Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach., , , , and . QRS, page 69-73. IEEE, (2016)Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis., , and . CS2@HiPEAC, page 13-18. ACM, (2015)A unified architecture for integrating energy harvesting IoT devices with the Mobile Edge Cloud., , , , , and . WF-IoT, page 13-18. IEEE, (2018)Design Issues in Secure Embedded Systems., , and . Embedded Systems Design and Verification, chapter 18, CRC Press, 2nd edition, (2009)Αρχιτεκτονική ασφάλειας δικτύων ενσωματωμένων συστημάτων. University of Patras, Greece, (2008)National Archive of PhD Theses: oai:10442/26344.A Comparison of TERO and RO Timing Sensitivity for Hardware Trojan Detection Applications., and . DSD, page 547-550. IEEE Computer Society, (2015)Active hardware attacks and proactive countermeasures., and . ISCC, page 361-366. IEEE Computer Society, (2002)Pulse: A Class of Super-Worms against Network Infrastructure., and . ICDCS Workshops, page 28-. IEEE Computer Society, (2003)An HMM-Based Anomaly Detection Approach for SCADA Systems., and . WISTP, volume 9895 of Lecture Notes in Computer Science, page 85-99. Springer, (2016)Security challenges in embedded systems., and . ACM Trans. Embed. Comput. Syst., 12 (1s): 66:1-66:10 (2013)