Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Constantinos Kolias"'
Publikováno v:
Heliyon, Vol 10, Iss 4, Pp e26317- (2024)
Within both the cyber kill chain and MITRE ATT&CK frameworks, Lateral Movement (LM) is defined as any activity that allows adversaries to progressively move deeper into a system in seek of high-value assets. Although this timely subject has been stud
Externí odkaz:
https://doaj.org/article/e17501312c25484c91f29078d6837782
Publikováno v:
Future Internet, Vol 16, Iss 4, p 137 (2024)
Low-rate Denial of Service (LDoS) attacks are today considered one of the biggest threats against modern data centers and industrial infrastructures. Unlike traditional Distributed Denial of Service (DDoS) attacks that are mainly volumetric, LDoS att
Externí odkaz:
https://doaj.org/article/4906c05b3f824da5950efe7b5a80f22b
Publikováno v:
IEEE Access, Vol 10, Pp 64761-64784 (2022)
Wi-Fi is arguably the most proliferated wireless technology today. Due to its massive adoption, Wi-Fi deployments always remain in the epicenter of attackers and evildoers. Surprisingly, research regarding machine learning driven intrusion detection
Externí odkaz:
https://doaj.org/article/faaa09f8f9ae424cb73ea9b94dc27a12
Publikováno v:
IEEE Access, Vol 9, Pp 34188-34205 (2021)
This work serves two key objectives. First, it markedly supplements and extends the well-known AWID corpus by capturing and studying traces of a wide variety of attacks hurled in the IEEE 802.1X Extensible Authentication Protocol (EAP) environment. S
Externí odkaz:
https://doaj.org/article/fd96e0dc4ee9486fb78d41d6fc6cdf04
Autor:
Georgios Michail Makrakis, Constantinos Kolias, Georgios Kambourakis, Craig Rieger, Jacob Benjamin
Publikováno v:
IEEE Access, Vol 9, Pp 165295-165325 (2021)
Critical infrastructures and industrial organizations aggressively move towards integrating elements of modern Information Technology (IT) into their monolithic Operational Technology (OT) architectures. Yet, as OT systems progressively become more a
Externí odkaz:
https://doaj.org/article/1eee380385524bb58c3318fea0028854
Publikováno v:
Sensors, Vol 22, Iss 15, p 5633 (2022)
Intrusion detection in wireless and, more specifically, Wi-Fi networks is lately increasingly under the spotlight of the research community. However, the literature currently lacks a comprehensive assessment of the potential to detect application lay
Externí odkaz:
https://doaj.org/article/45065fdf4aa3471fb9c961850a26fac5
Autor:
Georgios Kambourakis, Constantinos Kolias, Dimitrios Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, Ioannis Kounelis
Publikováno v:
Symmetry, Vol 12, Iss 4, p 579 (2020)
Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace. At the same time, security and privacy concerns regarding IoT technologies are also attracting significant attention given the risks that are inherently a
Externí odkaz:
https://doaj.org/article/7f7f8c16d7de4125beb6674bd299490e
Publikováno v:
Future Internet, Vol 9, Iss 1, p 6 (2017)
The critical process of hiring has relatively recently been ported to the cloud. Specifically, the automated systems responsible for completing the recruitment of new employees in an online fashion, aim to make the hiring process more immediate, accu
Externí odkaz:
https://doaj.org/article/2beb1d30dd5b4edea3c444da524cab41
Autor:
Kurt A. Vedros, Georgios Michail Makrakis, Constantinos Kolias, Robert C. Ivans, Craig Rieger
Publikováno v:
Computer Science, Engineering and Applications.
Embedded devices are omnipresent in modern networks, including those facilitating missioncritical applications. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive defenses. Among such approa
Publikováno v:
Security and Communication Networks. 2022:1-24
This work provides an answer to the following key question: Are the Web-based management interfaces of the contemporary off-the-shelf wireless access points (WAP) free of flaws and vulnerabilities? The short answer is not very much. That is, after pe