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. ...

Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics

Presentation / Conference Contribution
Kenny, M., Pitropakis, N., Sayeed, S., Chrysoulas, C., & Mylonas, A. (2024, June)
Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics. Presented at 39th IFIP International Conference, SEC 2024, Edinburgh
Malicious insiders often pose a danger to information security systems, which can be a crucial challenge to tackle. Existing technological solutions attempt to identify potent...

Examining the Strength of Three Word Passwords

Presentation / Conference Contribution
Fraser, W., Broadbent, M., Pitropakis, N., & Chrysoulas, C. (2024, June)
Examining the Strength of Three Word Passwords. Presented at ICT Systems Security and Privacy Protection (SEC 2024), Edinburgh
Passwords make up the most common method of authentication. With ever increasing computing power, password complexity has had to keep pace. This creates a challenge for rememb...

Transforming EU Governance: The Digital Integration Through EBSI and GLASS

Presentation / Conference Contribution
Kasimatis, D., Buchanan, W. J., Abubakar, M., Lo, O., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., Sayeed, S., & Sel, M. (2024, June)
Transforming EU Governance: The Digital Integration Through EBSI and GLASS. Presented at 39th IFIP International Conference, Edinburgh, UK
Traditionally, government systems managed citizen identities through disconnected data systems, using simple identifiers and paper-based processes, limiting digital trust and ...

PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms

Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Jaroucheh, Z., Pitropakis, N., & Buchanan, W. J. (2023, November)
PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom
Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption ...

OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks

Presentation / Conference Contribution
Uzonyi, D. G., Pitropakis, N., McKeown, S., & Politis, I. (2023, November)
OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK
Security and authentication are ubiquitous problems that impact all modern networked systems. Password-based authentication systems are still prevalent, and information leaked...

Pre-Napier Funded Projects

  • SECANT (European Commission)

Current Post Grad projects

Previous Post Grad projects