Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Anna Angelogianni"'
Publikováno v:
IEEE Access, Vol 8, Pp 224677-224701 (2020)
Wireless networks constitute a significant attack vector for adversaries due to their wide usage in our everyday life. As the fifth generation of wireless networks reaches maturity, several vulnerabilities affecting earlier generations have been reso
Externí odkaz:
https://doaj.org/article/441e5e4373774583b7e8c00ebe9d8915
Autor:
Orestis Mavropoulos, Sokratis Nifakos, Dimitris Xydias, Timo Kasig, Stefanos Vrochidis, Theodora Tsikrika, Dimitris Kavallieros, Ilias Koritsas, Arnlont Spyros, Alexandros Tavernarakis, Thomas Krousarlis, Anna Angelogianni, Bruno Vidalenc, Mihaela Coroiu, Sergiu Marin, Sofoklis Efremidis, Eyvenia Vergi, Christos Sakkas, Nikolaos Vrionis, Erik Andres, Fernando Leeson, Kapouranis Dimitrios, Lapidaki Kalliopi, Spyridon Papastergiou, Konstantina Stelliou, Karina Sanchez, Ntafloukas Konstantinos
In today’s world, it is more important than ever to be aware of the dangers of cyber security threats. With the increasing reliance on technology, our personal and professional lives are at risk if we do not take the necessary precautions to protec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::952701bc44821854077310e620d540f2
Publikováno v:
Proceedings of the 17th International Conference on Availability, Reliability and Security.
Digitization, in terms of online services, work environment and other day-to-day procedures, has lead to the wide adoption and use of the respective digital identities. Users utilize their digital personas and their corresponding attributes on a dail
Autor:
Filippo Rebecchi, Antonio Pastor, Alberto Mozo, Chiara Lombardo, Roberto Bruschi, lias Aliferis, Roberto Doriguzzi-Corin, Panagiotis Gouvas, Antonio Alvarez Romero, Anna Angelogianni, Ilias Politis, Christos Xenakis
Service providers, 5G network operators and, more generally, vertical industries face today a dangerous shortage of highly skilled cybersecurity experts. Along with the escalation and growing sophistication of cyber-attacks, 5G networks require the t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f945e40ffbd685c87b9d6a6ae3e25b96
Publikováno v:
2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
Cyber ranges are proven to be effective towards the direction of cyber security training. Nevertheless, the existing literature in the area of cyber ranges does not cover, to our best knowledge, the field of 5G security training. 5G networks, though,
Publikováno v:
Proceedings of the 22nd Pan-Hellenic Conference on Informatics -PCI '18
Proceedings of the 22nd Pan-Hellenic Conference on Informatics-PCI 18
Proceedings of the 22nd Pan-Hellenic Conference on Informatics
PCI
Proceedings of the 22nd Pan-Hellenic Conference on Informatics-PCI 18
Proceedings of the 22nd Pan-Hellenic Conference on Informatics
PCI
This paper performs a forensic investigation to a set of Android mobile applications aiming at discovering sensitive information related to the owner of the mobile device. These applications were chosen based on the fact that: i) they are very popula
Autor:
'ANNA ANGELOGIANNI
Publikováno v:
Politis, Ilias
ILIAS POLITIS
ILIAS POLITIS