default search action
Gregory Epiphaniou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Anita Khadka, Saurav Sthapit, Gregory Epiphaniou, Carsten Maple:
Resilient Machine Learning: Advancement, Barriers, and Opportunities in the Nuclear Industry. ACM Comput. Surv. 56(9): 224:1-224:29 (2024) - [j41]Alexandros A. Stavdas, Evangelos A. Kosmatos, Carsten Maple, Emilio Hugues-Salas, Gregory Epiphaniou, Daniel S. Fowler, Shadi A. Razak, Chris Matrakidis, Hu Yuan, Andrew Lord:
Quantum Key Distribution for V2I communications with software-defined networking. IET Quantum Commun. 5(1): 38-45 (2024) - [j40]Al Tariq Sheik, Carsten Maple, Gregory Epiphaniou, Mehrdad Dianati:
A Comprehensive Survey of Threats in Platooning - A Cloud-Assisted Connected and Autonomous Vehicle Application. Inf. 15(1): 14 (2024) - [j39]Mahender Kumar, Gregory Epiphaniou, Carsten Maple:
SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing. Internet Things 28: 101334 (2024) - [j38]Roberto Leyva, Victor Sanchez, Gregory Epiphaniou, Carsten Maple:
Data-agnostic Face Image Synthesis Detection using Bayesian CNNs. Pattern Recognit. Lett. 183: 64-70 (2024) - [j37]Al Tariq Sheik, Carsten Maple, Gregory Epiphaniou, Mehrdad Dianati:
Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment. Sensors 24(1): 241 (2024) - [c24]Christina Katsini, Gregory Epiphaniou, Carsten Maple:
Towards an Evaluation Framework for Extended Reality Authentication Schemes. CHI Extended Abstracts 2024: 339:1-339:6 - [c23]Roberto Leyva, Victor Sanchez, Gregory Epiphaniou, Carsten Maple:
Demographic Bias Effects on Face Image Synthesis. CVPR Workshops 2024: 3818-3826 - [c22]Saadullah Farooq Abbasi, James Churm, Omid Pournik, Gregory Epiphaniou, Theodoros N. Arvanitis:
Deep Learning-Based Synthetic Skin Lesion Image Classification. MIE 2024: 1145-1150 - [c21]Parisis Gallos, Nicholas Matragkas, Saif ul Islam, Gregory Epiphaniou, Scott Hansen, Stuart Harrison, Marcel R. Haas, Giorgos Pappous, Simon Brouwer, Francesco Torlontano, Saadullah Farooq Abbasi, Omid Pournik, James Churm, John Mantas, Carlos Luis Parra Calderón, Dimitrios Petkousis, Patrick Weber, Benjamin Dzingina, Chokri Mraidha, Carsten Maple, Jim Achterberg, Marco Spruit, Evi Saratsioti, Younes Moustaghfir, Theodoros N. Arvanitis:
INSAFEDARE Project: Innovative Applications of Assessment and Assurance of Data and Synthetic Data for Regulatory Decision Support. MIE 2024: 1193-1197 - [c20]Nabil Moukafih, Hongsen Zhang, Gregory Epiphaniou, Carsten Maple, Steve Taylor, Laura Carmichael:
Semi-Automated Threat Vulnerability & Risk Assessment (TVRA) for Medical Devices. PETRA 2024 - [c19]Steve Taylor, Martin Gilje Jaatun, Karin Bernsmed, Christos Androutsos, Dietmar Frey, Simone Favrin, João Rodrigues, DusKo Milojevic, Dimitrios A. Karras, Ioannis Siachos, Gregory Epiphaniou, Nabil Moukafih, Sotiris Messinis, Ioannis Rallis, Nicholas E. Protonotarios, Paul Gedeon, Andres Castillo, Carsten Maple, Nikolaos Drivalos Matragkas, Rance J. DeLong, Theodoros N. Arvanitis, Konstantinos Katzis:
A Way Forward for the MDCG 2019-16 Medical Device Security Guidance. PETRA 2024 - [i15]Roberto Leyva, Victor Sanchez, Gregory Epiphaniou, Carsten Maple:
Data-Agnostic Face Image Synthesis Detection Using Bayesian CNNs. CoRR abs/2401.04241 (2024) - [i14]Roberto Leyva, Victor Sanchez, Gregory Epiphaniou, Carsten Maple:
Detecting Face Synthesis Using a Concealed Fusion Model. CoRR abs/2401.04257 (2024) - [i13]Lu Zhang, Nabil Moukafih, Hamad Alamri, Gregory Epiphaniou, Carsten Maple:
A BERT-based Empirical Study of Privacy Policies' Compliance with GDPR. CoRR abs/2407.06778 (2024) - [i12]Bram van Dijk, Saif ul Islam, Jim Achterberg, Hafiz Muhammad Waseem, Parisis Gallos, Gregory Epiphaniou, Carsten Maple, Marcel R. Haas, Marco Spruit:
A Novel Taxonomy for Navigating and Classifying Synthetic Data in Healthcare Applications. CoRR abs/2409.00701 (2024) - 2023
- [j36]Hu Yuan, Daniel S. Fowler, Carsten Maple, Gregory Epiphaniou:
Analysis of outage performance in a 6G-V2X communications system utilising free-space optical quantum key distribution. IET Quantum Commun. 4(4): 191-199 (2023) - [j35]Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou:
An optimized fuzzy deep learning model for data classification based on NSGA-II. Neurocomputing 522: 116-128 (2023) - [j34]Sandeep Gupta, Gregory Epiphaniou, Carsten Maple:
AI-augmented usability evaluation framework for software requirements specification in cyber physical human systems. Internet Things 23: 100841 (2023) - [j33]Hamidreza Jahangir, Subhash Lakshminarayana, Carsten Maple, Gregory Epiphaniou:
A Deep-Learning-Based Solution for Securing the Power Grid Against Load Altering Threats by IoT-Enabled Devices. IEEE Internet Things J. 10(12): 10687-10697 (2023) - [j32]Mohammad Hammoudeh, Gregory Epiphaniou, Pedro Pinto:
Cyber-Physical Systems: Security Threats and Countermeasures. J. Sens. Actuator Networks 12(1): 18 (2023) - [j31]Amjad Mehmood, Gregory Epiphaniou, Carsten Maple, Nikolaos Ersotelos, Richard Wiseman:
A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites. Sensors 23(21): 8720 (2023) - [j30]Gregory Epiphaniou, Mohammad Hammoudeh, Hu Yuan, Carsten Maple, Uchenna Ani:
Digital twins in cyber effects modelling of IoT/CPS points of low resilience. Simul. Model. Pract. Theory 125: 102744 (2023) - [j29]Meiling Li, Hu Yuan, Carsten Maple, Wenjie Cheng, Gregory Epiphaniou:
Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks. IEEE Syst. J. 17(1): 1045-1055 (2023) - [j28]Mary Asante, Gregory Epiphaniou, Carsten Maple, Haider M. Al-Khateeb, Mirko Bottarelli, Kayhan Zrar Ghafoor:
Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey. IEEE Trans. Engineering Management 70(2): 713-739 (2023) - [j27]Mahmoud A. Shawky, Mirko Bottarelli, Gregory Epiphaniou, Petros Karadimas:
An Efficient Cross-Layer Authentication Scheme for Secure Communication in Vehicular Ad-Hoc Networks. IEEE Trans. Veh. Technol. 72(7): 8738-8754 (2023) - [c18]Mahender Kumar, Gregory Epiphaniou, Carsten Maple:
Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems. ACNS Workshops 2023: 321-335 - [c17]Lu Zhang, Nabil Moukafih, Hamad Alamri, Gregory Epiphaniou, Carsten Maple:
A BERT-based Empirical Study of Privacy Policies' Compliance with GDPR. CNS 2023: 1-6 - [c16]Mahender Kumar, Ruby Rani, Mirko Bottarelli, Gregory Epiphaniou, Carsten Maple:
Science Technology Ontology: A Taxonomy of Emerging Topics. TEXT2KG/BiKE@ESWC 2023: 101-117 - [c15]Roberto Leyva, Gregory Epiphaniou, Carsten Maple, Victor Sanchez:
Unsupervised Face Synthesis Based on Human Traits. IWBF 2023: 1-6 - [c14]Parisis Gallos, Rance J. DeLong, Nicholas Matragkas, Allan Blanchard, Chokri Mraidha, Gregory Epiphaniou, Carsten Maple, Konstantinos Katzis, Jaime Delgado, Silvia Llorente, Pedro Maló, Andreas Menychtas, Christos Panagopoulos, Ilias Maglogiannis, Petros Papachristou, Mariana Soares, Paula Breia, Ana Cristina Vidal, Martin Ratz, Ross Williamson, Eduard Erwee, Lukasz Stasiak, Orfeu Flores, Carla Clemente, John Mantas, Patrick Weber, Theodoros N. Arvanitis, Scott Hansen:
MedSecurance Project: Advanced Security-for-Safety Assurance for Medical Device IoT (IoMT). MIE 2023: 337-341 - [i11]Mahender Kumar, Ruby Rani, Mirko Bottarelli, Gregory Epiphaniou, Carsten Maple:
Science and Technology Ontology: A Taxonomy of Emerging Topics. CoRR abs/2305.04055 (2023) - [i10]Mahender Kumar, Gregory Epiphaniou, Carsten Maple:
Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems. CoRR abs/2305.04102 (2023) - [i9]Carsten Maple, Lukasz Szpruch, Gregory Epiphaniou, Kalina Staykova, Simran Singh, William Penwarden, Yisi Wen, Zijian Wang, Jagdish Hariharan, Pavle Avramovic:
The AI Revolution: Opportunities and Challenges for the Finance Sector. CoRR abs/2308.16538 (2023) - [i8]Ayei E. Ibor, Mark Hooper, Carsten Maple, Gregory Epiphaniou:
Trustworthy Cross-Border Interoperable Identity System for Developing Countries. CoRR abs/2310.16562 (2023) - 2022
- [j26]Saurav Sthapit, Subhash Lakshminarayana, Ligang He, Gregory Epiphaniou, Carsten Maple:
Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks. IEEE Internet Things J. 9(14): 12351-12363 (2022) - [j25]Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Gregory Epiphaniou, Amar Aggoun:
Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems. IEEE Internet Things J. 9(15): 13279-13297 (2022) - [j24]Ghulam Abbas, Amjad Mehmood, Carsten Maple, Gregory Epiphaniou, Jaime Lloret:
Safety, Security and Privacy in Machine Learning Based Internet of Things. J. Sens. Actuator Networks 11(3): 38 (2022) - [j23]Hamad Alamri, Carsten Maple, Saad Mohamad, Gregory Epiphaniou:
Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store. Sensors 22(22): 8964 (2022) - [j22]Rafael Salema Marques, Haider M. Al-Khateeb, Gregory Epiphaniou, Carsten Maple:
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition. IEEE Trans. Inf. Forensics Secur. 17: 700-715 (2022) - [c13]Williams Afrifah, Gregory Epiphaniou, Nikolaos Ersotelos, Carsten Maple:
Barriers and Opportunities In Cyber Risk And Compliance Management For Data-Driven Supply Chains. HICSS 2022: 1-10 - [c12]Chen Wan, Amjad Mehmood, Carsten Maple, Gregory Epiphaniou, Jaime Lloret:
A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol. IOTSMS 2022: 1-8 - 2021
- [j21]Ugur-Ilker Atmaca, Carsten Maple, Gregory Epiphaniou, Mehrdad Dianati:
A privacy-preserving route planning scheme for the Internet of Vehicles. Ad Hoc Networks 123: 102680 (2021) - [j20]Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Carsten Maple, Gregory Epiphaniou, Mohammad Hammoudeh, Hamid Jahankhani, Prashant Pillai:
Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data. Comput. Electr. Eng. 91: 107047 (2021) - [j19]Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens:
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105: 102248 (2021) - [j18]Devrim Unal, Mohammad Hammoudeh, Muhammad Asif Khan, Abdelrahman Abuarqoub, Gregory Epiphaniou, Ridha Hamila:
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things. Comput. Secur. 109: 102393 (2021) - [j17]Nikolaos Ersotelos, Mirko Bottarelli, Haider M. Al-Khateeb, Gregory Epiphaniou, Zhraa A. Alhaboby, Prashant Pillai, Amar Aggoun:
Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study. J. Sens. Actuator Networks 10(1): 1 (2021) - [j16]Mohammad Hammoudeh, Paul A. Watters, Gregory Epiphaniou, A. S. M. Kayes, Pedro Pinto:
Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems". J. Sens. Actuator Networks 10(3): 54 (2021) - [j15]Fahad Saeed, Amjad Mehmood, Muhammad Faran Majeed, Carsten Maple, Khalid Saeed, Muhammad Kashif Khattak, Huihui Wang, Gregory Epiphaniou:
Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles. Phys. Commun. 48: 101373 (2021) - [j14]Rafael Salema Marques, Gregory Epiphaniou, Haider M. Al-Khateeb, Carsten Maple, Mohammad Hammoudeh, Paulo André Lima de Castro, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks. ACM Trans. Internet Techn. 21(4): 103:1-103:30 (2021) - [j13]Mirko Bottarelli, Petros Karadimas, Gregory Epiphaniou, Dhouha Kbaier Ben Ismail, Carsten Maple:
Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications. IEEE Trans. Veh. Technol. 70(3): 2310-2321 (2021) - [c11]Mary Asante, Carsten Maple, Gregory Epiphaniou:
Prevention of IoT-Enabled Crime Using Home Routers (PITCHR). SmartCity360° 2021: 470-481 - [i7]Saurav Sthapit, Subhash Lakshminarayana, Ligang He, Gregory Epiphaniou, Carsten Maple:
Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks. CoRR abs/2111.05259 (2021) - 2020
- [j12]Kayhan Zrar Ghafoor, Linghe Kong, Sherali Zeadally, Ali Safaa Sadiq, Gregory Epiphaniou, Mohammad Hammoudeh, Ali Kashif Bashir, Shahid Mumtaz:
Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives. IEEE Internet Things J. 7(9): 8525-8546 (2020) - [j11]Mohammad Hammoudeh, John Pimlott, Sana Belguith, Gregory Epiphaniou, Thar Baker, A. S. M. Kayes, Bamidele Adebisi, Ahcène Bounceur:
Network Traffic Analysis for Threat Detection in the Internet of Things. IEEE Internet Things Mag. 3(4): 40-45 (2020) - [j10]Soodamani Ramalingam, Hock Gan, Gregory Epiphaniou, Emilio Mistretta:
A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments. Sensors 20(18): 5252 (2020) - [j9]Gregory Epiphaniou, Prashant Pillai, Mirko Bottarelli, Haider M. Al-Khateeb, Mohammad Hammoudeh, Carsten Maple:
Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security". IEEE Trans. Engineering Management 67(3): 979 (2020) - [j8]Gregory Epiphaniou, Prashant Pillai, Mirko Bottarelli, Haider M. Al-Khateeb, Mohammad Hammoudeh, Carsten Maple:
Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security. IEEE Trans. Engineering Management 67(4): 1059-1073 (2020) - [i6]Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens:
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. CoRR abs/2006.11929 (2020) - [i5]Carsten Maple, Peter Davies, Kerstin Eder, Chris Hankin, Greg Chance, Gregory Epiphaniou:
CyRes - Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract). CoRR abs/2006.14890 (2020)
2010 – 2019
- 2019
- [j7]Marcus Walshe, Gregory Epiphaniou, Haider M. Al-Khateeb, Mohammad Hammoudeh, Vasilios Katos, Ali Dehghantanha:
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks 95 (2019) - [j6]Mike Mackintosh, Gregory Epiphaniou, Haider M. Al-Khateeb, Keith J. Burnham, Prashant Pillai, Mohammad Hammoudeh:
Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems. J. Sens. Actuator Networks 8(1): 14 (2019) - [c10]Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Gregory Epiphaniou, Jon Cosson, Hamid Jahankhani, Prashant Pillai:
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace. ICGS3 2019 - [c9]Joseph Waldu Woensdregt, Haider M. Al-Khateeb, Gregory Epiphaniou, Hamid Jahankhani:
AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms. ICGS3 2019 - [p5]Yee-Yang Teing, Sajad Homayoun, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou:
Private Cloud Storage Forensics: Seafile as a Case Study. Handbook of Big Data and IoT Security 2019: 73-127 - [p4]Krzysztof Nagrabski, Michael Hopkins, Milda Petraityte, Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou, Mohammad Hammoudeh:
Distributed Filesystem Forensics: Ceph as a Case Study. Handbook of Big Data and IoT Security 2019: 129-151 - [p3]Mohammed Asim, Dean Richard McKinnel, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou:
Big Data Forensics: Hadoop Distributed File Systems as a Case Study. Handbook of Big Data and IoT Security 2019: 179-210 - [p2]Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Gregory Epiphaniou:
Security in Online Games: Current Implementations and Challenges. Handbook of Big Data and IoT Security 2019: 367-384 - 2018
- [j5]Mirko Bottarelli, Gregory Epiphaniou, Dhouha Kbaier Ben Ismail, Petros Karadimas, Haider M. Al-Khateeb:
Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Comput. Secur. 78: 454-476 (2018) - [j4]Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider M. Al-Khateeb, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks. IEEE Internet Things J. 5(4): 2496-2505 (2018) - [c8]Mirko Bottarelli, Gregory Epiphaniou, Dhouha Kbaier Ben Ismail, Petros Karadimas, Haider M. Al-Khateeb:
Quantisation feasibility and performance of RSS-based secret key extraction in VANETs. Cyber Security 2018: 1-8 - [i4]Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou:
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies. CoRR abs/1807.10435 (2018) - [i3]Hamish Haughey, Gregory Epiphaniou, Haider M. Al-Khateeb, Ali Dehghantanha:
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence. CoRR abs/1808.01155 (2018) - [i2]Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider M. Al-Khateeb, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks. CoRR abs/1808.01202 (2018) - 2017
- [j3]Haider M. Al-Khateeb, Gregory Epiphaniou, Zhraa A. Alhaboby, James Barnes, Emma Short:
Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility. Telematics Informatics 34(4): 339-349 (2017) - [p1]Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou:
Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 79-89 - [i1]Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou:
Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors. CoRR abs/1706.08048 (2017) - 2016
- [j2]Hamish Haughey, Gregory Epiphaniou, Haider M. Al-Khateeb:
Anonymity networks and the fragile cyber ecosystem. Netw. Secur. 2016(3): 10-18 (2016) - 2014
- [c7]Ghazanfar Ali Safdar, Salah A. Albermany, Nauman Aslam, Ali Mansour, Gregory Epiphaniou:
Prevention against threats to self co-existence - A novel authentication protocol for cognitive radio networks. WMNC 2014: 1-6 - 2013
- [c6]Edewede Oriwoh, David Jazani, Gregory Epiphaniou, Paul Sant:
Internet of Things Forensics: Challenges and approaches. CollaborateCom 2013: 608-615 - [c5]Edewede Oriwoh, Paul Sant, Gregory Epiphaniou:
Guidelines for Internet of Things Deployment Approaches - The Thing Commandments. EUSPN/ICTH 2013: 122-131 - 2012
- [j1]Gregory Epiphaniou, Carsten Maple, Paul Sant, Ghazanfar Ali Safdar:
Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls. IET Inf. Secur. 6(3): 141-148 (2012) - 2011
- [c4]Carsten Maple, Valentina Viduto, Gregory Epiphaniou:
A Theoretical Framework for Addressing Trust in Open Pervasive Networks. PECCS 2011: 173-178 - 2010
- [c3]Gregory Epiphaniou, Carsten Maple, Paul Sant, Matthew Reeve:
Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss. ARES 2010: 33-40 - [c2]Gregory Epiphaniou, Carsten Maple, Paul Sant, Peter Norrington:
The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729. ICITST 2010: 1-6 - [c1]Gregory Epiphaniou, Carsten Maple, Paul Sant, Matthew Reeve:
An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes. SIGMAP 2010: 17-25
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint