A unified deep learning anomaly detection and classification approach for smart grid environments I Siniosoglou, P Radoglou-Grammatikis, G Efstathopoulos, P Fouliras, ... IEEE Transactions on Network and Service Management 18 (2), 1137-1151, 2021 | 131 | 2021 |
Conceptual analysis of cyber security education based on live competitions M Katsantonis, P Fouliras, I Mavridis 2017 IEEE Global Engineering Education Conference (EDUCON), 771-779, 2017 | 43 | 2017 |
Conceptual framework for developing cyber security serious games NM Katsantonis, I Kotini, P Fouliras, I Mavridis 2019 IEEE global engineering education conference (EDUCON), 872-881, 2019 | 35 | 2019 |
Towards an automated recognition system for chat-based social engineering attacks in enterprise environments N Tsinganos, G Sakellariou, P Fouliras, I Mavridis Proceedings of the 13th International Conference on Availability …, 2018 | 30 | 2018 |
A novel reputation-based model for e-commerce P Fouliras Operational research 13, 113-138, 2013 | 29 | 2013 |
A reference model for cyber threat intelligence (CTI) systems G Sakellariou, P Fouliras, I Mavridis, P Sarigiannidis Electronics 11 (9), 1401, 2022 | 24 | 2022 |
A survey on FANET routing from a cross-layer design perspective G Amponis, T Lagkas, P Sarigiannidis, V Vitsas, P Fouliras, S Wan Journal of Systems Architecture 120, 102281, 2021 | 24 | 2021 |
Inter-uav routing scheme testbeds G Amponis, T Lagkas, P Sarigiannidis, V Vitsas, P Fouliras Drones 5 (1), 2, 2020 | 15 | 2020 |
Conceptualization of game based approaches for learning and training on cyber security MN Katsantonis, P Fouliras, I Mavridis Proceedings of the 21st Pan-Hellenic conference on informatics, 1-2, 2017 | 15 | 2017 |
The impact of environmental practices on firms’ efficiency: the case of ICT-producing sectors E Stiakakis, P Fouliras Operational Research 9, 311-328, 2009 | 14 | 2009 |
LEMP: lightweight efficient multicast protocol for video on demand P Fouliras, S Xanthos, N Tsantalis, A Manitsaris Proceedings of the 2004 ACM symposium on Applied computing, 1226-1231, 2004 | 13 | 2004 |
Leveraging dialogue state tracking for zero-shot chat-based social engineering attack recognition N Tsinganos, P Fouliras, I Mavridis Applied Sciences 13 (8), 5110, 2023 | 10 | 2023 |
Applying BERT for early-stage recognition of persistence in chat-based social engineering attacks N Tsinganos, P Fouliras, I Mavridis Applied Sciences 12 (23), 12353, 2022 | 10 | 2022 |
Vehicle-to-grid networks: issues and challenges C Tsolericlis, P Chatzimisios, P Fouliras Smart Grid, 347-369, 2017 | 10 | 2017 |
A survey of models for computer networks management D Kontoudis, P Fouliras International Journal of Computer Networks & Communications 6 (3), 157-176, 2014 | 9 | 2014 |
Assessing computer network efficiency using data envelopment analysis and multicriteria decision analysis techniques N Ploskas, E Stiakakis, P Fouliras Journal of Multi‐Criteria Decision Analysis 22 (5-6), 260-278, 2015 | 7 | 2015 |
Modeling and managing virtual network environments D Kontoudis, P Fouliras Proceedings of the 17th Panhellenic Conference on Informatics, 39-46, 2013 | 6 | 2013 |
Host-Based Virtual Networks Management in Cloud Datacenters D Kontoudis, P Fouliras Computing and Informatics 36 (3), 541-565, 2017 | 5 | 2017 |
A survey of the distributed network management models and architectures: Assessment and challenges D Kontoudis, P Fouliras Int J Comput Netw Commun Ications IJCNC 6 (3), 161, 2014 | 4 | 2014 |
Web services and multimedia in m‐business applications: Opportunities and concerns CK Georgiadis, PE Fouliras, I Mavridis, A Manitsaris International Journal of Web Information Systems 2 (1), 51-62, 2006 | 4 | 2006 |