Zobrazeno 1 - 10
of 118
pro vyhledávání: '"Christos Xenakis"'
Autor:
Dionysis Xenakis, Anastasia Tsiota, Christos-Thrasyvoulos Koulis, Christos Xenakis, Nikos Passas
Publikováno v:
IEEE Access, Vol 9, Pp 73963-74016 (2021)
The new “status quo” created by the emerging integration of Multi-Access Edge Computing (MEC) and Radio Access Network (RAN) infrastructures, combined with the openness of the 5G service market, have set new standards on how the multitude of 5G s
Externí odkaz:
https://doaj.org/article/da66e751765949d590f5d238bdf28ae2
Publikováno v:
IEEE Access, Vol 8, Pp 224677-224701 (2020)
Wireless networks constitute a significant attack vector for adversaries due to their wide usage in our everyday life. As the fifth generation of wireless networks reaches maturity, several vulnerabilities affecting earlier generations have been reso
Externí odkaz:
https://doaj.org/article/441e5e4373774583b7e8c00ebe9d8915
Autor:
George Suciu, Aristeidis Farao, Giorgio Bernardinetti, Ivan Palamà, Mari-Anais Sachian, Alexandru Vulpe, Marius-Constantin Vochin, Pavel Muresan, Michail Bampatsikos, Antonio Muñoz, Christos Xenakis
Publikováno v:
Sensors, Vol 22, Iss 17, p 6527 (2022)
IoT devices present an ever-growing domain with multiple applicability. This technology has favored and still favors many areas by creating critical infrastructures that are as profitable as possible. This paper presents a hierarchical architecture c
Externí odkaz:
https://doaj.org/article/38d39323531c40c98bf3c350802c7228
Publikováno v:
Information, Vol 12, Iss 9, p 357 (2021)
During the past decade, software development has evolved from a rigid, linear process to a highly automated and flexible one, thanks to the emergence of continuous integration and delivery environments. Nowadays, more and more development teams rely
Externí odkaz:
https://doaj.org/article/1a75cbc9d6b349319dc14f602bc89fba
Autor:
George Suciu, Mari-Anais Sachian, Alexandru Vulpe, Marius Vochin, Aristeidis Farao, Nikolaos Koutroumpouchos, Christos Xenakis
Publikováno v:
Sensors, Vol 21, Iss 16, p 5448 (2021)
Recent advancements in information and communication technologies (ICT) have improved the power grid, leading to what is known as the smart grid, which, as part of a critical economic and social infrastructure, is vulnerable to security threats from
Externí odkaz:
https://doaj.org/article/5a8328514a3e42d1b58b01171fadd8ad
Autor:
Gustavo Gonzalez-Granadillo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis, Emmanouil Panaousis
Publikováno v:
Sensors, Vol 21, Iss 16, p 5493 (2021)
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic app
Externí odkaz:
https://doaj.org/article/649d50696bfa415fb3a758b2763b26c7
Publikováno v:
Sensors, Vol 21, Iss 8, p 2686 (2021)
Due to its flexibility in terms of charging and billing, the smart grid is an enabler of many innovative energy consumption scenarios. One such example is when a landlord rents their property for a specific period to tenants. Then the electricity bil
Externí odkaz:
https://doaj.org/article/81d76958c2894e778da81b6f71e03406
Publikováno v:
Sensors, Vol 21, Iss 2, p 520 (2021)
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for
Externí odkaz:
https://doaj.org/article/f519c6b9806942c28224acc43a71895e
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 3, Iss 9, Pp 1-8 (2016)
Mobile application developers are using cryptography in their products to protect sensitive data like passwords, short messages, documents etc. In this paper, we study whether cryptography and related techniques are employed in a proper way, in order
Externí odkaz:
https://doaj.org/article/eef47dd40e864be2a3b2784c3eee3ba7
Publikováno v:
Future Generation Computer Systems. 134:219-235
Web Exploit Kits (EKs) are designed to exploit browsers and browsers plugins vulnerabilities, in order to serve malware without drawing user’s attention. Despite their longevity, EKs have adapted their modus operandi to new malware trends and pose