Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nikos Komninos
@article{DBLP:journals/compsec/FernandoK24, author = {Damien Warren Fernando and Nikos Komninos}, title = {FeSAD ransomware detection framework with machine learning using adaption to concept drift}, journal = {Comput. Secur.}, volume = {137}, pages = {103629}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103629}, doi = {10.1016/J.COSE.2023.103629}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/FernandoK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/BehbehaniKAR23, author = {Dawood Behbehani and Nikos Komninos and Khalid Al{-}Begain and Muttukrishnan Rajarajan}, title = {Cloud Enterprise Dynamic Risk Assessment {(CEDRA):} a dynamic risk assessment using dynamic Bayesian networks for cloud environment}, journal = {J. Cloud Comput.}, volume = {12}, number = {1}, pages = {79}, year = {2023}, url = {https://doi.org/10.1186/s13677-023-00454-2}, doi = {10.1186/S13677-023-00454-2}, timestamp = {Thu, 08 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/BehbehaniKAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HaqueEKR23, author = {Safwana Haque and Fadi El{-}Moussa and Nikos Komninos and Muttukrishnan Rajarajan}, title = {A Systematic Review of Data-Driven Attack Detection Trends in IoT}, journal = {Sensors}, volume = {23}, number = {16}, pages = {7191}, year = {2023}, url = {https://doi.org/10.3390/s23167191}, doi = {10.3390/S23167191}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HaqueEKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/HaqueEKR23, author = {Safwana Haque and Fadi El{-}Moussa and Nikos Komninos and Muttukrishnan Rajarajan}, title = {Identification of Important Features at Different IoT layers for Dynamic Attack Detection}, booktitle = {9th Intl Conference on Big Data Security on Cloud, BigDataSecurity, {IEEE} Intl Conference on High Performance and Smart Computing, {HPSC} and {IEEE} Intl Conference on Intelligent Data and Security {IDS} 2023, New York, NY, USA, May 6-8, 2023}, pages = {84--90}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS58521.2023.00025}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS58521.2023.00025}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/HaqueEKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inista/BehbehaniKAR23, author = {Dawood Behbehani and Nikos Komninos and Khalid Al{-}Begain and Muttukrishnan Rajarajan}, editor = {Tulay Yildirim and Richard Chbeir and Ladjel Bellatreche and Costin Badica}, title = {Open Banking {API} Security: Anomalous Access Behaviour}, booktitle = {International Conference on Innovations in Intelligent Systems and Applications, {INISTA} 2023, Hammamet, Tunisia, September 20-23, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/INISTA59065.2023.10310517}, doi = {10.1109/INISTA59065.2023.10310517}, timestamp = {Sat, 02 Dec 2023 14:05:38 +0100}, biburl = {https://dblp.org/rec/conf/inista/BehbehaniKAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FernandoK22, author = {Damien Warren Fernando and Nikos Komninos}, title = {FeSA: Feature selection architecture for ransomware detection under concept drift}, journal = {Comput. Secur.}, volume = {116}, pages = {102659}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102659}, doi = {10.1016/J.COSE.2022.102659}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FernandoK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BerryK22, author = {Cate Berry and Nikos Komninos}, title = {Efficient optimisation framework for convolutional neural networks with secure multiparty computation}, journal = {Comput. Secur.}, volume = {117}, pages = {102679}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102679}, doi = {10.1016/J.COSE.2022.102679}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BerryK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/WhitehouseWMK22, author = {Chenxi Whitehouse and Tillman Weyde and Pranava Madhyastha and Nikos Komninos}, editor = {Ceren Budak and Meeyoung Cha and Daniele Quercia}, title = {Evaluation of Fake News Detection with Knowledge-Enhanced Language Models}, booktitle = {Proceedings of the Sixteenth International {AAAI} Conference on Web and Social Media, {ICWSM} 2022, Atlanta, Georgia, USA, June 6-9, 2022}, pages = {1425--1429}, publisher = {{AAAI} Press}, year = {2022}, url = {https://ojs.aaai.org/index.php/ICWSM/article/view/19400}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwsm/WhitehouseWMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-00458, author = {Chenxi Whitehouse and Tillman Weyde and Pranava Madhyastha and Nikos Komninos}, title = {Evaluation of Fake News Detection with Knowledge-Enhanced Language Models}, journal = {CoRR}, volume = {abs/2204.00458}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.00458}, doi = {10.48550/ARXIV.2204.00458}, eprinttype = {arXiv}, eprint = {2204.00458}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-00458.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/JunejoKM21, author = {Aisha Kanwal Junejo and Nikos Komninos and Julie A. McCann}, title = {A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {8}, pages = {6840--6852}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3035474}, doi = {10.1109/JIOT.2020.3035474}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/JunejoKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/JunejoKSC21, author = {Aisha Kanwal Junejo and Nikos Komninos and Mithileysh Sathiyanarayanan and Bhawani Shankar Chowdhry}, title = {Trustee: {A} Trust Management System for Fog-Enabled Cyber Physical Systems}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {9}, number = {4}, pages = {2030--2041}, year = {2021}, url = {https://doi.org/10.1109/TETC.2019.2957394}, doi = {10.1109/TETC.2019.2957394}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/JunejoKSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/um/Komninos21, author = {Nikos Komninos}, editor = {Judith Masthoff and Eelco Herder and Nava Tintarev and Marko Tkalcic}, title = {Preserving Privacy of Data with Efficient Attribute-based Encryption Schemes}, booktitle = {Adjunct Publication of the 29th {ACM} Conference on User Modeling, Adaptation and Personalization, {UMAP} 2021, Utrecht, The Netherlands, June 21-25, 2021}, pages = {366--367}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3450614.3464469}, doi = {10.1145/3450614.3464469}, timestamp = {Thu, 24 Jun 2021 13:51:47 +0200}, biburl = {https://dblp.org/rec/conf/um/Komninos21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SaxenaSKCC20, author = {Neetesh Saxena and Hong Shen and Nikos Komninos and Kim{-}Kwang Raymond Choo and Narendra S. Chaudhari}, title = {{BVPSMS:} {A} Batch Verification Protocol for End-to-End Secure {SMS} for Mobile Users}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {550--565}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2799223}, doi = {10.1109/TDSC.2018.2799223}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SaxenaSKCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/JunejoK20, author = {Aisha Kanwal Junejo and Nikos Komninos}, title = {A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {2145829:1--2145829:18}, year = {2020}, url = {https://doi.org/10.1155/2020/2145829}, doi = {10.1155/2020/2145829}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/JunejoK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AcaraliRKZ19, author = {Dilara Acarali and Muttukrishnan Rajarajan and Nikos Komninos and Bruno Bogaz Zarpel{\~{a}}o}, title = {Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3745619:1--3745619:13}, year = {2019}, url = {https://doi.org/10.1155/2019/3745619}, doi = {10.1155/2019/3745619}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AcaraliRKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ProcopiouKD19, author = {Andria Procopiou and Nikos Komninos and Christos Douligeris}, title = {ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2019}, year = {2019}, url = {https://doi.org/10.1155/2019/8469410}, doi = {10.1155/2019/8469410}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/ProcopiouKD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/AcaraliRK18, author = {Dilara Acarali and Muttukrishnan Rajarajan and Nikos Komninos}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Evaluating the Provision of Botnet Defences using Translational Research Concepts}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {680--685}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006884406800685}, doi = {10.5220/0006884406800685}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/AcaraliRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/AcaraliRK18, author = {Dilara Acarali and Muttukrishnan Rajarajan and Nikos Komninos}, title = {Modelling Botnet Propagation in Networks with Layered Defences}, booktitle = {2018 International Symposium on Networks, Computers and Communications, {ISNCC} 2018, Rome, Italy, June 19-21, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISNCC.2018.8530934}, doi = {10.1109/ISNCC.2018.8530934}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isncc/AcaraliRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/TselikisDMKT17, author = {Christos Tselikis and Christos Douligeris and Sarandis Mitropoulos and Nikos Komninos and George Tselikis}, title = {Adaptation of a Conference Key Distribution System for the wireless ad hoc network}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996339}, doi = {10.1109/ICC.2017.7996339}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/TselikisDMKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MourouzisWK17, author = {Theodosis Mourouzis and Marcin W{\'{o}}jcik and Nikos Komninos}, title = {On The Security Evaluation of Partial Password Implementations}, journal = {CoRR}, volume = {abs/1701.00104}, year = {2017}, url = {http://arxiv.org/abs/1701.00104}, eprinttype = {arXiv}, eprint = {1701.00104}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MourouzisWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AcaraliRKH16, author = {Dilara Acarali and Muttukrishnan Rajarajan and Nikos Komninos and Ian Herwono}, title = {Survey of approaches and features for the identification of HTTP-based botnet traffic}, journal = {J. Netw. Comput. Appl.}, volume = {76}, pages = {1--15}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.10.007}, doi = {10.1016/J.JNCA.2016.10.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AcaraliRKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/KamilarisPKK16, author = {Andreas Kamilaris and Andreas Pitsillides and Sekhar Kondepudi and Nikos Komninos}, editor = {Mario Gerla and George C. Hadjichristofi and Mohsen Guizani}, title = {Privacy concerns in sharing personal consumption data through online applications}, booktitle = {2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, September 5-9, 2016}, pages = {594--599}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IWCMC.2016.7577124}, doi = {10.1109/IWCMC.2016.7577124}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/KamilarisPKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/KomninosJ15, author = {Nikos Komninos and Aisha Kanwal Junejo}, editor = {Ioan Raicu and Omer F. Rana and Rajkumar Buyya}, title = {Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment}, booktitle = {8th {IEEE/ACM} International Conference on Utility and Cloud Computing, {UCC} 2015, Limassol, Cyprus, December 7-10, 2015}, pages = {595--600}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.ieeecomputersociety.org/10.1109/UCC.2015.104}, doi = {10.1109/UCC.2015.104}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ucc/KomninosJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KomninosPP14, author = {Nikos Komninos and Eleni Philippou and Andreas Pitsillides}, title = {Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {16}, number = {4}, pages = {1933--1954}, year = {2014}, url = {https://doi.org/10.1109/COMST.2014.2320093}, doi = {10.1109/COMST.2014.2320093}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KomninosPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/MichalasK14, author = {Antonis Michalas and Nikos Komninos}, title = {The lord of the sense: {A} privacy preserving reputation system for participatory sensing applications}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2014, Funchal, Madeira, Portugal, June 23-26, 2014}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISCC.2014.6912480}, doi = {10.1109/ISCC.2014.6912480}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/MichalasK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/FengouMLKFL13, author = {Maria{-}Anna Fengou and Georgios Mantas and Dimitrios K. Lymberopoulos and Nikos Komninos and Spyros Fengos and Nikolaos Lazarou}, title = {A New Framework Architecture for Next Generation e-Health Services}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {17}, number = {1}, pages = {9--18}, year = {2013}, url = {https://doi.org/10.1109/TITB.2012.2224876}, doi = {10.1109/TITB.2012.2224876}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/titb/FengouMLKFL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/KomninosTD13, author = {Nikos Komninos and Christos Tselikis and Christos Douligeris}, title = {SAnoVS: Secure anonymous voting scheme for clustered ad hoc networks}, booktitle = {2013 {IEEE} Symposium on Computers and Communications, {ISCC} 2013, Split, Croatia, 7-10 July, 2013}, pages = {192--196}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISCC.2013.6754944}, doi = {10.1109/ISCC.2013.6754944}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/KomninosTD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/TselikisMKD12, author = {Christos Tselikis and Sarandis Mitropoulos and Nikos Komninos and Christos Douligeris}, title = {Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack}, journal = {{IEEE} Commun. Lett.}, volume = {16}, number = {5}, pages = {619--621}, year = {2012}, url = {https://doi.org/10.1109/LCOMM.2012.031912.112484}, doi = {10.1109/LCOMM.2012.031912.112484}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/TselikisMKD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/MantasLK12, author = {Georgios Mantas and Dimitrios K. Lymberopoulos and Nikos Komninos}, title = {{PKI} Security in Large-Scale Healthcare Networks}, journal = {J. Medical Syst.}, volume = {36}, number = {3}, pages = {1107--1116}, year = {2012}, url = {https://doi.org/10.1007/s10916-010-9573-1}, doi = {10.1007/S10916-010-9573-1}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/MantasLK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MichalasDGKP12, author = {Antonis Michalas and Tassos Dimitriou and Thanassis Giannetsos and Nikos Komninos and Neeli R. Prasad}, title = {Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes}, journal = {Wirel. Pers. Commun.}, volume = {66}, number = {3}, pages = {559--575}, year = {2012}, url = {https://doi.org/10.1007/s11277-012-0734-z}, doi = {10.1007/S11277-012-0734-Z}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MichalasDGKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/GeorgakakisKD12, author = {Emmanouil Georgakakis and Nikos Komninos and Christos Douligeris}, title = {{NAVI:} Novel authentication with visual information}, booktitle = {2012 {IEEE} Symposium on Computers and Communications, {ISCC} 2012, Cappadocia, Turkey, July 1-4, 2012}, pages = {588--595}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ISCC.2012.6249360}, doi = {10.1109/ISCC.2012.6249360}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/GeorgakakisKD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sarnoff/MichalasBKP12, author = {Antonis Michalas and Menelaos Bakopoulos and Nikos Komninos and Neeli R. Prasad}, title = {Secure {\&} trusted communication in emergency situations}, booktitle = {35th {IEEE} Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SARNOF.2012.6222751}, doi = {10.1109/SARNOF.2012.6222751}, timestamp = {Mon, 10 Feb 2020 16:25:22 +0100}, biburl = {https://dblp.org/rec/conf/sarnoff/MichalasBKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MichalasKP11, author = {Antonis Michalas and Nikos Komninos and Neeli R. Prasad}, title = {Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {1}, pages = {14--36}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011010102}, doi = {10.4018/JDCF.2011010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MichalasKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/SabouriKD11, author = {Ahmad Sabouri and Nikos Komninos and Christos Douligeris}, title = {User dependent cryptography for security in future mobile telecommunication systems}, booktitle = {18th International Conference on Telecommunications, {ICT} 2011, Ayia Napa, Cyprus, May 8-11, 2011}, pages = {422--427}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CTS.2011.5898962}, doi = {10.1109/CTS.2011.5898962}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ict/SabouriKD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/MichalasOKP11, author = {Antonis Michalas and Vladimir A. Oleshchuk and Nikos Komninos and Neeli R. Prasad}, title = {Privacy-preserving scheme for mobile ad hoc networks}, booktitle = {Proceedings of the 16th {IEEE} Symposium on Computers and Communications, {ISCC} 2011, Kerkyra, Corfu, Greece, June 28 - July 1, 2011}, pages = {752--757}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ISCC.2011.5983930}, doi = {10.1109/ISCC.2011.5983930}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/MichalasOKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihealth/FengouMLK11, author = {Maria{-}Anna Fengou and Georgios Mantas and Dimitrios K. Lymberopoulos and Nikos Komninos}, editor = {Konstantina S. Nikita and James C. Lin and Dimitrios I. Fotiadis and Mar{\'{\i}}a Teresa Arredondo Waldmeyer}, title = {Ubiquitous Healthcare Profile Management Applying Smart Card Technology}, booktitle = {Wireless Mobile Communication and Healthcare - Second International {ICST} Conference, MobiHealth 2011, Kos Island, Greece, October 5-7, 2011. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {83}, pages = {248--255}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29734-2\_34}, doi = {10.1007/978-3-642-29734-2\_34}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobihealth/FengouMLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MitrokotsaKD10, author = {Aikaterini Mitrokotsa and Nikos Komninos and Christos Douligeris}, title = {Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {93--106}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p93-106.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MitrokotsaKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/icsec/KomninosVD10, author = {Nikos Komninos and Dimitrios D. Vergados and Christos Douligeris}, editor = {Peter P. Stavroulakis and Mark Stamp}, title = {Security for Ad Hoc Networks}, booktitle = {Handbook of Information and Communication Security}, pages = {421--432}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-04117-4\_22}, doi = {10.1007/978-3-642-04117-4\_22}, timestamp = {Mon, 13 Mar 2023 20:54:16 +0100}, biburl = {https://dblp.org/rec/reference/icsec/KomninosVD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sensappeal/2009, editor = {Nikos Komninos}, title = {Sensor Applications, Experimentation, and Logistics - First International Conference, {SENSAPPEAL} 2009, Athens, Greece, September 25, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {29}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11870-8}, doi = {10.1007/978-3-642-11870-8}, isbn = {978-3-642-11869-2}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sensappeal/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/KomninosD09, author = {Nikos Komninos and Christos Douligeris}, title = {{LIDF:} Layered intrusion detection framework for ad-hoc networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {1}, pages = {171--182}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2008.01.001}, doi = {10.1016/J.ADHOC.2008.01.001}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/KomninosD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0807-2053, author = {Aikaterini Mitrokotsa and Nikos Komninos and Christos Douligeris}, title = {Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks}, journal = {CoRR}, volume = {abs/0807.2053}, year = {2008}, url = {http://arxiv.org/abs/0807.2053}, eprinttype = {arXiv}, eprint = {0807.2053}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0807-2053.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/KomninosVD07, author = {Nikos Komninos and Dimitrios D. Vergados and Christos Douligeris}, title = {Detecting unauthorized and compromised nodes in mobile ad hoc networks}, journal = {Ad Hoc Networks}, volume = {5}, number = {3}, pages = {289--298}, year = {2007}, url = {https://doi.org/10.1016/j.adhoc.2005.11.005}, doi = {10.1016/J.ADHOC.2005.11.005}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/KomninosVD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KomninosVD07, author = {Nikos Komninos and Dimitrios D. Vergados and Christos Douligeris}, title = {Authentication in a layered security approach for mobile ad hoc networks}, journal = {Comput. Secur.}, volume = {26}, number = {5}, pages = {373--380}, year = {2007}, url = {https://doi.org/10.1016/j.cose.2006.12.011}, doi = {10.1016/J.COSE.2006.12.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KomninosVD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/KomninosVD07, author = {Nikos Komninos and Dimitrios D. Vergados and Christos Douligeris}, title = {Multifold node authentication in mobile \emph{ad hoc} networks}, journal = {Int. J. Commun. Syst.}, volume = {20}, number = {12}, pages = {1391--1406}, year = {2007}, url = {https://doi.org/10.1002/dac.882}, doi = {10.1002/DAC.882}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/KomninosVD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/KomninosD07, author = {Nikos Komninos and Tassos Dimitriou}, editor = {Seong{-}Whan Lee and Stan Z. Li}, title = {Protecting Biometric Templates with Image Watermarking Techniques}, booktitle = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul, Korea, August 27-29, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4642}, pages = {114--123}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74549-5\_13}, doi = {10.1007/978-3-540-74549-5\_13}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/icb/KomninosD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icps/MitrokotsaKD07, author = {Aikaterini Mitrokotsa and Nikos Komninos and Christos Douligeris}, title = {Intrusion Detection with Neural Networks and Watermarking Techniques for {MANET}}, booktitle = {Proceedings of the {IEEE} International Conference on Pervasive Services, {ICPS} 2007, 15-20 July, 2007, Istanbul, Turkey}, pages = {118--127}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PERSER.2007.4283901}, doi = {10.1109/PERSER.2007.4283901}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icps/MitrokotsaKD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KomninosVD06, author = {Nikos Komninos and Dimitris Vergados and Christos Douligeris}, title = {Layered security design for mobile ad hoc networks}, journal = {Comput. Secur.}, volume = {25}, number = {2}, pages = {121--130}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2005.09.005}, doi = {10.1016/J.COSE.2005.09.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KomninosVD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.