Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Constantinos Kolias
@inproceedings{DBLP:conf/milcom/VedrosKI23, author = {Kurt A. Vedros and Constantinos Kolias and Robert C. Ivans}, title = {Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis}, booktitle = {{IEEE} Military Communications Conference, {MILCOM} 2023, Boston, MA, USA, October 30 - Nov. 3, 2023}, pages = {716--721}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MILCOM58377.2023.10356226}, doi = {10.1109/MILCOM58377.2023.10356226}, timestamp = {Thu, 25 Jan 2024 09:55:40 +0100}, biburl = {https://dblp.org/rec/conf/milcom/VedrosKI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-02324, author = {Kurt A. Vedros and Georgios Michail Makrakis and Constantinos Kolias and Robert C. Ivans and Craig Rieger}, title = {Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting}, journal = {CoRR}, volume = {abs/2302.02324}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.02324}, doi = {10.48550/ARXIV.2302.02324}, eprinttype = {arXiv}, eprint = {2302.02324}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-02324.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChatzoglouKKS22, author = {Efstratios Chatzoglou and Georgios Kambourakis and Constantinos Kolias and Christos Smiliotopoulos}, title = {Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection Systems}, journal = {{IEEE} Access}, volume = {10}, pages = {64761--64784}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3183597}, doi = {10.1109/ACCESS.2022.3183597}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChatzoglouKKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChatzoglouKK22, author = {Efstratios Chatzoglou and Georgios Kambourakis and Constantinos Kolias}, title = {How is your Wi-Fi connection today? DoS attacks on {WPA3-SAE}}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103058}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103058}, doi = {10.1016/J.JISA.2021.103058}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChatzoglouKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChatzoglouKK22, author = {Efstratios Chatzoglou and Georgios Kambourakis and Constantinos Kolias}, title = {Your {WAP} Is at Risk: {A} Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces}, journal = {Secur. Commun. Networks}, volume = {2022}, pages = {1833062:1--1833062:24}, year = {2022}, url = {https://doi.org/10.1155/2022/1833062}, doi = {10.1155/2022/1833062}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChatzoglouKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ChatzoglouKSK22, author = {Efstratios Chatzoglou and Georgios Kambourakis and Christos Smiliotopoulos and Constantinos Kolias}, title = {Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features}, journal = {Sensors}, volume = {22}, number = {15}, pages = {5633}, year = {2022}, url = {https://doi.org/10.3390/s22155633}, doi = {10.3390/S22155633}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ChatzoglouKSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-05643, author = {Ekaterina Miller and Georgios Michail Makrakis and Kurt A. Vedros and Constantinos Kolias and Craig Rieger and Daniel Barbar{\'{a}}}, title = {Detecting Code Injections in Noisy Environments Through {EM} Signal Analysis and {SVD} Denoising}, journal = {CoRR}, volume = {abs/2212.05643}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.05643}, doi = {10.48550/ARXIV.2212.05643}, eprinttype = {arXiv}, eprint = {2212.05643}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-05643.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChatzoglouKK21, author = {Efstratios Chatzoglou and Georgios Kambourakis and Constantinos Kolias}, title = {Empirical Evaluation of Attacks Against {IEEE} 802.11 Enterprise Networks: The {AWID3} Dataset}, journal = {{IEEE} Access}, volume = {9}, pages = {34188--34205}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3061609}, doi = {10.1109/ACCESS.2021.3061609}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChatzoglouKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MakrakisKKRB21, author = {Georgios Michail Makrakis and Constantinos Kolias and Georgios Kambourakis and Craig Rieger and Jacob Benjamin}, title = {Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents}, journal = {{IEEE} Access}, volume = {9}, pages = {165295--165325}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3133348}, doi = {10.1109/ACCESS.2021.3133348}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MakrakisKKRB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChatzoglouKK21, author = {Efstratios Chatzoglou and Georgios Kambourakis and Constantinos Kolias}, title = {WiF0: All Your Passphrase Are Belong to Us}, journal = {Computer}, volume = {54}, number = {7}, pages = {82--88}, year = {2021}, url = {https://doi.org/10.1109/MC.2021.3074262}, doi = {10.1109/MC.2021.3074262}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChatzoglouKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotdi/ChatzigiannisBK21, author = {Panagiotis Chatzigiannis and Foteini Baldimtsi and Constantinos Kolias and Angelos Stavrou}, title = {Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors}, booktitle = {IoTDI '21: International Conference on Internet-of-Things Design and Implementation, Virtual Event / Charlottesville, VA, USA, May 18-21, 2021}, pages = {1--14}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3450268.3453536}, doi = {10.1145/3450268.3453536}, timestamp = {Thu, 20 May 2021 08:39:53 +0200}, biburl = {https://dblp.org/rec/conf/iotdi/ChatzigiannisBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-04028, author = {Panagiotis Chatzigiannis and Foteini Baldimtsi and Constantinos Kolias and Angelos Stavrou}, title = {Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors}, journal = {CoRR}, volume = {abs/2103.04028}, year = {2021}, url = {https://arxiv.org/abs/2103.04028}, eprinttype = {arXiv}, eprint = {2103.04028}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-04028.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-03945, author = {Georgios Michail Makrakis and Constantinos Kolias and Georgios Kambourakis and Craig Rieger and Jacob Benjamin}, title = {Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures}, journal = {CoRR}, volume = {abs/2109.03945}, year = {2021}, url = {https://arxiv.org/abs/2109.03945}, eprinttype = {arXiv}, eprint = {2109.03945}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-03945.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/KambourakisKGKM20, author = {Georgios Kambourakis and Constantinos Kolias and Dimitris Geneiatakis and Georgios Karopoulos and Georgios Michail Makrakis and Ioannis Kounelis}, title = {A State-of-the-Art Review on the Security of Mainstream IoT Wireless {PAN} Protocol Stacks}, journal = {Symmetry}, volume = {12}, number = {4}, pages = {579}, year = {2020}, url = {https://doi.org/10.3390/sym12040579}, doi = {10.3390/SYM12040579}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/KambourakisKGKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KoliasBRU20, author = {Constantinos Kolias and Daniel Barbar{\'{a}} and Craig Rieger and Jacob Ulrich}, title = {{EM} Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle}, booktitle = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco, CA, USA, May 21, 2020}, pages = {144--151}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SPW50608.2020.00040}, doi = {10.1109/SPW50608.2020.00040}, timestamp = {Thu, 21 Sep 2023 16:11:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/KoliasBRU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/KoliasMKC19, author = {Constantinos Kolias and Weizhi Meng and Georgios Kambourakis and Jiageng Chen}, title = {Security, Privacy, and Trust on Internet of Things}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2019}, year = {2019}, url = {https://doi.org/10.1155/2019/6452157}, doi = {10.1155/2019/6452157}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/KoliasMKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VoasKKSK18, author = {Jeffrey M. Voas and Rick Kuhn and Constantinos Kolias and Angelos Stavrou and Georgios Kambourakis}, title = {Cybertrust in the IoT Age}, journal = {Computer}, volume = {51}, number = {7}, pages = {12--15}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011043}, doi = {10.1109/MC.2018.3011043}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VoasKKSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KoliasKSV17, author = {Constantinos Kolias and Georgios Kambourakis and Angelos Stavrou and Jeffrey M. Voas}, title = {DDoS in the IoT: Mirai and Other Botnets}, journal = {Computer}, volume = {50}, number = {7}, pages = {80--84}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.201}, doi = {10.1109/MC.2017.201}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/KoliasKSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/VidrosKKA17, author = {Sokratis Vidros and Constantinos Kolias and Georgios Kambourakis and Leman Akoglu}, title = {Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset}, journal = {Future Internet}, volume = {9}, number = {1}, pages = {6}, year = {2017}, url = {https://doi.org/10.3390/fi9010006}, doi = {10.3390/FI9010006}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/VidrosKKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KoliasKK17, author = {Constantinos Kolias and Vassilis Kolias and Georgios Kambourakis}, title = {TermID: a distributed swarm intelligence-based approach for wireless intrusion detection}, journal = {Int. J. Inf. Sec.}, volume = {16}, number = {4}, pages = {401--416}, year = {2017}, url = {https://doi.org/10.1007/s10207-016-0335-z}, doi = {10.1007/S10207-016-0335-Z}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KoliasKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/KoliasCZS17, author = {Constantinos Kolias and Lucas Copi and Fengwei Zhang and Angelos Stavrou}, editor = {Cristiano Giuffrida and Angelos Stavrou}, title = {Breaking {BLE} Beacons For Fun But Mostly Profit}, booktitle = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC} 2017, Belgrade, Serbia, April 23, 2017}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3065913.3065923}, doi = {10.1145/3065913.3065923}, timestamp = {Tue, 06 Nov 2018 16:58:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/KoliasCZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/KambourakisKS17, author = {Georgios Kambourakis and Constantinos Kolias and Angelos Stavrou}, title = {The Mirai botnet and the IoT Zombie Armies}, booktitle = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore, MD, USA, October 23-25, 2017}, pages = {267--272}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MILCOM.2017.8170867}, doi = {10.1109/MILCOM.2017.8170867}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/KambourakisKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StavrouFK16, author = {Angelos Stavrou and Daniel Fleck and Constantinos Kolias}, title = {On the Move: Evading Distributed Denial-of-Service Attacks}, journal = {Computer}, volume = {49}, number = {3}, pages = {104--107}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.85}, doi = {10.1109/MC.2016.85}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/StavrouFK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KoliasKSG16, author = {Constantinos Kolias and Georgios Kambourakis and Angelos Stavrou and Stefanos Gritzalis}, title = {Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {18}, number = {1}, pages = {184--208}, year = {2016}, url = {https://doi.org/10.1109/COMST.2015.2402161}, doi = {10.1109/COMST.2015.2402161}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KoliasKSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KoliasSVBK16, author = {Constantinos Kolias and Angelos Stavrou and Jeffrey M. Voas and Irena Bojanova and D. Richard Kuhn}, title = {Learning Internet-of-Things Security "Hands-On"}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {1}, pages = {37--46}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.4}, doi = {10.1109/MSP.2016.4}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KoliasSVBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KoliasSV15, author = {Constantinos Kolias and Angelos Stavrou and Jeffrey M. Voas}, title = {Securely Making "Things" Right}, journal = {Computer}, volume = {48}, number = {9}, pages = {84--88}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.258}, doi = {10.1109/MC.2015.258}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KoliasSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TsiatsikasFPGKK15, author = {Zisis Tsiatsikas and Alexandros Fakis and Dimitrios Papamartzivanos and Dimitris Geneiatakis and Georgios Kambourakis and Constantinos Kolias}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Battling Against DDoS in {SIP} - Is Machine Learning-based Detection an Effective Weapon?}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {301--308}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005549103010308}, doi = {10.5220/0005549103010308}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TsiatsikasFPGKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/gr/Kolias14, author = {Constantinos Kolias}, title = {Intrusion detection in wireless networks using nature inspired algorithms}, school = {University of the Aegean, Greece}, year = {2014}, url = {http://hdl.handle.net/10442/hedi/34647}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/gr/Kolias14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/KoliasKAK14, author = {Vassilis Kolias and Constantinos Kolias and Ioannis Anagnostopoulos and Eleftherios Kayafas}, editor = {Jimmy Lin and Jian Pei and Xiaohua Hu and Wo Chang and Raghunath Nambiar and Charu C. Aggarwal and Nick Cercone and Vasant G. Honavar and Jun Huan and Bamshad Mobasher and Saumyadipta Pyne}, title = {RuleMR: Classification rule discovery with MapReduce}, booktitle = {2014 {IEEE} International Conference on Big Data {(IEEE} BigData 2014), Washington, DC, USA, October 27-30, 2014}, pages = {20--28}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/BigData.2014.7004440}, doi = {10.1109/BIGDATA.2014.7004440}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/KoliasKAK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KoliasKG13, author = {Constantinos Kolias and Georgios Kambourakis and Stefanos Gritzalis}, title = {Attacks and Countermeasures on 802.16: Analysis and Assessment}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {15}, number = {1}, pages = {487--514}, year = {2013}, url = {https://doi.org/10.1109/SURV.2012.021312.00138}, doi = {10.1109/SURV.2012.021312.00138}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KoliasKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/KoliasKKK13, author = {Constantinos Kolias and Vassilis Kolias and Georgios Kambourakis and Eleftherios Kayafas}, editor = {Ioannis Anagnostopoulos and M{\'{a}}ria Bielikov{\'{a}} and Phivos Mylonas and Nicolas Tsapatsoulis}, title = {A Client-Side Privacy Framework for Web Personalization}, booktitle = {Semantic Hyper/Multimedia Adaptation - Schemes and Applications}, series = {Studies in Computational Intelligence}, volume = {418}, pages = {297--316}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-28977-4\_11}, doi = {10.1007/978-3-642-28977-4\_11}, timestamp = {Tue, 16 May 2017 14:24:34 +0200}, biburl = {https://dblp.org/rec/series/sci/KoliasKKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KambourakisKGP11, author = {Georgios Kambourakis and Constantinos Kolias and Stefanos Gritzalis and Jong Hyuk Park}, title = {DoS attacks exploiting signaling in {UMTS} and {IMS}}, journal = {Comput. Commun.}, volume = {34}, number = {3}, pages = {226--235}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.02.010}, doi = {10.1016/J.COMCOM.2010.02.010}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/KambourakisKGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KoliasKM11, author = {Constantinos Kolias and Georgios Kambourakis and Manolis Maragoudakis}, title = {Swarm intelligence in intrusion detection: {A} survey}, journal = {Comput. Secur.}, volume = {30}, number = {8}, pages = {625--642}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2011.08.009}, doi = {10.1016/J.COSE.2011.08.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KoliasKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/KoliasKAKK10, author = {Constantinos Kolias and Vassilis Kolias and Ioannis Anagnostopoulos and Georgios Kambourakis and Eleftherios Kayafas}, title = {Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web}, journal = {Pers. Ubiquitous Comput.}, volume = {14}, number = {6}, pages = {527--539}, year = {2010}, url = {https://doi.org/10.1007/s00779-009-0274-z}, doi = {10.1007/S00779-009-0274-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/KoliasKAKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iswcs/KoliasKK09, author = {Constantinos Kolias and Vasilis Kolias and Georgios Kambourakis}, editor = {Giovanni Giambene and Yuming Jiang and Boon Sain Yeo and Rajeev Shorey}, title = {A secure and efficient authentication protocol for passive {RFID} tags}, booktitle = {Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, {ISWCS} 2009, 7-10 September 2009, University of Siena, Tuscany, Italy}, pages = {36--40}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISWCS.2009.5285367}, doi = {10.1109/ISWCS.2009.5285367}, timestamp = {Tue, 15 Jun 2021 11:10:56 +0200}, biburl = {https://dblp.org/rec/conf/iswcs/KoliasKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/KambourakisKGP09, author = {Georgios Kambourakis and Constantinos Kolias and Stefanos Gritzalis and Jong Hyuk Park}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {Signaling-Oriented DoS Attacks in {UMTS} Networks}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {280--289}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_29}, doi = {10.1007/978-3-642-02617-1\_29}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/KambourakisKGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/VouyioukasKMRKG08, author = {Demosthenes Vouyioukas and Georgios Kambourakis and Ilias Maglogiannis and Angelos N. Rouskas and Constantinos Kolias and Stefanos Gritzalis}, title = {Enabling the provision of secure web based m-health services utilizing {XML} based security models}, journal = {Secur. Commun. Networks}, volume = {1}, number = {5}, pages = {375--388}, year = {2008}, url = {https://doi.org/10.1002/sec.46}, doi = {10.1002/SEC.46}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/VouyioukasKMRKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/petra/KoliasKAKK08, author = {Constantinos Kolias and Vassilis Kolias and Ioannis Anagnostopoulos and Georgios Kambourakis and Eleftherios Kayafas}, editor = {Fillia Makedon and Lynne Baillie}, title = {A pervasive wiki application based on VoiceXML}, booktitle = {Proceedings of the 1st {ACM} International Conference on Pervasive Technologies Related to Assistive Environments, {PETRA} 2008, Athens, Greece, July 16-18, 2008}, series = {{ACM} International Conference Proceeding Series}, volume = {282}, pages = {58}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389586.1389656}, doi = {10.1145/1389586.1389656}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/petra/KoliasKAKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smap/KoliasKAKK08, author = {Vassilis Kolias and Constantinos Kolias and Ioannis Anagnostopoulos and Georgios Kambourakis and Eleftherios Kayafas}, title = {A Speech-Enabled Assistive Collaborative Platform for Educational Purposes with User Personalization}, booktitle = {Third International Workshop on Semantic Media Adaptation and Personalization, {SMAP} 2008, Prague, Czech Republic, December 15-16, 2008}, pages = {157--163}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SMAP.2008.31}, doi = {10.1109/SMAP.2008.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smap/KoliasKAKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smap/KoliasKAKK08a, author = {Constantinos Kolias and Vassilis Kolias and Ioannis Anagnostopoulos and Georgios Kambourakis and Eleftherios Kayafas}, title = {Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles}, booktitle = {Third International Workshop on Semantic Media Adaptation and Personalization, {SMAP} 2008, Prague, Czech Republic, December 15-16, 2008}, pages = {170--176}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SMAP.2008.32}, doi = {10.1109/SMAP.2008.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smap/KoliasKAKK08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.