Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Ioanna Kantzavelou"'
Autor:
Nestoras Chouliaras, Ioanna Kantzavelou, Leandros Maglaras, Grammati Pantziou, Mohamed Amine Ferrag
Publikováno v:
PeerJ Computer Science, Vol 9, p e1574 (2023)
Cyberattacks, particularly those targeting systems that store or handle sensitive data, have become more sophisticated in recent years. To face increasing threats, continuous capacity building and digital skill competence are needed. Cybersecurity ha
Externí odkaz:
https://doaj.org/article/9f0814e1f3584148aebdb114bbb781af
Publikováno v:
Internet of Things and Cyber-Physical Systems, Vol 3, Iss , Pp 1-13 (2023)
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, pre
Externí odkaz:
https://doaj.org/article/3d5b61cbc46742df874f2bc527e4f818
Autor:
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke
Publikováno v:
Information, Vol 14, Iss 7, p 386 (2023)
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attac
Externí odkaz:
https://doaj.org/article/2e983f98d98d4c68b897671bd0cdb26e
Autor:
Theodoros Anagnostopoulos, Panos Kostakos, Arkady Zaslavsky, Ioanna Kantzavelou, Nikos Tsotsolas, Ioannis Salmon, Jeremy Morley, Robert Harle
Publikováno v:
IEEE Access, Vol 9, Pp 131926-131954 (2021)
A Smart Campus is a miniature of a Smart City with a more demanding framework that enables learning, social interaction and creativity. To ensure a Smart Campus uninterruptible secure operation, a key requirement is that daily routines and activities
Externí odkaz:
https://doaj.org/article/4ff9f51f5f92430ea607e3aaf52c1916
Publikováno v:
PeerJ Computer Science, Vol 8, p e791 (2022)
Insiders might have incentives and objectives opposed to those of the belonging organization. It is hard to detect them because of their privileges that partially protect them. In Wireless Sensor Networks (WSNs), significant security issues arise, in
Externí odkaz:
https://doaj.org/article/f0efa14bd4e84337a9d31160ca4c5586
Publikováno v:
Applied Sciences, Vol 11, Iss 18, p 8357 (2021)
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of nations [...]
Externí odkaz:
https://doaj.org/article/a7638bd911b0434fa02ed4e25599e1cb
Autor:
Nestoras Chouliaras, George Kittes, Ioanna Kantzavelou, Leandros Maglaras, Grammati Pantziou, Mohamed Amine Ferrag
Publikováno v:
Applied Sciences, Vol 11, Iss 4, p 1809 (2021)
In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting
Externí odkaz:
https://doaj.org/article/f57c8e62b704447180de3da432294c1a
Autor:
Janicke, Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge
Publikováno v:
Information; Volume 14; Issue 7; Pages: 386
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attac
Autor:
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke
Publikováno v:
2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM).
Publikováno v:
2022 IEEE International Conference on Cyber Security and Resilience (CSR).