A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services I Stellios, P Kotzanikolaou, M Psarakis, C Alcaraz, J Lopez IEEE Communications Surveys & Tutorials 20 (4), 3453-3495, 2018 | 418 | 2018 |
Solving coverage problems in wireless sensor networks using cover sets D Zorbas, D Glynos, P Kotzanikolaou, C Douligeris Ad Hoc Networks 8 (4), 400-415, 2010 | 155 | 2010 |
TS-LoRa: Time-Slotted LoRaWAN for the Industrial Internet of Things D Zorbas, K Abdelfadeel, P Kotzanikolaou, D Pesch | 146 | 2020 |
Secure transactions with mobile agents in hostile environments P Kotzanikolaou, M Burmester, V Chrissikopoulos Information Security and Privacy: 5th Australasian Conference, ACISP 2000 …, 2000 | 145 | 2000 |
Security in IoMT communications: A survey D Koutras, G Stergiopoulos, T Dasaklis, P Kotzanikolaou, D Glynos, ... Sensors 20 (17), 4828, 2020 | 133 | 2020 |
Assessing n-order dependencies between critical infrastructures P Kotzanikolaou, M Theoharidou, D Gritzalis International Journal of Critical Infrastructures 6 9 (1-2), 93-110, 2013 | 133 | 2013 |
SecMR–a secure multipath routing protocol for ad hoc networks R Mavropodi, P Kotzanikolaou, C Douligeris Ad Hoc Networks 5 (1), 87-99, 2007 | 125 | 2007 |
Risk mitigation strategies for critical infrastructures based on graph centrality analysis G Stergiopoulos, P Kotzanikolaou, M Theocharidou, D Gritzalis International Journal of Critical Infrastructure Protection 10, 34-44, 2015 | 122 | 2015 |
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures G Stergiopoulos, P Kotzanikolaou, M Theocharidou, G Lykou, D Gritzalis International Journal of Critical Infrastructure Protection 12, 46-60, 2016 | 118 | 2016 |
Risk-based criticality analysis M Theoharidou, P Kotzanikolaou, D Gritzalis Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 …, 2009 | 118 | 2009 |
A multi-layer criticality assessment methodology based on interdependencies M Theoharidou, P Kotzanikolaou, D Gritzalis Computers & Security 29 (6), 643-658, 2010 | 113 | 2010 |
Risk assessment methodology for interdependent critical infrastructures M Theoharidou, P Kotzanikolaou, D Gritzalis International Journal of Risk Assessment and Management 15 (2-3), 128-148, 2011 | 92 | 2011 |
Interdependencies between critical infrastructures: Analyzing the risk of cascading effects P Kotzanikolaou, M Theoharidou, D Gritzalis Critical Information Infrastructure Security: 6th International Workshop …, 2013 | 91 | 2013 |
Secure multipath routing for mobile ad hoc networks P Kotzanikolaou, R Mavropodi, C Douligeris Second Annual Conference on Wireless On-demand Network Systems and Services …, 2005 | 76 | 2005 |
Cascading effects of common-cause failures in critical infrastructures P Kotzanikolaou, M Theoharidou, D Gritzalis Critical Infrastructure Protection VII: 7th IFIP WG 11.10 International …, 2013 | 72 | 2013 |
A forensics-by-design management framework for medical devices based on blockchain V Malamas, T Dasaklis, P Kotzanikolaou, M Burmester, S Katsikas 2019 IEEE world congress on services (SERVICES) 2642, 35-40, 2019 | 67 | 2019 |
Preventing impersonation attacks in MANET with multi-factor authentication D Glynos, P Kotzanikolaou, C Douligeris Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc …, 2005 | 65 | 2005 |
Assessing IoT enabled cyber-physical attack paths against critical systems I Stellios, P Kotzanikolaou, C Grigoriadis Computers & Security 107, 102316, 2021 | 62 | 2021 |
Security awareness of the digital natives V Gkioulos, G Wangen, SK Katsikas, G Kavallieratos, P Kotzanikolaou Information 8 (2), 42, 2017 | 52 | 2017 |
Evaluating security controls against HTTP-based DDoS attacks D Moustis, P Kotzanikolaou IISA 2013, 1-6, 2013 | 50 | 2013 |