Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Efstratios Chatzoglou"'
Publikováno v:
IEEE Access, Vol 10, Pp 64761-64784 (2022)
Wi-Fi is arguably the most proliferated wireless technology today. Due to its massive adoption, Wi-Fi deployments always remain in the epicenter of attackers and evildoers. Surprisingly, research regarding machine learning driven intrusion detection
Externí odkaz:
https://doaj.org/article/faaa09f8f9ae424cb73ea9b94dc27a12
Publikováno v:
Sensors, Vol 23, Iss 6, p 2967 (2023)
A challenging problem in millimeter wave (mmWave) communications for the fifth generation of cellular communications and beyond (5G/B5G) is the beam selection problem. This is due to severe attenuation and penetration losses that are inherent in the
Externí odkaz:
https://doaj.org/article/c73e5ec97a5e46e6ab3794d1f1141d8f
Publikováno v:
IEEE Access, Vol 9, Pp 34188-34205 (2021)
This work serves two key objectives. First, it markedly supplements and extends the well-known AWID corpus by capturing and studying traces of a wide variety of attacks hurled in the IEEE 802.1X Extensible Authentication Protocol (EAP) environment. S
Externí odkaz:
https://doaj.org/article/fd96e0dc4ee9486fb78d41d6fc6cdf04
Autor:
Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes, Christos Zaroliagis
Publikováno v:
Cryptography, Vol 6, Iss 4, p 53 (2022)
This work attempts to provide a way of scrutinizing the security robustness of Wi-Fi implementations in an automated fashion. To this end, to our knowledge, we contribute the first full-featured and extensible Wi-Fi fuzzer. At the time of writing, th
Externí odkaz:
https://doaj.org/article/8eecfa50e8f84fbcb5e62eb33397ff32
Publikováno v:
Sensors, Vol 22, Iss 15, p 5633 (2022)
Intrusion detection in wireless and, more specifically, Wi-Fi networks is lately increasingly under the spotlight of the research community. However, the literature currently lacks a comprehensive assessment of the potential to detect application lay
Externí odkaz:
https://doaj.org/article/45065fdf4aa3471fb9c961850a26fac5
Autor:
Vasileios Kouliaridis, Georgios Kambourakis, Efstratios Chatzoglou, Dimitrios Geneiatakis, Hua Wang
Publikováno v:
PLoS ONE, Vol 16, Iss 5, p e0251867 (2021)
Contact tracing has historically been used to retard the spread of infectious diseases, but if it is exercised by hand in large-scale, it is known to be a resource-intensive and quite deficient process. Nowadays, digital contact tracing has promptly
Externí odkaz:
https://doaj.org/article/79d2abf9f2144624b836f1468483ca40
Autor:
Vasileios Kouliaridis, Georgios Kambourakis, Efstratios Chatzoglou, Dimitrios Geneiatakis, Hua Wang
Publikováno v:
PLoS ONE, Vol 16, Iss 9, p e0258074 (2021)
[This corrects the article DOI: 10.1371/journal.pone.0251867.].
Externí odkaz:
https://doaj.org/article/485153de95084d01b53d6db0b21d0d73
Publikováno v:
Sensors, Vol 22, Iss 2, p 513 (2022)
The impact that IoT technologies have on our everyday life is indisputable. Wearables, smart appliances, lighting, security controls, and others make our life simpler and more comfortable. For the sake of easy monitoring and administration, such devi
Externí odkaz:
https://doaj.org/article/054fd07829e14dc7b69ca62bffbf639a
Publikováno v:
Future Internet, Vol 13, Iss 3, p 58 (2021)
Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of soft
Externí odkaz:
https://doaj.org/article/5a6f446489d14fd08f74aa3866299052
Publikováno v:
International Journal of Information Security. 22:347-365
Built on top of UDP, the recently standardized QUIC protocol primarily aims to gradually replace the TCP plus TLS plus HTTP/2 model. For instance, HTTP/3 is designed to exploit QUIC’s features, including reduced connection establishment time, multi