Nick Pitropakis
nick pitropakis

Dr Nick Pitropakis

Associate Professor

Biography

Dr Nick Pitropakis is an Associate Professor of cybersecurity at the School of Computing of Edinburgh Napier University, and a Fellow of the HEA. He is also a core member of the Blockpass Identity Lab. Dr Pitropakis has a strong research background in attacks against machine learning. His current research interests include adversarial machine learning, trust and privacy using distributed ledger technology, advanced cyber attack attribution, and data science applied to cyber security and IoT device security. Dr Pitropakis is leading the integrated apprenticeship scheme BSc Cyber Security, which is the first in the UK to receive full NCSC accreditation. He is teaching Cyber-related graduate apprenticeship degrees, both running in Scotland and England. He is also the external examiner of The American College in Greece (ACG), covering the BSc (Hons) Information Technology and BSc (Hons) Cyber Security and Networking programmes provided by The Open University, and the Lead External Examiner for MSc Cyber Security (Newcastle and London campuses) of Northumbria University.
Dr Pitropakis is currently leading the Horizon Europe project Trust and Privacy-Preserving Computing Platform for Crossborder Federation of Personal Data (TRUSTEE). Prior to joining ENU in 2016, he worked as a Postdoctoral Researcher for the Georgia Institute of Technology, where he was involved in a U.S. Department of Defense project (Methods for producing standardized and transparent attribution) worth 17.3 million dollars aiming at advanced attribution of malicious parties. His work has impacted major trademark holders and especially average users, whose awareness was increased against combosquatting abuse.
His recent work has included £310,843 for the EU TRUSTEE project and over £300,000 through Edinburgh Napier’s latest spinout TRUEDEPLOY. Dr Pitropakis has established synergies around the UK with other centres of excellence in cyber security like Royal Holloway and the University of Lancaster. Additionally, he has been working with leading European and international partners such as Fraunhofer, Panasonic, Norwegian University of Science and Technology and Ericsson Nikola Tesla to name a few.
Based on the outcomes of these projects, Dr Pitropakis has published 60 quality scholarly articles. His research has been awarded multiple times and recently one of his projects as well as his last PhD graduate won the Scottish Cyber Awards. Dr Pitropakis has also been invited to serve as an organizing and program committee member of major international conferences and as an editor for prestigious journals. In addition, Dr Pitropakis has been involved in supervising Research MSc and PhD students since he accomplished his PhD in 2015. Currently, Dr Pitropakis is supervising 2 PhD students, and their research activities are being disseminated in high-quality conferences and journals. His latest PhD graduate Dr Pavlos Papadopoulos is leading the ENU spinout TRUEDEPLOY.

Research Areas

Events

Esteem

Conference Organising Activity

  • International Conference on Information and Communications Security (ICICS )
  • International Workshop on AI-driven Trustworthy, Secure, and Privacy-Preserving Computing (INFOCOM 2023 AidTSP)
  • IEEE World Forum on Public Safety Technology (WF-PST)
  • MSN, International Conference on Mobility, Sensing and Networking
  • SecureComm, International Conference on Security and Privacy in Communication Networks
  • IEEE DSC 2022, 2022 IEEE Conference on Dependable and Secure Computing (Local Arrangements Co-chair)
  • SRC, SUSTAINABILITY AND RESILIENCE CONFERENCE: DESIGN INNOVATION
  • ISC, International Conference on Information Security
  • UbiSec, International Conference on Ubiquitous Security
  • ISPEC, International Conference on Information Security Practice and Experience
  • CyberICPS, International Workshop On The Security Of Industrial Control Systems & Of Cyber- Physical Systems
  • CRYPIS, International Conference on Cryptography and Information Securit
  • DPSC, Digital Privacy and Security Conference
  • ICISSP, The International Conference on Information Systems Security and Privacy
  • STM, International Workshop on Security and Trust Management
  • TrustCom, The IEEE International Conference on Trust, Security and Privacy in Computing and Communications
  • TrustBus, International Conference on Trust, Privacy and Security in Digital Business
  • SECURWARE, The International Conference on Emerging Security Information, Systems and Technologies

 

Editorial Activity

  • Editor of Cybersecurity and Privacy (specialty section of Frontiers in Big Data)
  • Guest Editor in Frontiers in Sociology
  • MDPI SENSORS - Journal Topical Advisory Panel Member
  • MDPI SENSORS Guest Editor of Special Issue "Cyber Situational Awareness in Computer Networks"

 

External Examining/Validations

  • Lead examiner for MSc Cyber Security (Newcastle and London campuses)
  • External Examiner for Open University

 

Fellowships and Awards

  • Best Paper award at ICEET 2023
  • CyberFirst won the LLeading Education Programme Award at Scottish Cyber Awards 2023
  • Pavlos Papadopoulos won Outstanding Young Person in Cyber at Scottish Cyber Awards 2022
  • GLASS won the Leading Light Innovation Award at Scottish Cyber Awards 2022
  • Truedeploy was nominated for the Leading Light Innovation Award at Scottish Cyber Awards 2022
  • MDPI Computers Journal Cover: Hughes K, Papadopoulos P, Pitropakis N, Smales A, Ahmad J, Buchanan WJ. Browsers Private Mode: Is It What We Were Promised? Computers. 2021; 10(12):165.
  • SINCONF 2021, Best Paper Award: Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2021). PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.
  • MDPI SENSORS Editor’s Choice Article: Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., & Buchanan, W. J. (2020). A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors, 20(22), 6587.
  • MDPI Computers Journal Cover: Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020). Privacy-Preserving Passive DNS. Computers, 9(3), 64.

 

Grant Reviewer

  • Reviewer of Greek General Secretariat for Research and Innovation
  • Israel Science Foundation (ISF)
  • European Research Council Starting Grant

 

Invited Speaker

  • Cyber Scotland Week 2024: Domain Name Abuse: Can I trust that URL?
  • Truth or Dare? Attacking the AI
  • Invited Lecture at ATHENA Talks
  • Connect Week 2022
  • Man Versus The Machine: The Adversarial Era
  • “Man Against The Machine: Losing My Perception”
  • Attacks against machine learning: Influencing cybersecurity and our everyday life
  • NTNU CISaR Workshop
  • SANCUS: Redefining security and Privacy in Modern ICT Infrastructures
  • 5G and the Pathway to Privacy-Preserving Infection Tracking and Contact Tracing in SANCUS Project
  • Domain Name System abuse

 

Media Activity

  • Interview/Discussion about Computer Science studies pcsteps.gr (YouTube)
  • Discussion at Radio Forth

 

Research Degree External Examining

  • Security and Privacy Enhancing Mechanisms for The Android Operating System

 

Reviewing

  • Artificial Intelligence Review (Springer)
  • Ad Hoc Networks (Elsevier)
  • Elsevier Journal of Information Security And Applications
  • PeerJ Computer Science
  • Sustainability - MDPI
  • IEEE Journal on Selected Areas in Communications (J-SAC)
  • Artificial Intelligence Review - Springer
  • IEEE Journal of Biomedical and Health Informatics
  • Algorithms MDPI
  • IEEE Access
  • Journal of Parallel and Distributed Computing, Elsevier
  • IET Information Security
  • Personal and Ubiquitous Computing - Springer
  • Security and Communication Networks - Hindawi
  • Information Sciences - Elsevier
  • International Journal of Medical Informatics
  • Personal and Ubiquitous Computing, Springer
  • Open Journal of Information Systems (OJIS), RonPub
  • Electronics - MDPI
  • The Computer Journal - Oxford University Press
  • Information - MDPI
  • Cybersecurity - Springer
  • Computer Communications - Elsevier
  • Sensors - MDPI
  • Computers - MDPI
  • Computers and Security (COSE)
  • Machine Learning and Knowledge Extraction (MAKE) - MDPI
  • Future Internet - MDPI
  • Technologies - MDPI
  • IEEE Transactions on Neural Networks and Learning Systems
  • International Journal of Machine Learning and Cybernetics
  • Symmetry - MDPI
  • Applied Sciences - MDPI
  • Applied Computing and Informatics - Emerald
  • Wireless Communications and Mobile Computing - Hindawi
  • Journal of Cyber Security Technology - Taylor & Francis
  • Journal Of Cloud Computing (JOCCASA), Springer
  • European Symposium on Research in Computer Security (ESORICS)
  • Systems - MDPI

 

Spin-outs and Licences

  • TrueDeploy

 

Visiting Positions

  • Visiting Researcher

 

Date


59 results

The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud

Conference Proceeding
Pitropakis, N., Lyvas, C., & Lambrinoudakis, C. (2017)
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. In C. Becker Westphall, Y. Woo Lee, B. Duncan, R. Ege, A. Olmsted, M. Vassilakopoulos, …S. Katsikas (Eds.), CLOUD COMPUTING 2017 - The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization
The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their qu...

Cloud Security, Privacy, and Trust Baselines

Book Chapter
Pitropakis, N., Katsikas, S., & Lambrinoudakis, C. (2016)
Cloud Security, Privacy, and Trust Baselines. In Cloud Computing Security Foundations and Challenges. Boca Raton: CRC Press (Taylor and Francis Group
According to ISO 27001, a threat is a potential event. When a threat turns into an actual event, it may cause an undesirable incident. It is undesirable because the incident...

The Far Side of Mobile Application Integrated Development Environments

Conference Proceeding
Lyvas, C., Pitropakis, N., & Lambrinoudakis, C. (2016)
The Far Side of Mobile Application Integrated Development Environments. In S. Katsikas, C. Lambrinoudakis, & S. Furnell (Eds.), Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science, 111-122. https://doi.org/10.1007/978-3-319-44341-6_8
Smart phones are, nowadays, a necessity for the vast majority of individuals around the globe. In addition to the ubiquitous computing paradigm supported by such devices, ther...

Towards an augmented authenticator in the Cloud

Conference Proceeding
Pitropakis, N., Yfantopoulos, N., Geneiatakis, D., & Lambrinoudakis, C. (2015)
Towards an augmented authenticator in the Cloud. In 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)doi:10.1109/isspit.2014.7300603
Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive informati...

Till All Are One: Towards a Unified Cloud IDS

Conference Proceeding
Pitropakis, N., Lambrinoudakis, C., & Geneiatakis, D. (2015)
Till All Are One: Towards a Unified Cloud IDS. In S. Fischer-Hübner, C. Lambrinoudakis, & J. López (Eds.), Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science, 136-149. doi:10.1007/978-3-319-22906-5_11
Recently there is a trend to use cloud computing on service deployment, enjoying various advantages that it offers with emphasis on the economy which is achieved in the era of...

If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Journal Article
Pitropakis, N., Anastasopoulou, D., Pikrakis, A., & Lambrinoudakis, C. (2014)
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments. Journal of cloud computing advances, systems and applications, 3(1), https://doi.org/10.1186/s13677-014-0020-6
Computational systems are gradually moving towards Cloud Computing Infrastructures, using the several advantages they have to offer and especially the economic advantages in t...

Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments

Journal Article
Pitropakis, N., Pikrakis, A., & Lambrinoudakis, C. (2015)
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments. International Journal of Information Security, 14(4), 299-305. doi:10.1007/s10207-014-0255-8
Cloud computing is gradually becoming the most popular option of Information Technology infrastructures. However, an important issue that has emerged through that revolution i...

It's All in the Cloud: Reviewing Cloud Security

Conference Proceeding
Pitropakis, N., Darra, E., Vrakas, N., & Lambrinoudakis, C. (2014)
It's All in the Cloud: Reviewing Cloud Security. In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computingdoi:10.1109/uic-atc.2013.13
Cloud computing is gradually replacing traditional IT infrastructures. However, an important issue that has emerged through that revolution is the preservation of an adequate ...

A Practical Steganographic Approach for Matroska Based High Quality Video Files

Conference Proceeding
Pitropakis, N., Lambrinoudakis, C., Geneiatakis, D., & Gritzalis, D. (2013)
A Practical Steganographic Approach for Matroska Based High Quality Video Files. In 2013 27th International Conference on Advanced Information Networking and Applications Workshopsdoi:10.1109/waina.2013.39
Several steganographic algorithms have been proposed for protecting message secrecy against unauthorized "reads". The most used method for hiding a message relies on embedding...

Pre-Napier Funded Projects

  • SECANT (European Commission)

Current Post Grad projects

Previous Post Grad projects