Network security: current status and future directions C Douligeris, DN Serpanos John Wiley & Sons, 2007 | 130 | 2007 |
An HMM-based anomaly detection approach for SCADA systems K Stefanidis, AG Voyiatzis Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016 | 53 | 2016 |
Real-time service provisioning for mobile and wireless networks K Farkas, O Wellnitz, M Dick, X Gu, M Busse, W Effelsberg, Y Rebahi, ... Computer Communications 29 (5), 540-550, 2006 | 41 | 2006 |
Efficient Triggering of Trojan Hardware Logics AG Voyiatzis, K Stefanidis, P Kitsos 19th IEEE International Symposium on Design and Diagnostics of Electronic …, 2016 | 28 | 2016 |
Piveau: A large-scale open data management platform based on semantic web technologies F Kirstein, K Stefanidis, B Dittwald, S Dutkowski, S Urbanek, M Hauswirth The Semantic Web: 17th International Conference, ESWC 2020, Heraklion, Crete …, 2020 | 15 | 2020 |
A Private Key Recovery Scheme Using Partial Knowledge HP Singh, K Stefanidis, F Kirstein 2021 11th IFIP International Conference on New Technologies, Mobility and …, 2021 | 13 | 2021 |
Integration of Library Services with Internet of Things Technologies K Stefanidis, G Tsakonas Code{4}Lib, 2015 | 13 | 2015 |
DECIDE: an extended devops framework for multi-cloud applications J Alonso, K Stefanidis, L Orue-Echevarria, L Blasi, M Walker, M Escalante, ... Proceedings of the 2019 3rd international conference on cloud and big data …, 2019 | 11 | 2019 |
Measurable and composable security, privacy, and dependability for cyberphysical systems: the SHIELD methodology A Fiaschetti, J Noll, P Azzoni, R Uribeetxeberria CRC Press, 2017 | 11 | 2017 |
TERO-based Detection of Hardware Trojans on FPGA Implementation of the AES Algorithm P Kitsos, K Stefanidis, AG Voyiatzis Euromicro Conference on Digital System Design (DSD2016), 2016 | 11 | 2016 |
On the effects of ring oscillator length and hardware Trojan size on an FPGA-based implementation of AES F Pirpilidis, KG Stefanidis, AG Voyiatzis, P Kitsos Microprocessors and Microsystems 54, 75-82, 2017 | 10 | 2017 |
Implementing filtering and traceback mechanism for packet-marking IP-traceback schemes against DDoS attacks K Stefanidis, DN Serpanos 2008 4th International IEEE Conference Intelligent Systems 2, 14-28-14-33, 2008 | 8 | 2008 |
Blockchain in agriculture: a PESTELS analysis J Ordóñez, A Alexopoulos, K Koutras, A Kalogeras, K Stefanidis, V Martos IEEE Access, 2023 | 7 | 2023 |
Information system framework architecture for organization agnostic logistics utilizing standardized IoT technologies D Karadimas, E Polytarchos, K Stefanidis, J Gialelis 2014 Federated Conference on Computer Science and Information Systems, 1337-1343, 2014 | 6 | 2014 |
Countermeasures against distributed denial of service attacks K Stefanidis, DN Serpanos 2005 IEEE Intelligent Data Acquisition and Advanced Computing Systems …, 2005 | 5 | 2005 |
DECIDE: DevOps for Trusted, Portable and Interoperable Multi-cloud Applications Towards the Digital Single Market L Orue-Echevarria, J Alonso, M Escalante, K Stefanidis, L Blasi International Conference on Product-Focused Software Process Improvement …, 2019 | 4* | 2019 |
Fighting spammers with spam AA Antonopoulos, KG Stefanidis, AG Voyiatzis 2009 International Symposium on Autonomous Decentralized Systems, 1-5, 2009 | 4 | 2009 |
Packet-marking scheme for DDoS attack prevention K Stefanidis, DN Serpanos Security and Protection of Information, 2005 | 4 | 2005 |
Increasing lifetime of cryptographic keys on smartphone platforms with the controlled randomness protocol AG Voyiatzis, KG Stefanidis, DN Serpanos Proceedings of the Workshop on Embedded Systems Security, 2011 | 3 | 2011 |
SHIELD Technology Demonstrators M Cesena, C Regazzoni, L Marcenaro, G Hatzivasilis, K Fysarakis, ... Measurable and Composable Security, Privacy, and Dependability for …, 2017 | 2 | 2017 |