pp. 509–512). American Association for the Advance-
ment of Science. https://doi.org/10.1126/ science.
286.5439.509
Burr Settles. Active Learning Literature Survey. Computer
Sciences Technical Report 1648, University of Wiscon-
sin–Madison. 2009.
Dedousis P. (2019) "Development of software for the auto-
matic restructuring of corporate networks using
graphs" [Master Thesis]. Greece: Athens University of
Economics and Business (online: https://pyxida.
aueb.gr/index.php?op=view_object&object_id=7047 )
Dewri, R., Poolsappasit, N., Ray, I., Whitley, D. (2007).
Optimal security hardening using multi-objective opti-
mization on attack tree models of networks. In: Pro-
ceedings of the 14
th
ACM Conference on Computer and
Communications Security, pp. 204–213.
Grigoriadis, C., Laborde, R., Verdier, A., & Kotzanikolaou,
P. (2021). An adaptive, situation-based risk assessment
and security enforcement framework for the maritime
sector. Sensors, 22(1), 238.
Hermanowski, D., & Piotrowski, R. (2021). Network Risk
Assessment Based on Attack Graphs. In Theory and En-
gineering of Dependable Computer Systems and Net-
works (pp. 156–167). Springer International Publish-
ing. https://doi.org/10.1007/978-3-030-76773-0_16
Kotzanikolaou, P., Theoharidou, M., & Gritzalis, D. (2013).
Cascading Effects of Common-Cause Failures in Criti-
cal Infrastructures. In Critical Infrastructure Protection
VII (pp. 171–182). Springer. https://doi.org/10.1007/
978-3-642-45330-4_12
Kumar, S., & Panda, B. S. (2020). Identifying influential
nodes in Social Networks: Neighborhood Coreness
based voting approach. In Physica A: Statistical Me-
chanics and its Applications (Vol. 553, p. 124215).
Elsevier. https://doi.org/10.1016/j.physa.2020.124215
Kurzenhauser, S. (2003). Natural frequencies in medical
risk communication: Applications of a simple mental
tool to improve statistical thinking in physicians and
patients. Ph.D. thesis, Freie Universitat Berlin
Ray, I., Poolsappasit, N. (2005). Using attack trees to iden-
tify malicious attacks from authorized insiders. In: Pro-
ceedings of ESORICS, Italy, pp. 231–246.
Ricci, F., Rokach, L., & Shapira, B. (Eds.). (2015). Recom-
mender Systems Handbook. Springer. https://doi.org/
10.1007/978-1-4899-7637-6
S. M. Rinaldi, J. P. Peerenboom and T. K. Kelly. Dec.
(2001). Identifying, understanding, and analyzing crit-
ical infrastructure interdependencies, in IEEE Control
Systems Magazine, vol. 21, no. 6, pp. 11-25,
https://doi:10.1109/37.969131
Shivraj, V. L., Rajan, M. A., & Balamuralidhar, P. (2017).
A graph theory based generic risk assessment frame-
work for internet of things (IoT). IEEE.
https://doi.org/10.1109/ants.2017.8384121
Stellios, I., Kotzanikolaou, P., Psarakis, M., & Alcaraz, C.
(2021). Risk assessment for IoT-enabled cyber-physical
systems. Advances in Core Computer Science-Based
Technologies: Papers in Honor of Professor N. Alexan-
dris, 157-173.
Stergiopoulos, G., Dedousis P., & Gritzalis G. (2022). Au-
tomatic analysis of attack graphs for risk mitigation
and prioritization on large-scale and complex networks
in Industry 4.0. International Journal of Information Se-
curity 21.1: 37-59.
Stergiopoulos, G., Dedousis, P., & Gritzalis, D. (2020). Au-
tomatic network restructuring and risk mitigation
through business process asset dependency analysis. In
Computers & Security (Vol. 96, p. 101869). Elsevier
BV. https://doi.org/10.1016/j.cose.2020.101869
Stergiopoulos, G., Theocharidou, M., Kotzanikolaou, P., &
Gritzalis, D. (2015). Using Centrality Measures in De-
pendency Risk Graphs for Efficient Risk Mitigation. In
IFIP Advances in Information and Communication
Technology (pp. 299–314). Springer International Pub-
lishing. https://doi.org/10.1007/978-3-319-26567-4_18
Stergiopoulos, Y. (2015). Securing critical infrastructures
at software and interdependency levels. National Docu-
mentation Centre (EKT). https://doi.org/10.126
81/eadd/36753
Wirth, A. (2017). The Economics of Cybersecurity. In Bio-
medical Instrumentation & Technology (Vol. 51,
Issue s6, pp. 52–59). Association for the Advancement
of Medical Instrumentation. https://doi.org/10.2345/
0899-8205-51.s6.52
Zhang, J.-X., Chen, D.-B., Dong, Q., & Zhao, Z.-D. (2016).
Identifying a set of influential spreaders in complex net-
works. In Scientific Reports (Vol. 6, Issue 1). Springer.
https://doi.org/10.1038/srep27823