Vasos Vasiliou

Assistant Professor,
Department of Computer Science
University of Cyprus

Department of Computer Science
University of Cyprus
75 Kallipoleos Str.
P.O. Box 20537
CY-1678 Nicosia,
Office: FST01 (ΘΕΕ01) B114
vasosv--at--ucy.ac.cy
+ 357-22-892750

News
11 July 2019 Invited as a Keynote Speaker at CAMAD2019, IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks 11-13 September 2019 // Limassol, Cyprus>, Talk Title: Reliability, Performance Control, and Security in Wireless Sensor Networks and the Internet of Things
5 July 2019 Post Doctoral Fellowship at RISE, on the topic of "D2D communication in 5G wireless networks". DEADLINE for applications: 26/07/2019
25 June 2019 Our joint paper, with Dr. Christiana Ioannou, on “Security Agent Location in the Internet of Things” was accepted to IEEE Access. doi:10.1109/ACCESS.2019.2928414"
18 June 2019 PhD Fellowships at RISE, on the topics of "Social and Context-aware Multimedia Content Distribution in 5G Networks" and "Reliability, Security and Resource Management for IoT Networks and Devices". DEADLINE for applications: 10/07/2019
07 June 2019 Invited as Guest Editor on the Special Issue Machine Learning for Intelligent Wireless Communications and Networking"" of the Annals of Telecommunications, Springer.
07 June 2019 Paper on "Utilizing Mobile Nodes for Network Recovery in Wireless Sensor Networks" with A. Nicolaou, N. Temene, C. Sergiou, and C. Georgiou, accepted to PIMRC 2019 Instanbul, Turkey.
29 May 2019 Chaired the 1st Workshop on Intelligent Systems for the Internet of Things (ISIoT2019) in Santorini Greece.

My research is mainly systems and protocols oriented. I design and deploy network protocols and systems that make the Internet work better. Most of my work is used in a representative environment (test-bed or simulation) and tested with real-life values, parameters and settings. I use empirical network measurement and machine learning to understand and improve network performance, reliability, and security.

Social and Context-aware Content Distribution in 5G Networks

Social and Context-aware Content Distribution in 5G Networks (current): Exploit 5G dense networks and trends in using the network edge for processing and storage. Develop and integrate a framework for QoE-based dynamic adaptation of network and content. This includes the fusion of concepts from social network cascades and content dissemination, the increasing use of small high-speed cells for network communication, and the ability to group and predict users’ needs.

Intelligent approaches in D2D solutions for 5G

As D2D communications become more prevalent in 5G networks, both with the use of in-bad and out-band communication modes, we are considering the use of AI-based techniques to address the major challenges of Interference management, Cell densification and offloading, QoS/Path Selection (Routing), Handovers of D2D devices, Device Discovery and Power management. The bet is essentially to create a solution that is truly distributed and dynamic. After investigating all the D2D requirements and available solutions, we believe that using BDI (Belief, Desire, intention) agents can help at the implementation of D2D as a distributed, dynamic and autonomous control system.

Intrusion Detection in IoT Networks

protocols and algorithms for the secure and reliable operation of IoT networks. Significant opportunities exist in clearly defining the scope of security solutions and IoT-specific topologies considered. Extensions to the BLR-based anomaly detection will be defined, to cover different attacks, different topologies and different agent locations. New IDS techniques based on Computational Intelligence (Fuzzy logic, Artificial Immune System) and Machine Learning (SVM, K-NN, Q-learning) will be developed.

Fault recovery in WSNs and IoT using Mobile Nodes

The introduction of robotics and UAVs in WSNs and IoT networks makes the work on mobile nodes relevant and timely. Cross-layer techniques for fault identification (energy depletion, congestion, hardware failure, malicious operation) will be developed. These events will trigger different solutions of mobile node utilization for recovery.