Dr. Georgios Theodoridis

    Dr. Georgios Theodoridis received the M.Sc. and Ph.D. degrees in electrical and computer engineering, with an expertise in telecommunications, from the Aristotle University of Thessaloniki, Thessaloniki, Greece, in 2004 and 2010, respectively. He joined the European Commission DG Joint Research Centre in 2013 and he has been involved in numerous research and development projects with the Directorate on Space, Security and Migration. His main research interests are in the area of i) resource management and quality of service for wireless/mobile telecommunications systems, ii) Internet security with special focus on the detection and root cause attribution of anomalous operation and cyber-attacks in the Internet backbone, iii) data analysis with network/visual analytics and clustering, iv) critical infrastructure interdependencies considering deficiencies in the underlying ICT systems, v) Hybrid Threats analysis and detection, v) business analysis, information architecture and design of web-platforms for various scopes, including information/services sharing/exchange, data analysis and reporting, case management and execution of table-top exercises.

    Keynote speech
    “Detection and analysis of Hybrid Threat attacks by means of visual analytics”

    Hybrid Threats are changing the security landscape in Europe. A Hybrid Threat is realised by the application of various tools that affect several domains in a state in an organised and centrally orchestrated manner. Hybrid Threats manipulate detection thresholds in order to hinder attribution and decision making. As consequence, their detection is rather cumbersome despite the fact that the timeline of a hybrid threat might be long. Hence, the detection of a Hybrid Threat requires the monitoring of all tools that can be exploited to affect a state’s domains; the parallel analysis of all the available input will allow to identify the hidden cross-correlations and reveal the overall Hybrid Threat. In this respect, the most prominent solution should be the use of visual analytics. Visual analytics use meaningful data transformations and interactive visual representations for exploring the bulk of disparate information that comprise a Hybrid Threat. Visual analytics allow for incorporating the combinational thinking of the expert analysts and their general personal and professional experience and background knowledge into the detection process and they exploit the inherent human capability for pattern identification.

    Aimply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam blandit hendrerit faucibus. Suspendisse hendrerit turpis dui, eget ultricies erat consequat ut. Sed ac velit iaculis, condimentum neque eu, maximus urna. Maecenas vitae nunc sit amet risus aliquet facilisis. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. In facilisis mi sit amet metus sagittis rhoncus. Nullam vel euismod nulla. Sed at fermentum lacus. Praesent consectetur, nisi conNunc eleifeo aliquet, fringilla odiofeature.