Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?., , , , , and . SECRYPT, page 301-308. SciTePress, (2015)A Client-Side Privacy Framework for Web Personalization., , , and . Semantic Hyper/Multimedia Adaptation, volume 418 of Studies in Computational Intelligence, Springer, (2013)Securely Making "Things" Right., , and . Computer, 48 (9): 84-88 (2015)Security, Privacy, and Trust on Internet of Things., , , and . Wirel. Commun. Mob. Comput., (2019)WiF0: All Your Passphrase Are Belong to Us., , and . Computer, 54 (7): 82-88 (2021)DDoS in the IoT: Mirai and Other Botnets., , , and . Computer, 50 (7): 80-84 (2017)TermID: a distributed swarm intelligence-based approach for wireless intrusion detection., , and . Int. J. Inf. Sec., 16 (4): 401-416 (2017)Cybertrust in the IoT Age., , , , and . Computer, 51 (7): 12-15 (2018)Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset., , , and . IEEE Commun. Surv. Tutorials, 18 (1): 184-208 (2016)Intrusion detection in wireless networks using nature inspired algorithms. University of the Aegean, Greece, (2014)National Archive of PhD Theses: oai:10442/34647.