Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Vasiliki Liagkou"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 3, Pp 610-637 (2023)
Business Email Compromise (BEC) attacks have emerged as serious threats to organizations in recent years, exploiting social engineering and malware to dupe victims into divulging confidential information and executing fraudulent transactions. This pa
Externí odkaz:
https://doaj.org/article/b7f8565a4c0541fba4e1f456fbf55957
Autor:
Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas
Publikováno v:
Sensors, Vol 24, Iss 5, p 1676 (2024)
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods us
Externí odkaz:
https://doaj.org/article/8671793516624da98b315ba15496de2e
Publikováno v:
Information, Vol 14, Iss 6, p 315 (2023)
Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are consi
Externí odkaz:
https://doaj.org/article/403b1333a7b04d99a7d3da907862072f
How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem
Publikováno v:
Cryptography, Vol 6, Iss 3, p 42 (2022)
The Panopticon (which means “watcher of everything”) is a well-known prison structure of continuous surveillance and discipline studied by Bentham in 1785. Today, where persistent, massive scale, surveillance is immensely facilitated by new techn
Externí odkaz:
https://doaj.org/article/b4a24aae27754a8b98c80428cfc2c5cd
Autor:
Vasiliki Liagkou, Vasileios Kavvadas, Spyridon K. Chronopoulos, Dionysios Tafiadis, Vasilis Christofilakis, Kostas P. Peppas
Publikováno v:
Computation, Vol 7, Iss 2, p 24 (2019)
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical transport netw
Externí odkaz:
https://doaj.org/article/52ec90dde4f64bfca17423c63fa16897
Autor:
Vasiliki Liagkou, George Fragiadakis, Evangelia Filiopoulou, Vagia Kyriakidou, Christos Michalakelis, Mara Nikolaidou
Publikováno v:
International Journal of Technology Diffusion. 13:1-11
Cloud computing environments allow businesses to deploy applications in a fast and scalable way. Infrastructure-as-a-service (IaaS) and container-as-a-service (CaaS) models can be adopted for the deployment of cloud-based applications. The current pa
Autor:
George Fragiadakis, Vasiliki Liagkou, Evangelia Filiopoulou, Dimitris Fragkakis, Christos Michalakelis, Mara Nikolaidou
Publikováno v:
Computing.
As cloud computing has grown in popularity, several different models and deployment strategies have emerged, fulfilling specific needs of different users. Thus cloud service selection is a major task that combines business and technical aspects. Seve
Publikováno v:
2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM).
Publikováno v:
Electronics, Vol 10, Iss 2001, p 2001 (2021)
Industry 4.0 has risen as an integrated digital manufacturing environment, and it has created a novel research perspective that has thrust research to interdisciplinarity and exploitation of ICT advances. This work presents and discusses the main asp
Publikováno v:
Procedia CIRP. 79:724-729
Low-Power Wide-Area Networks (LPWANs) are becoming one of the main building blocks for the Industrial IoT ecosystem. While the current LPWAN deployments include basic techniques to deal with end-to-end encryption, there are specific security issues t