UP - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 44
1.
  • A Survey of IoT-Enabled Cyb... A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services
    Stellios, Ioannis; Kotzanikolaou, Panayiotis; Psarakis, Mihalis ... IEEE Communications surveys and tutorials, 01/2018, Volume: 20, Issue: 4
    Journal Article
    Peer reviewed

    As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no surprise that many recent cyber attacks are IoT-enabled : the attacker initially exploits some vulnerable ...
Full text
2.
  • Security in IoMT Communicat... Security in IoMT Communications: A Survey
    Koutras, Dimitris; Stergiopoulos, George; Dasaklis, Thomas ... Sensors, 08/2020, Volume: 20, Issue: 17
    Journal Article
    Peer reviewed
    Open access

    The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of ...
Full text

PDF
3.
  • An Adaptive, Situation-Base... An Adaptive, Situation-Based Risk Assessment and Security Enforcement Framework for the Maritime Sector
    Grigoriadis, Christos; Laborde, Romain; Verdier, Antonin ... Sensors, 01/2022, Volume: 22, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Maritime processes involve actors and systems that continuously change their underlying environment, location and threat exposure. Thus, risk mitigation requires a dynamic risk assessment process, ...
Full text

PDF
4.
  • A Hierarchical Multi Blockc... A Hierarchical Multi Blockchain for Fine Grained Access to Medical Data
    Malamas, Vangelis; Kotzanikolaou, Panayiotis; Dasaklis, Thomas K. ... IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    The health care ecosystem involves various interconnected stakeholders with different, and sometimes conflicting security and privacy needs. Sharing medical data, sometimes generated by remote ...
Full text

PDF
5.
  • A Distributed Model for Pri... A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation
    Kalogeropoulos, Panayiotis; Papanikas, Dimitris; Kotzanikolaou, Panayiotis Journal of cybersecurity and privacy, 12/2022, Volume: 2, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Although Vehicle to Infrastructure (V2I) communications greatly improve the efficiency of early warning systems for car safety, communication privacy is an important concern. Although solutions exist ...
Full text
6.
  • Janus: Hierarchical Multi-B... Janus: Hierarchical Multi-Blockchain-Based Access Control (HMBAC) for Multi-Authority and Multi-Domain Environments
    Malamas, Vangelis; Palaiologos, George; Kotzanikolaou, Panayiotis ... Applied sciences, 01/2023, Volume: 13, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, ...
Full text
7.
  • Risk Assessment Methodologi... Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal
    Malamas, Vangelis; Chantzis, Fotis; Dasaklis, Thomas K. ... IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    The Internet of Medical Things (IoMT) has revolutionized health care services by providing significant benefits in terms of patient well being and relevant costs. Traditional risk assessment ...
Full text

PDF
8.
  • A Dependency Analysis Model... A Dependency Analysis Model for Resilient Wide Area Measurement Systems in Smart Grid
    Shahraeini, Mohammad; Kotzanikolaou, Panayiotis IEEE journal on selected areas in communications, 2020-Jan., 2020-1-00, 20200101, Volume: 38, Issue: 1
    Journal Article
    Peer reviewed

    Wide Area Measurement Systems (WAMS) consist of the measuring and the communication layers (infrastructures) of smart grids, which are used to monitor, operate and control the electrical ...
Full text
9.
  • Security Awareness of the D... Security Awareness of the Digital Natives
    Gkioulos, Vasileios; Wangen, Gaute; Katsikas, Sokratis ... Information, 04/2017, Volume: 8, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Young generations make extensive use of mobile devices, such as smartphones, tablets and laptops, while a plethora of security risks associated with such devices are induced by vulnerabilities ...
Full text

PDF
10.
  • TS-LoRa: Time-slotted LoRaW... TS-LoRa: Time-slotted LoRaWAN for the Industrial Internet of Things
    Zorbas, Dimitrios; Abdelfadeel, Khaled; Kotzanikolaou, Panayiotis ... Computer communications, 03/2020, Volume: 153
    Journal Article
    Peer reviewed
    Open access

    Automation and data capture in manufacturing, known as Industry 4.0, requires the deployment of a large number of wireless sensor devices in industrial environments. These devices have to be ...
Full text

PDF
1 2 3 4 5
hits: 44

Load filters