BibTeX records: Nikos Komninos

download as .bib file

@article{DBLP:journals/compsec/FernandoK24,
  author       = {Damien Warren Fernando and
                  Nikos Komninos},
  title        = {FeSAD ransomware detection framework with machine learning using adaption
                  to concept drift},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103629},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103629},
  doi          = {10.1016/J.COSE.2023.103629},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/FernandoK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/BehbehaniKAR23,
  author       = {Dawood Behbehani and
                  Nikos Komninos and
                  Khalid Al{-}Begain and
                  Muttukrishnan Rajarajan},
  title        = {Cloud Enterprise Dynamic Risk Assessment {(CEDRA):} a dynamic risk
                  assessment using dynamic Bayesian networks for cloud environment},
  journal      = {J. Cloud Comput.},
  volume       = {12},
  number       = {1},
  pages        = {79},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13677-023-00454-2},
  doi          = {10.1186/S13677-023-00454-2},
  timestamp    = {Thu, 08 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/BehbehaniKAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HaqueEKR23,
  author       = {Safwana Haque and
                  Fadi El{-}Moussa and
                  Nikos Komninos and
                  Muttukrishnan Rajarajan},
  title        = {A Systematic Review of Data-Driven Attack Detection Trends in IoT},
  journal      = {Sensors},
  volume       = {23},
  number       = {16},
  pages        = {7191},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23167191},
  doi          = {10.3390/S23167191},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/HaqueEKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/HaqueEKR23,
  author       = {Safwana Haque and
                  Fadi El{-}Moussa and
                  Nikos Komninos and
                  Muttukrishnan Rajarajan},
  title        = {Identification of Important Features at Different IoT layers for Dynamic
                  Attack Detection},
  booktitle    = {9th Intl Conference on Big Data Security on Cloud, BigDataSecurity,
                  {IEEE} Intl Conference on High Performance and Smart Computing, {HPSC}
                  and {IEEE} Intl Conference on Intelligent Data and Security {IDS}
                  2023, New York, NY, USA, May 6-8, 2023},
  pages        = {84--90},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS58521.2023.00025},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS58521.2023.00025},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/HaqueEKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inista/BehbehaniKAR23,
  author       = {Dawood Behbehani and
                  Nikos Komninos and
                  Khalid Al{-}Begain and
                  Muttukrishnan Rajarajan},
  editor       = {Tulay Yildirim and
                  Richard Chbeir and
                  Ladjel Bellatreche and
                  Costin Badica},
  title        = {Open Banking {API} Security: Anomalous Access Behaviour},
  booktitle    = {International Conference on Innovations in Intelligent Systems and
                  Applications, {INISTA} 2023, Hammamet, Tunisia, September 20-23, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/INISTA59065.2023.10310517},
  doi          = {10.1109/INISTA59065.2023.10310517},
  timestamp    = {Sat, 02 Dec 2023 14:05:38 +0100},
  biburl       = {https://dblp.org/rec/conf/inista/BehbehaniKAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FernandoK22,
  author       = {Damien Warren Fernando and
                  Nikos Komninos},
  title        = {FeSA: Feature selection architecture for ransomware detection under
                  concept drift},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102659},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102659},
  doi          = {10.1016/J.COSE.2022.102659},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FernandoK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BerryK22,
  author       = {Cate Berry and
                  Nikos Komninos},
  title        = {Efficient optimisation framework for convolutional neural networks
                  with secure multiparty computation},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102679},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102679},
  doi          = {10.1016/J.COSE.2022.102679},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BerryK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/WhitehouseWMK22,
  author       = {Chenxi Whitehouse and
                  Tillman Weyde and
                  Pranava Madhyastha and
                  Nikos Komninos},
  editor       = {Ceren Budak and
                  Meeyoung Cha and
                  Daniele Quercia},
  title        = {Evaluation of Fake News Detection with Knowledge-Enhanced Language
                  Models},
  booktitle    = {Proceedings of the Sixteenth International {AAAI} Conference on Web
                  and Social Media, {ICWSM} 2022, Atlanta, Georgia, USA, June 6-9, 2022},
  pages        = {1425--1429},
  publisher    = {{AAAI} Press},
  year         = {2022},
  url          = {https://ojs.aaai.org/index.php/ICWSM/article/view/19400},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icwsm/WhitehouseWMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-00458,
  author       = {Chenxi Whitehouse and
                  Tillman Weyde and
                  Pranava Madhyastha and
                  Nikos Komninos},
  title        = {Evaluation of Fake News Detection with Knowledge-Enhanced Language
                  Models},
  journal      = {CoRR},
  volume       = {abs/2204.00458},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.00458},
  doi          = {10.48550/ARXIV.2204.00458},
  eprinttype    = {arXiv},
  eprint       = {2204.00458},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-00458.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/JunejoKM21,
  author       = {Aisha Kanwal Junejo and
                  Nikos Komninos and
                  Julie A. McCann},
  title        = {A Secure Integrated Framework for Fog-Assisted Internet-of-Things
                  Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {8},
  pages        = {6840--6852},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3035474},
  doi          = {10.1109/JIOT.2020.3035474},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/JunejoKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/JunejoKSC21,
  author       = {Aisha Kanwal Junejo and
                  Nikos Komninos and
                  Mithileysh Sathiyanarayanan and
                  Bhawani Shankar Chowdhry},
  title        = {Trustee: {A} Trust Management System for Fog-Enabled Cyber Physical
                  Systems},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {2030--2041},
  year         = {2021},
  url          = {https://doi.org/10.1109/TETC.2019.2957394},
  doi          = {10.1109/TETC.2019.2957394},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/JunejoKSC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/um/Komninos21,
  author       = {Nikos Komninos},
  editor       = {Judith Masthoff and
                  Eelco Herder and
                  Nava Tintarev and
                  Marko Tkalcic},
  title        = {Preserving Privacy of Data with Efficient Attribute-based Encryption
                  Schemes},
  booktitle    = {Adjunct Publication of the 29th {ACM} Conference on User Modeling,
                  Adaptation and Personalization, {UMAP} 2021, Utrecht, The Netherlands,
                  June 21-25, 2021},
  pages        = {366--367},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450614.3464469},
  doi          = {10.1145/3450614.3464469},
  timestamp    = {Thu, 24 Jun 2021 13:51:47 +0200},
  biburl       = {https://dblp.org/rec/conf/um/Komninos21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SaxenaSKCC20,
  author       = {Neetesh Saxena and
                  Hong Shen and
                  Nikos Komninos and
                  Kim{-}Kwang Raymond Choo and
                  Narendra S. Chaudhari},
  title        = {{BVPSMS:} {A} Batch Verification Protocol for End-to-End Secure {SMS}
                  for Mobile Users},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {550--565},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2799223},
  doi          = {10.1109/TDSC.2018.2799223},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/SaxenaSKCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/JunejoK20,
  author       = {Aisha Kanwal Junejo and
                  Nikos Komninos},
  title        = {A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber
                  Physical Systems},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {2145829:1--2145829:18},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/2145829},
  doi          = {10.1155/2020/2145829},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/JunejoK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AcaraliRKZ19,
  author       = {Dilara Acarali and
                  Muttukrishnan Rajarajan and
                  Nikos Komninos and
                  Bruno Bogaz Zarpel{\~{a}}o},
  title        = {Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor
                  Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3745619:1--3745619:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3745619},
  doi          = {10.1155/2019/3745619},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AcaraliRKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ProcopiouKD19,
  author       = {Andria Procopiou and
                  Nikos Komninos and
                  Christos Douligeris},
  title        = {ForChaos: Real Time Application DDoS Detection Using Forecasting and
                  Chaos Theory in Smart Home IoT Network},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2019},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8469410},
  doi          = {10.1155/2019/8469410},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/ProcopiouKD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/AcaraliRK18,
  author       = {Dilara Acarali and
                  Muttukrishnan Rajarajan and
                  Nikos Komninos},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Evaluating the Provision of Botnet Defences using Translational Research
                  Concepts},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {680--685},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006884406800685},
  doi          = {10.5220/0006884406800685},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/AcaraliRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/AcaraliRK18,
  author       = {Dilara Acarali and
                  Muttukrishnan Rajarajan and
                  Nikos Komninos},
  title        = {Modelling Botnet Propagation in Networks with Layered Defences},
  booktitle    = {2018 International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2018, Rome, Italy, June 19-21, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISNCC.2018.8530934},
  doi          = {10.1109/ISNCC.2018.8530934},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isncc/AcaraliRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/TselikisDMKT17,
  author       = {Christos Tselikis and
                  Christos Douligeris and
                  Sarandis Mitropoulos and
                  Nikos Komninos and
                  George Tselikis},
  title        = {Adaptation of a Conference Key Distribution System for the wireless
                  ad hoc network},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996339},
  doi          = {10.1109/ICC.2017.7996339},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/TselikisDMKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MourouzisWK17,
  author       = {Theodosis Mourouzis and
                  Marcin W{\'{o}}jcik and
                  Nikos Komninos},
  title        = {On The Security Evaluation of Partial Password Implementations},
  journal      = {CoRR},
  volume       = {abs/1701.00104},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.00104},
  eprinttype    = {arXiv},
  eprint       = {1701.00104},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MourouzisWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AcaraliRKH16,
  author       = {Dilara Acarali and
                  Muttukrishnan Rajarajan and
                  Nikos Komninos and
                  Ian Herwono},
  title        = {Survey of approaches and features for the identification of HTTP-based
                  botnet traffic},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {76},
  pages        = {1--15},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.007},
  doi          = {10.1016/J.JNCA.2016.10.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AcaraliRKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/KamilarisPKK16,
  author       = {Andreas Kamilaris and
                  Andreas Pitsillides and
                  Sekhar Kondepudi and
                  Nikos Komninos},
  editor       = {Mario Gerla and
                  George C. Hadjichristofi and
                  Mohsen Guizani},
  title        = {Privacy concerns in sharing personal consumption data through online
                  applications},
  booktitle    = {2016 International Wireless Communications and Mobile Computing Conference
                  (IWCMC), Paphos, Cyprus, September 5-9, 2016},
  pages        = {594--599},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IWCMC.2016.7577124},
  doi          = {10.1109/IWCMC.2016.7577124},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/KamilarisPKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/KomninosJ15,
  author       = {Nikos Komninos and
                  Aisha Kanwal Junejo},
  editor       = {Ioan Raicu and
                  Omer F. Rana and
                  Rajkumar Buyya},
  title        = {Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative
                  Environment},
  booktitle    = {8th {IEEE/ACM} International Conference on Utility and Cloud Computing,
                  {UCC} 2015, Limassol, Cyprus, December 7-10, 2015},
  pages        = {595--600},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.ieeecomputersociety.org/10.1109/UCC.2015.104},
  doi          = {10.1109/UCC.2015.104},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ucc/KomninosJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KomninosPP14,
  author       = {Nikos Komninos and
                  Eleni Philippou and
                  Andreas Pitsillides},
  title        = {Survey in Smart Grid and Smart Home Security: Issues, Challenges and
                  Countermeasures},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {16},
  number       = {4},
  pages        = {1933--1954},
  year         = {2014},
  url          = {https://doi.org/10.1109/COMST.2014.2320093},
  doi          = {10.1109/COMST.2014.2320093},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KomninosPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/MichalasK14,
  author       = {Antonis Michalas and
                  Nikos Komninos},
  title        = {The lord of the sense: {A} privacy preserving reputation system for
                  participatory sensing applications},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2014, Funchal,
                  Madeira, Portugal, June 23-26, 2014},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISCC.2014.6912480},
  doi          = {10.1109/ISCC.2014.6912480},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/MichalasK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/FengouMLKFL13,
  author       = {Maria{-}Anna Fengou and
                  Georgios Mantas and
                  Dimitrios K. Lymberopoulos and
                  Nikos Komninos and
                  Spyros Fengos and
                  Nikolaos Lazarou},
  title        = {A New Framework Architecture for Next Generation e-Health Services},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {17},
  number       = {1},
  pages        = {9--18},
  year         = {2013},
  url          = {https://doi.org/10.1109/TITB.2012.2224876},
  doi          = {10.1109/TITB.2012.2224876},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/titb/FengouMLKFL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/KomninosTD13,
  author       = {Nikos Komninos and
                  Christos Tselikis and
                  Christos Douligeris},
  title        = {SAnoVS: Secure anonymous voting scheme for clustered ad hoc networks},
  booktitle    = {2013 {IEEE} Symposium on Computers and Communications, {ISCC} 2013,
                  Split, Croatia, 7-10 July, 2013},
  pages        = {192--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCC.2013.6754944},
  doi          = {10.1109/ISCC.2013.6754944},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/KomninosTD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/TselikisMKD12,
  author       = {Christos Tselikis and
                  Sarandis Mitropoulos and
                  Nikos Komninos and
                  Christos Douligeris},
  title        = {Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under
                  Attack},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {16},
  number       = {5},
  pages        = {619--621},
  year         = {2012},
  url          = {https://doi.org/10.1109/LCOMM.2012.031912.112484},
  doi          = {10.1109/LCOMM.2012.031912.112484},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/TselikisMKD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/MantasLK12,
  author       = {Georgios Mantas and
                  Dimitrios K. Lymberopoulos and
                  Nikos Komninos},
  title        = {{PKI} Security in Large-Scale Healthcare Networks},
  journal      = {J. Medical Syst.},
  volume       = {36},
  number       = {3},
  pages        = {1107--1116},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10916-010-9573-1},
  doi          = {10.1007/S10916-010-9573-1},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/MantasLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MichalasDGKP12,
  author       = {Antonis Michalas and
                  Tassos Dimitriou and
                  Thanassis Giannetsos and
                  Nikos Komninos and
                  Neeli R. Prasad},
  title        = {Vulnerabilities of Decentralized Additive Reputation Systems Regarding
                  the Privacy of Individual Votes},
  journal      = {Wirel. Pers. Commun.},
  volume       = {66},
  number       = {3},
  pages        = {559--575},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11277-012-0734-z},
  doi          = {10.1007/S11277-012-0734-Z},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/MichalasDGKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/GeorgakakisKD12,
  author       = {Emmanouil Georgakakis and
                  Nikos Komninos and
                  Christos Douligeris},
  title        = {{NAVI:} Novel authentication with visual information},
  booktitle    = {2012 {IEEE} Symposium on Computers and Communications, {ISCC} 2012,
                  Cappadocia, Turkey, July 1-4, 2012},
  pages        = {588--595},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISCC.2012.6249360},
  doi          = {10.1109/ISCC.2012.6249360},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/GeorgakakisKD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sarnoff/MichalasBKP12,
  author       = {Antonis Michalas and
                  Menelaos Bakopoulos and
                  Nikos Komninos and
                  Neeli R. Prasad},
  title        = {Secure {\&} trusted communication in emergency situations},
  booktitle    = {35th {IEEE} Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SARNOF.2012.6222751},
  doi          = {10.1109/SARNOF.2012.6222751},
  timestamp    = {Mon, 10 Feb 2020 16:25:22 +0100},
  biburl       = {https://dblp.org/rec/conf/sarnoff/MichalasBKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MichalasKP11,
  author       = {Antonis Michalas and
                  Nikos Komninos and
                  Neeli R. Prasad},
  title        = {Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {3},
  number       = {1},
  pages        = {14--36},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdcf.2011010102},
  doi          = {10.4018/JDCF.2011010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MichalasKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/SabouriKD11,
  author       = {Ahmad Sabouri and
                  Nikos Komninos and
                  Christos Douligeris},
  title        = {User dependent cryptography for security in future mobile telecommunication
                  systems},
  booktitle    = {18th International Conference on Telecommunications, {ICT} 2011, Ayia
                  Napa, Cyprus, May 8-11, 2011},
  pages        = {422--427},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CTS.2011.5898962},
  doi          = {10.1109/CTS.2011.5898962},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ict/SabouriKD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/MichalasOKP11,
  author       = {Antonis Michalas and
                  Vladimir A. Oleshchuk and
                  Nikos Komninos and
                  Neeli R. Prasad},
  title        = {Privacy-preserving scheme for mobile ad hoc networks},
  booktitle    = {Proceedings of the 16th {IEEE} Symposium on Computers and Communications,
                  {ISCC} 2011, Kerkyra, Corfu, Greece, June 28 - July 1, 2011},
  pages        = {752--757},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISCC.2011.5983930},
  doi          = {10.1109/ISCC.2011.5983930},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/MichalasOKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihealth/FengouMLK11,
  author       = {Maria{-}Anna Fengou and
                  Georgios Mantas and
                  Dimitrios K. Lymberopoulos and
                  Nikos Komninos},
  editor       = {Konstantina S. Nikita and
                  James C. Lin and
                  Dimitrios I. Fotiadis and
                  Mar{\'{\i}}a Teresa Arredondo Waldmeyer},
  title        = {Ubiquitous Healthcare Profile Management Applying Smart Card Technology},
  booktitle    = {Wireless Mobile Communication and Healthcare - Second International
                  {ICST} Conference, MobiHealth 2011, Kos Island, Greece, October 5-7,
                  2011. Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {83},
  pages        = {248--255},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29734-2\_34},
  doi          = {10.1007/978-3-642-29734-2\_34},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihealth/FengouMLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MitrokotsaKD10,
  author       = {Aikaterini Mitrokotsa and
                  Nikos Komninos and
                  Christos Douligeris},
  title        = {Protection of an Intrusion Detection Engine with Watermarking in Ad
                  Hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {93--106},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p93-106.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MitrokotsaKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/icsec/KomninosVD10,
  author       = {Nikos Komninos and
                  Dimitrios D. Vergados and
                  Christos Douligeris},
  editor       = {Peter P. Stavroulakis and
                  Mark Stamp},
  title        = {Security for Ad Hoc Networks},
  booktitle    = {Handbook of Information and Communication Security},
  pages        = {421--432},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-04117-4\_22},
  doi          = {10.1007/978-3-642-04117-4\_22},
  timestamp    = {Mon, 13 Mar 2023 20:54:16 +0100},
  biburl       = {https://dblp.org/rec/reference/icsec/KomninosVD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sensappeal/2009,
  editor       = {Nikos Komninos},
  title        = {Sensor Applications, Experimentation, and Logistics - First International
                  Conference, {SENSAPPEAL} 2009, Athens, Greece, September 25, 2009,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {29},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11870-8},
  doi          = {10.1007/978-3-642-11870-8},
  isbn         = {978-3-642-11869-2},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sensappeal/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/KomninosD09,
  author       = {Nikos Komninos and
                  Christos Douligeris},
  title        = {{LIDF:} Layered intrusion detection framework for ad-hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {1},
  pages        = {171--182},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2008.01.001},
  doi          = {10.1016/J.ADHOC.2008.01.001},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/KomninosD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0807-2053,
  author       = {Aikaterini Mitrokotsa and
                  Nikos Komninos and
                  Christos Douligeris},
  title        = {Towards an Effective Intrusion Response Engine Combined with Intrusion
                  Detection in Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/0807.2053},
  year         = {2008},
  url          = {http://arxiv.org/abs/0807.2053},
  eprinttype    = {arXiv},
  eprint       = {0807.2053},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0807-2053.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/KomninosVD07,
  author       = {Nikos Komninos and
                  Dimitrios D. Vergados and
                  Christos Douligeris},
  title        = {Detecting unauthorized and compromised nodes in mobile ad hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {5},
  number       = {3},
  pages        = {289--298},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.adhoc.2005.11.005},
  doi          = {10.1016/J.ADHOC.2005.11.005},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/KomninosVD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KomninosVD07,
  author       = {Nikos Komninos and
                  Dimitrios D. Vergados and
                  Christos Douligeris},
  title        = {Authentication in a layered security approach for mobile ad hoc networks},
  journal      = {Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {373--380},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.cose.2006.12.011},
  doi          = {10.1016/J.COSE.2006.12.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KomninosVD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/KomninosVD07,
  author       = {Nikos Komninos and
                  Dimitrios D. Vergados and
                  Christos Douligeris},
  title        = {Multifold node authentication in mobile \emph{ad hoc} networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {20},
  number       = {12},
  pages        = {1391--1406},
  year         = {2007},
  url          = {https://doi.org/10.1002/dac.882},
  doi          = {10.1002/DAC.882},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/KomninosVD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/KomninosD07,
  author       = {Nikos Komninos and
                  Tassos Dimitriou},
  editor       = {Seong{-}Whan Lee and
                  Stan Z. Li},
  title        = {Protecting Biometric Templates with Image Watermarking Techniques},
  booktitle    = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul,
                  Korea, August 27-29, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4642},
  pages        = {114--123},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74549-5\_13},
  doi          = {10.1007/978-3-540-74549-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/KomninosD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icps/MitrokotsaKD07,
  author       = {Aikaterini Mitrokotsa and
                  Nikos Komninos and
                  Christos Douligeris},
  title        = {Intrusion Detection with Neural Networks and Watermarking Techniques
                  for {MANET}},
  booktitle    = {Proceedings of the {IEEE} International Conference on Pervasive Services,
                  {ICPS} 2007, 15-20 July, 2007, Istanbul, Turkey},
  pages        = {118--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERSER.2007.4283901},
  doi          = {10.1109/PERSER.2007.4283901},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icps/MitrokotsaKD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KomninosVD06,
  author       = {Nikos Komninos and
                  Dimitris Vergados and
                  Christos Douligeris},
  title        = {Layered security design for mobile ad hoc networks},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {121--130},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2005.09.005},
  doi          = {10.1016/J.COSE.2005.09.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KomninosVD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics