Georgios Vasilei Magklaras

Image of Georgios Vasilei Magklaras
Norwegian version of this page
Phone +47 22840535
Visiting address Gaustadalléen 21 Forskningsparken 0349 OSLO
Postal address Postboks 1137 Blindern 0318 OSLO

Positions held

  • Sept. 2002 - present:  Head of IT systems and EMBnet node manager, Biotek IT Unit, Biotechnology Centre of Oslo and Center for Molecular Medicine Norway (NCMM)
  • August 2012 - present: Senior Engineer, High Performance Computing/Scientific Computing Group (VD-USIT)

Tasks performed

  • Responsible for IT operations (server, desktop and data network) for the Biotechnology Center of Oslo (BiO), Center for Molecular Medicine Norway (NCMM) and the National EMBnet node.
  • Leader of BiOs IT team (mentoring and developing IT engineers, coordination and decision making for the IT infrastructure).
  • Developing life science based scientific and high performance computing solutions around the Abel supecomputer.



  • 2001 - 2002:  Data Network Consultant/Software Developer, Video Networks Ltd, UK.
  • 2000 - 2001:  Part time lecturer and software developer, Department of Electrical and Electronic Engineering, Faculty of Technology, University of Plymouth, UK.
  • 1998 - 2000:  UNIX and Data Networks Support, IBM UK.


  • 2011:  PhD, Information Security, University of Plymouth, UK.
  • 2005:  MPhil, Intrusion Detection Systems, University of Plymouth, UK.
  • 2000:  BSc (Hons), Computer Systems and Networks, University of Plymouth, UK.


  • RedHat Certified Engineer (RHCE).
  • Member of the IEEE and USENIX organizations.
Tags: IT management, IT services, Scientific/Life Science computing, Scientific Computing, High Performance Computing, bioinformatics


  1. LUARM - An audit engine for insider misuse detection, Magklaras G., Furnell S., Papadaki M. (2011), in Proceedings of the 6th International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011), to appear in the International Journal of Digital Crime and Forensics (IJDCF).
  2. Book Chapter: Insider Threat Specification as a Threat Mitigation Technique, Advances in Information Security, Vol 49: Title: Insider Threats in Cyber Security, Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter (Eds.) 2010, XII, 244 p. 40 illus., 20 in color., ISBN 978-1-4419-7132-6, Hardcover, Springer 2010.
  3. High Throughput Sequencing and the IT architecture Part 1:Volume Dimensioning and Filesystems, Technical Note, Magklaras G., EMBnet news periodical, Volume 15 (Issue 5, pages 51 to 55), March 2010.
  4. Book Chapter:"Physiological Substrates of PKA and PKG", Ruppelt A., Oberprieler N.G., Magklaras G., and Tasken K., Handbook of Cellular Signalling (Eds Ralph Bradshaw and Edward Dennis), Academic Press/Elsevier (2009), ISBN-10: 0-12-374145-9
  5. iRefIndex: A consolidated protein interaction database with provenance, Razick S., Magklaras G., Donaldson I.(2008),BMC Bioinformatics 2008, 9:405 (30 September 2008)
  6. Towards an Insider Threat Prediction Specification Language, Magklaras G., Furnell S., Brooke P. (2006), Information Management & Computer Security, vol. 14, no. 4, pp361-381.Author's copy downloadable here
  7. Secure Web Browsing: How to safely surf the web., Magklaras G., EMBnet news periodical, Volume 11 (Issue 4, pages 9 to 13) and Volume 12 (issue 1, pages 17-19), December 2005 and January 2006.
  8. A Preliminary Model of End User Sophistication for Insider Threat Prediction in IT Systems,Magklaras G., Furnell S., Computers & Security, Volume 24, Issue 5, August 2005, Pages 371-380. Author's copy downloadable here
  9. An architecture for Insider Misuse Threat Prediction in IT systems, Magklaras G., Master of Philosophy thesis (MPhil), School of Computing, Communications and Electronics, University of Plymouth, UK, January 2005.
  10. The Insider Misuse Threat Survey: Investigating IT misuse from legitimate users, Magklaras G., Furnell S, 2004 International Information Warfare Conference, Perth, Australia, 2004.
  11. Insider Threat Prediction Tool: Evaluating the probability of IT misuse, Magklaras G., Furnell S., Computers & Security, vol. 21, no. 1, pp62-73, 2002.
  12. Security Vulnerabilities and System Intrusions - The need for Automatic Response Frameworks, Papadaki M., Magklaras G., Furnell S., Alayed A., Proceedings of the IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Advances in Information Security Management & Small Systems Security, Pages: 87 - 98, Year of Publication: 2001
  13. A Generic Taxonomy for Intrusion Specification and Response, Furnell S., Magklaras G., Papadaki M., Dowland P., Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001.


View all works in Cristin

  • Magklaras, Georgios; Dowland, P.S. & Botha, Reinhardt (2012). The Insider Threat Prediction and Specification Language, Proceedings of the Ninth International Network Conference: INC 2012. University of Plymouth Press.  ISBN 9781841023151.  238 s.

View all works in Cristin

  • Magklaras, Georgios Vasilei (2012). The Galaxy Workflow (Bioinformatics).
  • Magklaras, Georgios (2011). An Insider Misuse Threat Detection and Prediction Language.
  • Magklaras, Georgios (2010). The Norwegian EMBnet node: AGM 2010 report. EMBnet.journal.  ISSN 2226-6089.  16(1), s 24- 25 . doi: 10.14806/ej.16.1.190
  • Magklaras, Georgios; Tasken, Kjetil & Oberprieler, Nikolaus (2009). Physiological Substrates of PKA and PKG, In RA Bradshaw & EA Dennis (ed.),  Handbook of Cell Signaling.  Academic Press.  ISBN 978-0-12-374145-5.  Chapter 183.  s 1497 - 1514

View all works in Cristin

Published Dec. 17, 2015 10:21 AM - Last modified May 13, 2016 2:13 PM