Zobrazeno 1 - 10
of 93
pro vyhledávání: '"George Loukas"'
Publikováno v:
Scientific Data, Vol 11, Iss 1, Pp 1-10 (2024)
Abstract With the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to detecting Android malware in recent years. As a result, a reliable a
Externí odkaz:
https://doaj.org/article/abc784bc8d5d4c4788559ac970e04d1c
Publikováno v:
Scientific Data, Vol 11, Iss 1, Pp 1-1 (2024)
Externí odkaz:
https://doaj.org/article/c0e6e213194f435bb000a8e4e0fec023
Autor:
Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, K. Liang, George Loukas, Emmanouil Panaousis
Publikováno v:
IEEE Access, Vol 10, Pp 104671-104685 (2022)
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. To protect these entit
Externí odkaz:
https://doaj.org/article/fcb226e538cc4d55b9b343b39346a3e9
Publikováno v:
Applied Sciences, Vol 13, Iss 15, p 9032 (2023)
The Internet of Things (IoT) continues to grow at a rapid pace, becoming integrated into the daily operations of individuals and organisations. IoT systems automate crucial services within daily life that users may rely on, which makes the assurance
Externí odkaz:
https://doaj.org/article/605dc26b78a24a35bf37ee1a13c48c7d
Autor:
Kai He, Yijun Mao, Jianting Ning, Kaitai Liang, Xinyi Huang, Emmanouil Panaousis, George Loukas
Publikováno v:
IEEE Access, Vol 7, Pp 50658-50668 (2019)
Encryption technologies have become one of the most prevalent solutions to safeguard data confidentiality in many real-world applications, e.g., cloud-based data storage systems. Encryption outputting a relatively “static” format of encrypted dat
Externí odkaz:
https://doaj.org/article/b23ecbc1ba5644eba6dcba9a8cfc8cda
Autor:
Agapi Tsironi Lamari, Spyros Panagiotakis, Zacharias Kamarianakis, George Loukas, Athanasios Malamos, Evangelos Markakis
Publikováno v:
Information, Vol 13, Iss 6, p 304 (2022)
In the present work, a methodology for the low-cost crafting of an interactive layered dashboard is proposed. Our aim is that the tangible surface be constructed using domestic materials that are easily available in every household. Several tests wer
Externí odkaz:
https://doaj.org/article/a38b98d3423148b4bda1c3ab8a9478c5
Autor:
Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 16 (2020)
Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation. It finds wide applications especially in the distributed environment where the entities
Externí odkaz:
https://doaj.org/article/1b95f1a6f7e94912905ef96047115d63
Publikováno v:
IEEE Access, Vol 6, Pp 3491-3508 (2018)
Detection of cyber attacks against vehicles is of growing interest. As vehicles typically afford limited processing resources, proposed solutions are rule-based or lightweight machine learning techniques. We argue that this limitation can be lifted w
Externí odkaz:
https://doaj.org/article/1089faa40e054bbc863de673054b2d94
Autor:
MD. Abdur Rahman, M. Shamim Hossain, George Loukas, Elham Hassanain, Syed Sadiqur Rahman, Mohammed F. Alhamid, Mohsen Guizani
Publikováno v:
IEEE Access, Vol 6, Pp 72469-72478 (2018)
Mobile edge computing (MEC) is being introduced and leveraged in many domains, but few studies have addressed MEC for secure in-home therapy management. To this end, this paper presents an in-home therapy management framework, which leverages the IoT
Externí odkaz:
https://doaj.org/article/bb78d6b9684c4765937a2c71146cd400
Publikováno v:
Sensors, Vol 21, Iss 16, p 5300 (2021)
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction
Externí odkaz:
https://doaj.org/article/984144dd7cfb45a5b20775416231808d