Zobrazeno 1 - 10
of 100
pro vyhledávání: '"Nicholas Kolokotronis"'
Publikováno v:
IEEE Access, Vol 8, Pp 119312-119323 (2020)
The cooperative jamming (CJ) and decode-and-forward (DF) protocols for physical layer security are studied in this paper. We propose a design that aims at maximizing the security gap, which is defined as the signal-to-noise ratio (SNR) difference bet
Externí odkaz:
https://doaj.org/article/790b01ff94b045299daa752d9af5496f
Autor:
Christos-Minas Mathas, Costas Vassilakis, Nicholas Kolokotronis, Charilaos C. Zarakovitis, Michail-Alexandros Kourtis
Publikováno v:
Energies, Vol 14, Iss 10, p 2818 (2021)
The 5G communication network will underpin a vast number of new and emerging services, paving the way for unprecedented performance and capabilities in mobile networks. In this setting, the Internet of Things (IoT) will proliferate, and IoT devices w
Externí odkaz:
https://doaj.org/article/ff9541db47d14f4ab6a1c8e621f175ac
Autor:
Gueltoum Bendiab, Amina Hameurlaine, Georgios Germanos, Nicholas Kolokotronis, Stavros Shiaeles
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. 24:3614-3637
A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk
Publikováno v:
Electronics; Volume 12; Issue 10; Pages: 2278
Current Internet of Things (IoT) systems comprise multiple software systems that are deployed to provide users with the required functionalities. System architects create system blueprints and draw specifications for the software artefacts that are n
Publikováno v:
Electronics; Volume 12; Issue 5; Pages: 1247
The use of video conferencing applications has increased tremendously in recent years, particularly due to the COVID-19 pandemic and the associated restrictions on movements. As a result, the corresponding smart apps have also seen increased usage, l
Publikováno v:
Journal of Surveillance, Security and Safety. 3:101-127
Aim: The imminent advent of large-scale quantum computers within the next years is expected to highly affect the security of several cryptosystems that are now considered secure; this mainly holds for classical, long-established, public key cryptogra
Publikováno v:
2022 IEEE Globecom Workshops (GC Wkshps)
The increasing connectivity of medical devices along with the growing complexity, heterogeneity and attack surface of healthcare ecosystems has lead to numerous severe cyber-attacks. This paper proposes a novel collaborative security platform for thr
Defending against cyber threats is an essential procedure for an organization, and professional training is an important factor for the prosperity of an organization against sophisticated and multi-vector cyber-attacks. The background knowledge is ne
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e8fd099ebb6cab688a1f32bb9e733f78
https://doi.org/10.4018/978-1-6684-4291-3.ch017
https://doi.org/10.4018/978-1-6684-4291-3.ch017
Publikováno v:
IEEE Access, Vol 8, Pp 119312-119323 (2020)
The cooperative jamming (CJ) and decode–and–forward (DF) protocols for physical layer security are studied in this paper. We propose a design that aims at maximizing the security gap, which is defined as the signal–to–noise ratio (SNR) differ
Publikováno v:
IEEE Transactions on Information Theory. 65:8345-8356
The error linear complexity spectrum constitutes a well-known cryptographic criterion for sequences, indicating how the linear complexity of the sequence decreases as the number of bits allowed to be modified per period increases. In this paper, via