Personal information

Critical Infrastructure, Security, Protection, Resilience, Risk
Greece

Activities

Employment (2)

European Network and Information Security Agency: Athens, GR

2019-09-01 to present
Employment
Source: Self-asserted source
Marianthi Theocharidou

European Commission Joint Research Centre: Ispra, VA, IT

2013-12-16 to 2019-08-31
Employment
Source: Self-asserted source
Marianthi Theocharidou

Works (50 of 58)

Items per page:
Page 1 of 2

Challenges on detection, identification and monitoring of indoor airborne chemical-biological agents

Safety Science
2020 | Journal article
EID:

2-s2.0-85084751774

Part of ISBN:

18791042 09257535

Contributors: Karakitsios, S.; Busker, R.; Tjärnhage, T.; Armand, P.; Dybwad, M.; Nielsen, M.F.; Burman, J.; Burke, J.; Brinek, J.; Bartzis, J. et al.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

From Risk Management to Resilience Management in Critical Infrastructure

Journal of Management in Engineering
2020 | Journal article
EID:

2-s2.0-85085260726

Part of ISBN:

0742597X

Contributors: Rød, B.; Lange, D.; Theocharidou, M.; Pursiainen, C.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

National Risk assessments in the EU: Reflections and recommendations

Proceedings of the 29th European Safety and Reliability Conference, ESREL 2019
2020 | Conference paper
EID:

2-s2.0-85089184738

Contributors: Galbusera, L.; Theocharidou, M.; Casajus-Valles, A.; Marin-Ferrer, M.; Poljanšek, K.; Giannopoulos, G.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Who cares what it means? Practical reasons for using the word resilience with critical infrastructure operators

Reliability Engineering & System Safety
2020-07 | Journal article
Contributors: L. Petersen; D. Lange; M. Theocharidou
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Preface

IFIP Advances in Information and Communication Technology
2019 | Book
EID:

2-s2.0-85068328865

Contributors: Drevin, L.; Theocharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier
grade
Preferred source (of 3)‎

Strategies for improving Urban Resilience in Europe

13th International Conference on Applications of Statistics and Probability in Civil Engineering, ICASP 2019
2019 | Conference paper
EID:

2-s2.0-85080503113

Contributors: Kourti, N.; Kempner, T.; Ferrer, M.M.; Luoni, S.; Antofie, T.; Tsionis, G.; Negro, P.; Giannopoulos, G.; Galbusera, L.; Krausmann, E. et al.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Strategies for improving Urban Resilience in Europe

13th International Conference on Applications of Statistics and Probability in Civil Engineering, ICASP 2019
2019 | Conference paper
EID:

2-s2.0-85083953289

Contributors: Kourti, N.; Kempner, T.; Ferrer, M.M.; Luoni, S.; Antofie, T.; Tsionis, G.; Negro, P.; Giannopoulos, G.; Galbusera, L.; Krausmann, E. et al.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Novel methodologies for analysing critical infrastructure resilience

Safety and Reliability - Safe Societies in a Changing World - Proceedings of the 28th International European Safety and Reliability Conference, ESREL 2018
2018 | Conference paper
EID:

2-s2.0-85058106056

Contributors: Storesund, K.; Reitan, N.K.; Sjöström, J.; Rød, B.; Guay, F.; Almeida, R.; Theocharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Preface

IFIP Advances in Information and Communication Technology
2018 | Book
EID:

2-s2.0-85053912241

Contributors: Drevin, L.; Theocharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier
grade
Preferred source (of 3)‎

A conceptual framework for assessing the resilience of critical infrastructure

Safety and Reliability - Theory and Applications - Proceedings of the 27th European Safety and Reliability Conference, ESREL 2017
2017 | Conference paper
EID:

2-s2.0-85058081182

Contributors: Cadete, G.; Da Silva, M.M.; Theocharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

A process-based dependency risk analysis methodology for critical infrastructures

International Journal of Critical Infrastructures
2017 | Journal article
EID:

2-s2.0-85037116437

Contributors: Stergiopoulos, G.; Kouktzoglou, V.; Theocharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Human vulnerability mapping facing critical service disruptions for crisis managers

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85036651441

Contributors: Grangeat, A.; Sina, J.; Rosato, V.; Bony, A.; Theocharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier
grade
Preferred source (of 3)‎

Incorporation of resilience assessment in critical infrastructure risk assessment frameworks

Safety and Reliability - Theory and Applications - Proceedings of the 27th European Safety and Reliability Conference, ESREL 2017
2017 | Conference paper
EID:

2-s2.0-85061395869

Contributors: Lange, D.; Honfi, D.; Theocharidou, M.; Giannopoulos, G.; Kristina Reitan, N.; Storesund, K.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Preface

IFIP Advances in Information and Communication Technology
2017 | Book
EID:

2-s2.0-85019687123

Contributors: Bishop, M.; Futcher, L.; Miloslavskaya, N.; Theocharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier
grade
Preferred source (of 3)‎

Critical Information Infrastructures Security

Lecture Notes in Computer Science
2016 | Book
Contributors: Erich Rome; Marianthi Theocharidou; Stephen Wolthusen
Source: Self-asserted source
Marianthi Theocharidou via Crossref Metadata Search

Critical infrastructures, protection and resilience

Studies in Systems, Decision and Control
2016 | Book
EID:

2-s2.0-85029001239

Contributors: Setola, R.; Luiijf, E.; Theocharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Knowledge-driven scenario development for critical infrastructure protection

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016 | Book
EID:

2-s2.0-84978636446

Contributors: Xie, J.; Theocharidou, M.; Barbarin, Y.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Modelling dependencies between critical infrastructures

Studies in Systems, Decision and Control
2016 | Book
EID:

2-s2.0-85029004358

Contributors: Setola, R.; Theocharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016 | Book
EID:

2-s2.0-84978698197

Contributors: Rome, E.; Theocharidou, M.; Wolthusen, S.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Smart home solutions: Privacy issues

Handbook of Smart Homes, Health Care and Well-Being
2016 | Book
EID:

2-s2.0-85016791553

Contributors: Theoharidou, M.; Tsalis, N.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures

International Journal of Critical Infrastructure Protection
2016-03 | Journal article
Contributors: George Stergiopoulos; Panayiotis Kotzanikolaou; Marianthi Theocharidou; Georgia Lykou; Dimitris Gritzalis
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Advanced services for critical infrastructures protection

Journal of Ambient Intelligence and Humanized Computing
2015 | Journal article
EID:

2-s2.0-84947078246

Contributors: Kozik, R.; Choraś, M.; Flizikowski, A.; Theocharidou, M.; Rosato, V.; Rome, E.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World Conference, WISE9 Hamburg, Germany, May 26-28, 2015 Proceedings

IFIP Advances in Information and Communication Technology
2015 | Book
EID:

2-s2.0-84942673496

Contributors: Bishop, M.; Miloslavskaya, N.; Theocharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Preface

IFIP Advances in Information and Communication Technology
2015 | Book
EID:

2-s2.0-84942693579

Contributors: Bishop, M.; Miloslavskaya, N.; Theocharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Risk mitigation strategies for critical infrastructures based on graph centrality analysis

International Journal of Critical Infrastructure Protection
2015 | Journal article
EID:

2-s2.0-84939257817

Contributors: Stergiopoulos, G.; Kotzanikolaou, P.; Theocharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Using centrality measures in dependency risk graphs for efficient risk mitigation

IFIP Advances in Information and Communication Technology
2015 | Book
EID:

2-s2.0-84951872484

Contributors: Stergiopoulos, G.; Theocharidou, M.; Kotzanikolaou, P.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Using logical error detection in software controlling remote-terminal units to predict critical information infrastructures failures

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84944046896

Contributors: Stergiopoulos, G.; Theocharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Assessing privacy risks in android: A user-centric approach

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84905020847

Contributors: Mylonas, A.; Theoharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Assessing Privacy Risks in Android: A User-Centric Approach

Risk Assessment and Risk-Driven Testing
2014 | Other
Contributors: Alexios Mylonas; Marianthi Theoharidou; Dimitris Gritzalis
Source: Self-asserted source
Marianthi Theocharidou via Crossref Metadata Search

CIPRNet D6.2 Application Scenario

CEA
2014 | Other
Contributors: Yohan Barbarin; Marianthi Theocharidou; Erich Rome; Jingquan Xie; Andrij Usov; Christer Pursiainen; Andreas Burzel; Micheline Hounjet; Amélie Grangeat; Dominique Sérafin et al.
Source: check_circle
DataCite

Assessing n-order dependencies between critical infrastructures

International Journal of Critical Infrastructures
2013 | Journal article
EID:

2-s2.0-84873815202

Contributors: Kotzanikolaou, P.; Theoharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Cascading effects of common-cause failures in critical infrastructures

IFIP Advances in Information and Communication Technology
2013 | Book
EID:

2-s2.0-84979016704

Contributors: Kotzanikolaou, P.; Theoharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Editorial

Computers and Security
2013 | Journal article
EID:

2-s2.0-84888267201

Contributors: Furnell, S.; Theoharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

In cloud we trust: Risk-assessment-as-a-service

IFIP Advances in Information and Communication Technology
2013 | Book
EID:

2-s2.0-84923630816

Contributors: Theoharidou, M.; Tsalis, N.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Interdependencies between critical infrastructures: Analyzing the risk of cascading effects

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84885715704

Contributors: Kotzanikolaou, P.; Theoharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Privacy risk, security, accountability in the cloud

Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom
2013 | Conference paper
EID:

2-s2.0-84899746803

Contributors: Theoharidou, M.; Papanikolaou, N.; Pearson, S.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Return on security investment for cloud platforms

Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom
2013 | Conference paper
EID:

2-s2.0-84899727046

Contributors: Tsalis, N.; Theoharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Risk assessment of multi-order dependencies between critical information and communication infrastructures

Critical Information Infrastructure Protection and Resilience in the ICT Sector
2013 | Book
EID:

2-s2.0-84898122057

Contributors: Panayiotis, K.; Marianthi, T.; Dimitris, G.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

S-Port: Collaborative security management of port information systems

IISA 2013 - 4th International Conference on Information, Intelligence, Systems and Applications
2013 | Conference paper
EID:

2-s2.0-84889020806

Contributors: Polemi, D.; Ntouskas, T.; Georgakakis, E.; Douligeris, C.; Theoharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

A risk assessment method for smartphones

IFIP Advances in Information and Communication Technology
2012 | Book
EID:

2-s2.0-84863927277

Contributors: Theoharidou, M.; Mylonas, A.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Securing transportation-critical infrastructures: Trends and perspectives

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2012 | Book
EID:

2-s2.0-84869594453

Contributors: Theoharidou, M.; Kandias, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Exploitation of auctions for outsourcing security-critical projects

Proceedings - IEEE Symposium on Computers and Communications
2011 | Conference paper
EID:

2-s2.0-80052770275

Contributors: Kandias, M.; Mylonas, A.; Theoharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Risk assessment methodology for interdependent critical infrastructures

International Journal of Risk Assessment and Management
2011 | Journal article
EID:

2-s2.0-80052195504

Contributors: Theoharidou, M.; Kotzanikolaou, P.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

A multi-layer Criticality Assessment methodology based on interdependencies

Computers and Security
2010 | Journal article
EID:

2-s2.0-77955429216

Contributors: Theoharidou, M.; Kotzanikolaou, P.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

An insider threat prediction model

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-78049354490

Contributors: Kandias, M.; Mylonas, A.; Virvilis, N.; Theoharidou, M.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Computer Security – ESORICS 2010

Lecture Notes in Computer Science
2010 | Book
Contributors: Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou
Source: Self-asserted source
Marianthi Theocharidou via Crossref Metadata Search

Insider threat and information security management

Advances in Information Security
2010 | Book
EID:

2-s2.0-84882800467

Contributors: Coles-Kemp, L.; Theoharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-78049392638

Contributors: Gritzalis, D.; Preneel, B.; Theoharidou, M.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

Risk-based criticality analysis

IFIP Advances in Information and Communication Technology
2009 | Book
EID:

2-s2.0-84885179321

Contributors: Theoharidou, M.; Kotzanikolaou, P.; Gritza-Lis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier

A CBK for Information Security and Critical Information and Communication Infrastructure Protection

International Journal of Critical Infrastructure Protection
2008 | Journal article
EID:

2-s2.0-68949104039

Contributors: Theoharidou, M.; Xidara, D.; Gritzalis, D.
Source: Self-asserted source
Marianthi Theocharidou via Scopus - Elsevier
Items per page:
Page 1 of 2