On the necessity of user-friendly CAPTCHA CA Fidas, AG Voyiatzis, NM Avouris Proceedings of the SIGCHI conference on human factors in computing systems …, 2011 | 117 | 2011 |
A survey of delay-and disruption-tolerant networking applications AG Voyiatzis Journal of Internet engineering 5 (1), 331-344, 2012 | 115 | 2012 |
A Modbus/TCP fuzzer for testing internetworked industrial systems AG Voyiatzis, K Katsigiannis, S Koubias 2015 IEEE 20th conference on emerging technologies & factory automation …, 2015 | 79 | 2015 |
Security challenges in embedded systems DN Serpanos, AG Voyiatzis ACM Transactions on embedded computing systems (TECS) 12 (1s), 1-10, 2013 | 69 | 2013 |
A Trust-based Resilient Routing Mechanism for the Internet of Things ZA Khan, J Ullrich, AG Voyiatzis, P Herrmann International Conference on Availability, Reliability and Security (ARES), 2017 | 66 | 2017 |
Exciting FPGA cryptographic Trojans using combinatorial testing P Kitsos, DE Simos, J Torres-Jimenez, AG Voyiatzis 2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015 | 66 | 2015 |
Merged Mining: Curse or Cure? A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl International Workshop on Cryptocurrencies and Blockchain Technology (CBT'17 …, 2017 | 57 | 2017 |
Time is on my side: Steganography in filesystem metadata S Neuner, AG Voyiatzis, M Schmiedecker, S Brunthaler, S Katzenbeisser, ... Digital Investigation 18, S76-S86, 2016 | 56 | 2016 |
An HMM-based anomaly detection approach for SCADA systems K Stefanidis, AG Voyiatzis Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016 | 53 | 2016 |
High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm L Ioannou, HE Michail, AG Voyiatzis Embedded Computing (MECO), 2015 4th Mediterranean Conference on, 2015 | 37 | 2015 |
FPGA Trojan detection using length-optimized ring oscillators P Kitsos, AG Voyiatzis 2014 17th Euromicro Conference on Digital System Design, 675-678, 2014 | 34 | 2014 |
Combinatorial Methods in Security Testing DE Simos, R Kuhn, AG Voyiatzis, R Kacker IEEE Computer 49 (10), 80-83, 2016 | 33 | 2016 |
A versatile scalable smart waste-bin system based on resource-limited embedded devices A Papalambrou, D Karadimas, J Gialelis, AG Voyiatzis 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation …, 2015 | 32 | 2015 |
When security meets usability: A user-centric approach on a crossroads priority problem CA Fidas, AG Voyiatzis, NM Avouris 2010 14th Panhellenic Conference on Informatics, 112-117, 2010 | 31 | 2010 |
A Survey on Network Resiliency Methodologies against Weather-based Disruptions M Tornatore, J André, P Babarczi, T Braun, E Følstad, P Heegaard, ... 8th International Workshop on Resilient Networks Design and Modeling (RNDM …, 2016 | 30 | 2016 |
Pipelined SHA-3 implementations on FPGA: Architecture and performance analysis HE Michail, L Ioannou, AG Voyiatzis Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015 | 30 | 2015 |
An empirical study on the web password strength in Greece AG Voyiatzis, CA Fidas, DN Serpanos, NM Avouris 2011 15th Panhellenic Conference on Informatics, 212-216, 2011 | 30 | 2011 |
Efficient Triggering of Trojan Hardware Logic AG Voyiatzis, KG Stefanidis, P Kitsos 19th IEEE International Symposium on Design and Diagnostics of Electronic …, 2016 | 28 | 2016 |
Usblock: Blocking usb-based keypress injection attacks S Neuner, AG Voyiatzis, S Fotopoulos, C Mulliner, ER Weippl Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 …, 2018 | 27 | 2018 |
Towards a hardware Trojan detection methodology P Kitsos, AG Voyiatzis 2014 3rd Mediterranean Conference on Embedded Computing (MECO), 18-23, 2014 | 25 | 2014 |