Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Giannetsos, Athanasios"'
Autor:
Liaqat, Shahzana, Akhunzada, Adnan, Shaikh, Fatema Sabeen, Giannetsos, Athanasios, Jan, Mian Ahmad
Publikováno v:
In Computer Communications 1 July 2020 160:697-705
Android's permission system empowers informed privacy de- cisions when installing third-party applications. However, ex- amining the access permissions is not enough to assess privacy exposure; even seemingly harmless applications can severely expose
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______305::987cc18fb7921325e8294e9f6055cc95
https://surrey.eprints-hosting.org/813664/
https://surrey.eprints-hosting.org/813664/
Autor:
Giannetsos, Athanasios, Michalas, A
The broad capabilities of current mobile devices have paved the way for Mobile Crowd Sensing (MCS) applications. The success of this emerging paradigm strongly depends on the quality of received data which, in turn, is contingent to mass user partici
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______305::5566c4987ee98e2d6ce273b66e527e38
https://surrey.eprints-hosting.org/813663/
https://surrey.eprints-hosting.org/813663/
Autor:
Giannetsos, Athanasios
Publikováno v:
Giannetsos, A 2011, Security Threats in Wireless Sensor Networks : Implementation of Attacks & Defense Mechanisms .
Over the last few years, technological advances in the design of processors, memory, and radio communications have propelled an active interest in the area of distributed sensor networking, in which a number of independent, self-sustainable nodes col
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::4310e570af31d27e11ff1d5847b12925
https://vbn.aau.dk/da/publications/c816dcce-8c50-456a-a999-5b8926de9b99
https://vbn.aau.dk/da/publications/c816dcce-8c50-456a-a999-5b8926de9b99
Publikováno v:
Giannetsos, A, Tassos, D & Prasad, N R 2010, Weaponizing Wireless Networks : An Attack Tool for Launching Attacks against Sensor Networks . in Blackhat Europe 2010, Digital Self Defense . Black Hat ® Technical Security Conference: Europe 2010, Barcelona, Spain, 12/04/2011 . < http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.3486 >
The pervasive interconnection of autonomous sensor devices has given birth to a broad class of exciting new applications. At the same time, however, the unattended nature and the limited resources of sensor nodes have created an equal number of vulne
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::aed38e545bf9c7bc3ffbf38c9ebdaafe
https://vbn.aau.dk/da/publications/f129210b-e7ae-43d0-8b78-1d326e3651b4
https://vbn.aau.dk/da/publications/f129210b-e7ae-43d0-8b78-1d326e3651b4
Publikováno v:
Giannetsos, A, Thanassis, D & Prasad, N R 2010, ' Detecting Wormholes in Wireless Sensor Networks ', Third ACM Conference on Wireless Network Security (WiSec'10), Hobroken, United States, 22/03/2010 .
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::029a31f7271b6132ffeb9f861b155d9a
https://vbn.aau.dk/da/publications/b984eddc-e357-47f3-810c-91c5a4e41c41
https://vbn.aau.dk/da/publications/b984eddc-e357-47f3-810c-91c5a4e41c41
Publikováno v:
Tassos, D & Giannetsos, A 2010, ' Wormholes no more? Localized Wormhole Detection and Prevention in Wireless Networks ', Lecture Notes in Computer Science, vol. 6131, pp. 334-347 . https://doi.org/10.1007/978-3-642-13651-1_24
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antennas. In this work, we introduce a novel approach for detecting wormhole
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::102cd0640e8ddb3fe48cd66e3c2a8cce
https://vbn.aau.dk/da/publications/41e8ee31-db4f-4bee-ac08-049793f45561
https://vbn.aau.dk/da/publications/41e8ee31-db4f-4bee-ac08-049793f45561