DDoS in the IoT: Mirai and Other Botnets C Kolias, G Kambourakis, A Stavrou, J Voas Computer 50 (7), 80-84, 2017 | 2192 | 2017 |
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset C Kolias, G Kambourakis, A Stavrou, S Gritzalis Communications Surveys & Tutorials, 2015 | 565 | 2015 |
The mirai botnet and the iot zombie armies G Kambourakis, C Kolias, A Stavrou MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 267-272, 2017 | 266 | 2017 |
Swarm intelligence in intrusion detection: A survey C Kolias, G Kambourakis, M Maragoudakis Computers & Security 30 (8), 625-642, 2011 | 241 | 2011 |
Learning Internet-of-Things Security" Hands-On" C Kolias, A Stavrou, J Voas, I Bojanova, R Kuhn IEEE Security & Privacy 14 (1), 37-46, 2016 | 166 | 2016 |
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset S Vidros, C Kolias, G Kambourakis, L Akoglu Future Internet 9 (1), 6, 2017 | 101 | 2017 |
Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset E Chatzoglou, G Kambourakis, C Kolias IEEE Access 9, 34188-34205, 2021 | 72 | 2021 |
Attacks and Countermeasures on 802.16: Analysis and Assessment C Kolias, G Kambourakis, S Gritzalis | 68 | 2013 |
TermID: A distributed swarm intelligence-based approach for wireless intrusion detection C Kolias, V Kolias, G Kambourakis International Journal of Information Security 16, 401-416, 2017 | 67 | 2017 |
DoS attacks exploiting signaling in UMTS and IMS G Kambourakis, C Kolias, S Gritzalis, JH Park Computer Communications 34 (3), 226-235, 2011 | 59 | 2011 |
Online recruitment services: another playground for fraudsters S Vidros, C Kolias, G Kambourakis Computer Fraud & Security 2016 (3), 8-13, 2016 | 58 | 2016 |
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents GM Makrakis, C Kolias, G Kambourakis, C Rieger, J Benjamin IEEE Access 9, 165295-165325, 2021 | 49 | 2021 |
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks G Kambourakis, C Kolias, D Geneiatakis, G Karopoulos, GM Makrakis, ... Symmetry 12 (4), 579, 2020 | 38 | 2020 |
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE E Chatzoglou, G Kambourakis, C Kolias Journal of Information Security and Applications 64, 103058, 2022 | 35 | 2022 |
Pick quality over quantity: Expert feature selection and data preprocessing for 802.11 Intrusion Detection Systems E Chatzoglou, G Kambourakis, C Kolias, C Smiliotopoulos IEEE Access 10, 64761-64784, 2022 | 26 | 2022 |
Breaking BLE Beacons For Fun But Mostly Profit C Kolias, L Copi, F Zhang, A Stavrou Proceedings of the 10th European Workshop on Systems Security, 4, 2017 | 26 | 2017 |
Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon? Z Tsiatsikas, A Fakis, D Papamartzivanos, D Geneiatakis, G Kambourakis, ... 2015 12th International Joint Conference on e-Business and …, 2015 | 25 | 2015 |
Securely Making" Things" Right C Kolias, A Stavrou, J Voas Computer 48 (9), 84-88, 2015 | 24 | 2015 |
Cybertrust in the IoT Age J Voas, R Kuhn, C Kolias, A Stavrou, G Kambourakis Computer 51 (7), 12-15, 2018 | 23 | 2018 |
Signaling-oriented DoS attacks in UMTS networks G Kambourakis, C Kolias, S Gritzalis, J Hyuk-Park Advances in Information Security and Assurance: Third International …, 2009 | 22 | 2009 |