BibTeX records: Constantinos Kolias

download as .bib file

@inproceedings{DBLP:conf/milcom/VedrosKI23,
  author       = {Kurt A. Vedros and
                  Constantinos Kolias and
                  Robert C. Ivans},
  title        = {Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal
                  Synthesis},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2023, Boston,
                  MA, USA, October 30 - Nov. 3, 2023},
  pages        = {716--721},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MILCOM58377.2023.10356226},
  doi          = {10.1109/MILCOM58377.2023.10356226},
  timestamp    = {Thu, 25 Jan 2024 09:55:40 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/VedrosKI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-02324,
  author       = {Kurt A. Vedros and
                  Georgios Michail Makrakis and
                  Constantinos Kolias and
                  Robert C. Ivans and
                  Craig Rieger},
  title        = {Towards Scalable EM-based Anomaly Detection For Embedded Devices Through
                  Synthetic Fingerprinting},
  journal      = {CoRR},
  volume       = {abs/2302.02324},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.02324},
  doi          = {10.48550/ARXIV.2302.02324},
  eprinttype    = {arXiv},
  eprint       = {2302.02324},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-02324.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChatzoglouKKS22,
  author       = {Efstratios Chatzoglou and
                  Georgios Kambourakis and
                  Constantinos Kolias and
                  Christos Smiliotopoulos},
  title        = {Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing
                  for 802.11 Intrusion Detection Systems},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {64761--64784},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3183597},
  doi          = {10.1109/ACCESS.2022.3183597},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChatzoglouKKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChatzoglouKK22,
  author       = {Efstratios Chatzoglou and
                  Georgios Kambourakis and
                  Constantinos Kolias},
  title        = {How is your Wi-Fi connection today? DoS attacks on {WPA3-SAE}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103058},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103058},
  doi          = {10.1016/J.JISA.2021.103058},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChatzoglouKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChatzoglouKK22,
  author       = {Efstratios Chatzoglou and
                  Georgios Kambourakis and
                  Constantinos Kolias},
  title        = {Your {WAP} Is at Risk: {A} Vulnerability Analysis on Wireless Access
                  Point Web-Based Management Interfaces},
  journal      = {Secur. Commun. Networks},
  volume       = {2022},
  pages        = {1833062:1--1833062:24},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/1833062},
  doi          = {10.1155/2022/1833062},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChatzoglouKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ChatzoglouKSK22,
  author       = {Efstratios Chatzoglou and
                  Georgios Kambourakis and
                  Christos Smiliotopoulos and
                  Constantinos Kolias},
  title        = {Best of Both Worlds: Detecting Application Layer Attacks through 802.11
                  and Non-802.11 Features},
  journal      = {Sensors},
  volume       = {22},
  number       = {15},
  pages        = {5633},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22155633},
  doi          = {10.3390/S22155633},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ChatzoglouKSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-05643,
  author       = {Ekaterina Miller and
                  Georgios Michail Makrakis and
                  Kurt A. Vedros and
                  Constantinos Kolias and
                  Craig Rieger and
                  Daniel Barbar{\'{a}}},
  title        = {Detecting Code Injections in Noisy Environments Through {EM} Signal
                  Analysis and {SVD} Denoising},
  journal      = {CoRR},
  volume       = {abs/2212.05643},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.05643},
  doi          = {10.48550/ARXIV.2212.05643},
  eprinttype    = {arXiv},
  eprint       = {2212.05643},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-05643.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChatzoglouKK21,
  author       = {Efstratios Chatzoglou and
                  Georgios Kambourakis and
                  Constantinos Kolias},
  title        = {Empirical Evaluation of Attacks Against {IEEE} 802.11 Enterprise Networks:
                  The {AWID3} Dataset},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {34188--34205},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3061609},
  doi          = {10.1109/ACCESS.2021.3061609},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChatzoglouKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MakrakisKKRB21,
  author       = {Georgios Michail Makrakis and
                  Constantinos Kolias and
                  Georgios Kambourakis and
                  Craig Rieger and
                  Jacob Benjamin},
  title        = {Industrial and Critical Infrastructure Security: Technical Analysis
                  of Real-Life Security Incidents},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {165295--165325},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3133348},
  doi          = {10.1109/ACCESS.2021.3133348},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MakrakisKKRB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChatzoglouKK21,
  author       = {Efstratios Chatzoglou and
                  Georgios Kambourakis and
                  Constantinos Kolias},
  title        = {WiF0: All Your Passphrase Are Belong to Us},
  journal      = {Computer},
  volume       = {54},
  number       = {7},
  pages        = {82--88},
  year         = {2021},
  url          = {https://doi.org/10.1109/MC.2021.3074262},
  doi          = {10.1109/MC.2021.3074262},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChatzoglouKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdi/ChatzigiannisBK21,
  author       = {Panagiotis Chatzigiannis and
                  Foteini Baldimtsi and
                  Constantinos Kolias and
                  Angelos Stavrou},
  title        = {Black-Box IoT: Authentication and Distributed Storage of IoT Data
                  from Constrained Sensors},
  booktitle    = {IoTDI '21: International Conference on Internet-of-Things Design and
                  Implementation, Virtual Event / Charlottesville, VA, USA, May 18-21,
                  2021},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450268.3453536},
  doi          = {10.1145/3450268.3453536},
  timestamp    = {Thu, 20 May 2021 08:39:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iotdi/ChatzigiannisBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-04028,
  author       = {Panagiotis Chatzigiannis and
                  Foteini Baldimtsi and
                  Constantinos Kolias and
                  Angelos Stavrou},
  title        = {Black-Box IoT: Authentication and Distributed Storage of IoT Data
                  from Constrained Sensors},
  journal      = {CoRR},
  volume       = {abs/2103.04028},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.04028},
  eprinttype    = {arXiv},
  eprint       = {2103.04028},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-04028.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-03945,
  author       = {Georgios Michail Makrakis and
                  Constantinos Kolias and
                  Georgios Kambourakis and
                  Craig Rieger and
                  Jacob Benjamin},
  title        = {Vulnerabilities and Attacks Against Industrial Control Systems and
                  Critical Infrastructures},
  journal      = {CoRR},
  volume       = {abs/2109.03945},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.03945},
  eprinttype    = {arXiv},
  eprint       = {2109.03945},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-03945.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/KambourakisKGKM20,
  author       = {Georgios Kambourakis and
                  Constantinos Kolias and
                  Dimitris Geneiatakis and
                  Georgios Karopoulos and
                  Georgios Michail Makrakis and
                  Ioannis Kounelis},
  title        = {A State-of-the-Art Review on the Security of Mainstream IoT Wireless
                  {PAN} Protocol Stacks},
  journal      = {Symmetry},
  volume       = {12},
  number       = {4},
  pages        = {579},
  year         = {2020},
  url          = {https://doi.org/10.3390/sym12040579},
  doi          = {10.3390/SYM12040579},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/KambourakisKGKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KoliasBRU20,
  author       = {Constantinos Kolias and
                  Daniel Barbar{\'{a}} and
                  Craig Rieger and
                  Jacob Ulrich},
  title        = {{EM} Fingerprints: Towards Identifying Unauthorized Hardware Substitutions
                  in the Supply Chain Jungle},
  booktitle    = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco,
                  CA, USA, May 21, 2020},
  pages        = {144--151},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SPW50608.2020.00040},
  doi          = {10.1109/SPW50608.2020.00040},
  timestamp    = {Thu, 21 Sep 2023 16:11:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KoliasBRU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/KoliasMKC19,
  author       = {Constantinos Kolias and
                  Weizhi Meng and
                  Georgios Kambourakis and
                  Jiageng Chen},
  title        = {Security, Privacy, and Trust on Internet of Things},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2019},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6452157},
  doi          = {10.1155/2019/6452157},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/KoliasMKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VoasKKSK18,
  author       = {Jeffrey M. Voas and
                  Rick Kuhn and
                  Constantinos Kolias and
                  Angelos Stavrou and
                  Georgios Kambourakis},
  title        = {Cybertrust in the IoT Age},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {12--15},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011043},
  doi          = {10.1109/MC.2018.3011043},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VoasKKSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KoliasKSV17,
  author       = {Constantinos Kolias and
                  Georgios Kambourakis and
                  Angelos Stavrou and
                  Jeffrey M. Voas},
  title        = {DDoS in the IoT: Mirai and Other Botnets},
  journal      = {Computer},
  volume       = {50},
  number       = {7},
  pages        = {80--84},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.201},
  doi          = {10.1109/MC.2017.201},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/KoliasKSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/VidrosKKA17,
  author       = {Sokratis Vidros and
                  Constantinos Kolias and
                  Georgios Kambourakis and
                  Leman Akoglu},
  title        = {Automatic Detection of Online Recruitment Frauds: Characteristics,
                  Methods, and a Public Dataset},
  journal      = {Future Internet},
  volume       = {9},
  number       = {1},
  pages        = {6},
  year         = {2017},
  url          = {https://doi.org/10.3390/fi9010006},
  doi          = {10.3390/FI9010006},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/VidrosKKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KoliasKK17,
  author       = {Constantinos Kolias and
                  Vassilis Kolias and
                  Georgios Kambourakis},
  title        = {TermID: a distributed swarm intelligence-based approach for wireless
                  intrusion detection},
  journal      = {Int. J. Inf. Sec.},
  volume       = {16},
  number       = {4},
  pages        = {401--416},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10207-016-0335-z},
  doi          = {10.1007/S10207-016-0335-Z},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KoliasKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/KoliasCZS17,
  author       = {Constantinos Kolias and
                  Lucas Copi and
                  Fengwei Zhang and
                  Angelos Stavrou},
  editor       = {Cristiano Giuffrida and
                  Angelos Stavrou},
  title        = {Breaking {BLE} Beacons For Fun But Mostly Profit},
  booktitle    = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC}
                  2017, Belgrade, Serbia, April 23, 2017},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3065913.3065923},
  doi          = {10.1145/3065913.3065923},
  timestamp    = {Tue, 06 Nov 2018 16:58:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/KoliasCZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/KambourakisKS17,
  author       = {Georgios Kambourakis and
                  Constantinos Kolias and
                  Angelos Stavrou},
  title        = {The Mirai botnet and the IoT Zombie Armies},
  booktitle    = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore,
                  MD, USA, October 23-25, 2017},
  pages        = {267--272},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MILCOM.2017.8170867},
  doi          = {10.1109/MILCOM.2017.8170867},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/KambourakisKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/StavrouFK16,
  author       = {Angelos Stavrou and
                  Daniel Fleck and
                  Constantinos Kolias},
  title        = {On the Move: Evading Distributed Denial-of-Service Attacks},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {104--107},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.85},
  doi          = {10.1109/MC.2016.85},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/StavrouFK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KoliasKSG16,
  author       = {Constantinos Kolias and
                  Georgios Kambourakis and
                  Angelos Stavrou and
                  Stefanos Gritzalis},
  title        = {Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats
                  and a Public Dataset},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {18},
  number       = {1},
  pages        = {184--208},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMST.2015.2402161},
  doi          = {10.1109/COMST.2015.2402161},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KoliasKSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KoliasSVBK16,
  author       = {Constantinos Kolias and
                  Angelos Stavrou and
                  Jeffrey M. Voas and
                  Irena Bojanova and
                  D. Richard Kuhn},
  title        = {Learning Internet-of-Things Security "Hands-On"},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {37--46},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.4},
  doi          = {10.1109/MSP.2016.4},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KoliasSVBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KoliasSV15,
  author       = {Constantinos Kolias and
                  Angelos Stavrou and
                  Jeffrey M. Voas},
  title        = {Securely Making "Things" Right},
  journal      = {Computer},
  volume       = {48},
  number       = {9},
  pages        = {84--88},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.258},
  doi          = {10.1109/MC.2015.258},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KoliasSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TsiatsikasFPGKK15,
  author       = {Zisis Tsiatsikas and
                  Alexandros Fakis and
                  Dimitrios Papamartzivanos and
                  Dimitris Geneiatakis and
                  Georgios Kambourakis and
                  Constantinos Kolias},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Battling Against DDoS in {SIP} - Is Machine Learning-based Detection
                  an Effective Weapon?},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {301--308},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005549103010308},
  doi          = {10.5220/0005549103010308},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TsiatsikasFPGKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/gr/Kolias14,
  author       = {Constantinos Kolias},
  title        = {Intrusion detection in wireless networks using nature inspired algorithms},
  school       = {University of the Aegean, Greece},
  year         = {2014},
  url          = {http://hdl.handle.net/10442/hedi/34647},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/gr/Kolias14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/KoliasKAK14,
  author       = {Vassilis Kolias and
                  Constantinos Kolias and
                  Ioannis Anagnostopoulos and
                  Eleftherios Kayafas},
  editor       = {Jimmy Lin and
                  Jian Pei and
                  Xiaohua Hu and
                  Wo Chang and
                  Raghunath Nambiar and
                  Charu C. Aggarwal and
                  Nick Cercone and
                  Vasant G. Honavar and
                  Jun Huan and
                  Bamshad Mobasher and
                  Saumyadipta Pyne},
  title        = {RuleMR: Classification rule discovery with MapReduce},
  booktitle    = {2014 {IEEE} International Conference on Big Data {(IEEE} BigData 2014),
                  Washington, DC, USA, October 27-30, 2014},
  pages        = {20--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/BigData.2014.7004440},
  doi          = {10.1109/BIGDATA.2014.7004440},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/KoliasKAK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KoliasKG13,
  author       = {Constantinos Kolias and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {Attacks and Countermeasures on 802.16: Analysis and Assessment},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {15},
  number       = {1},
  pages        = {487--514},
  year         = {2013},
  url          = {https://doi.org/10.1109/SURV.2012.021312.00138},
  doi          = {10.1109/SURV.2012.021312.00138},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KoliasKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/KoliasKKK13,
  author       = {Constantinos Kolias and
                  Vassilis Kolias and
                  Georgios Kambourakis and
                  Eleftherios Kayafas},
  editor       = {Ioannis Anagnostopoulos and
                  M{\'{a}}ria Bielikov{\'{a}} and
                  Phivos Mylonas and
                  Nicolas Tsapatsoulis},
  title        = {A Client-Side Privacy Framework for Web Personalization},
  booktitle    = {Semantic Hyper/Multimedia Adaptation - Schemes and Applications},
  series       = {Studies in Computational Intelligence},
  volume       = {418},
  pages        = {297--316},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-28977-4\_11},
  doi          = {10.1007/978-3-642-28977-4\_11},
  timestamp    = {Tue, 16 May 2017 14:24:34 +0200},
  biburl       = {https://dblp.org/rec/series/sci/KoliasKKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KambourakisKGP11,
  author       = {Georgios Kambourakis and
                  Constantinos Kolias and
                  Stefanos Gritzalis and
                  Jong Hyuk Park},
  title        = {DoS attacks exploiting signaling in {UMTS} and {IMS}},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {3},
  pages        = {226--235},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.02.010},
  doi          = {10.1016/J.COMCOM.2010.02.010},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/KambourakisKGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KoliasKM11,
  author       = {Constantinos Kolias and
                  Georgios Kambourakis and
                  Manolis Maragoudakis},
  title        = {Swarm intelligence in intrusion detection: {A} survey},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {8},
  pages        = {625--642},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2011.08.009},
  doi          = {10.1016/J.COSE.2011.08.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KoliasKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/KoliasKAKK10,
  author       = {Constantinos Kolias and
                  Vassilis Kolias and
                  Ioannis Anagnostopoulos and
                  Georgios Kambourakis and
                  Eleftherios Kayafas},
  title        = {Design and implementation of a VoiceXML-driven wiki application for
                  assistive environments on the web},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {14},
  number       = {6},
  pages        = {527--539},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00779-009-0274-z},
  doi          = {10.1007/S00779-009-0274-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/KoliasKAKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iswcs/KoliasKK09,
  author       = {Constantinos Kolias and
                  Vasilis Kolias and
                  Georgios Kambourakis},
  editor       = {Giovanni Giambene and
                  Yuming Jiang and
                  Boon Sain Yeo and
                  Rajeev Shorey},
  title        = {A secure and efficient authentication protocol for passive {RFID}
                  tags},
  booktitle    = {Proceedings of the 2009 6th International Symposium on Wireless Communication
                  Systems, {ISWCS} 2009, 7-10 September 2009, University of Siena, Tuscany,
                  Italy},
  pages        = {36--40},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISWCS.2009.5285367},
  doi          = {10.1109/ISWCS.2009.5285367},
  timestamp    = {Tue, 15 Jun 2021 11:10:56 +0200},
  biburl       = {https://dblp.org/rec/conf/iswcs/KoliasKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/KambourakisKGP09,
  author       = {Georgios Kambourakis and
                  Constantinos Kolias and
                  Stefanos Gritzalis and
                  Jong Hyuk Park},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {Signaling-Oriented DoS Attacks in {UMTS} Networks},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {280--289},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_29},
  doi          = {10.1007/978-3-642-02617-1\_29},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/KambourakisKGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/VouyioukasKMRKG08,
  author       = {Demosthenes Vouyioukas and
                  Georgios Kambourakis and
                  Ilias Maglogiannis and
                  Angelos N. Rouskas and
                  Constantinos Kolias and
                  Stefanos Gritzalis},
  title        = {Enabling the provision of secure web based m-health services utilizing
                  {XML} based security models},
  journal      = {Secur. Commun. Networks},
  volume       = {1},
  number       = {5},
  pages        = {375--388},
  year         = {2008},
  url          = {https://doi.org/10.1002/sec.46},
  doi          = {10.1002/SEC.46},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/VouyioukasKMRKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/petra/KoliasKAKK08,
  author       = {Constantinos Kolias and
                  Vassilis Kolias and
                  Ioannis Anagnostopoulos and
                  Georgios Kambourakis and
                  Eleftherios Kayafas},
  editor       = {Fillia Makedon and
                  Lynne Baillie},
  title        = {A pervasive wiki application based on VoiceXML},
  booktitle    = {Proceedings of the 1st {ACM} International Conference on Pervasive
                  Technologies Related to Assistive Environments, {PETRA} 2008, Athens,
                  Greece, July 16-18, 2008},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {282},
  pages        = {58},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389586.1389656},
  doi          = {10.1145/1389586.1389656},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/petra/KoliasKAKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smap/KoliasKAKK08,
  author       = {Vassilis Kolias and
                  Constantinos Kolias and
                  Ioannis Anagnostopoulos and
                  Georgios Kambourakis and
                  Eleftherios Kayafas},
  title        = {A Speech-Enabled Assistive Collaborative Platform for Educational
                  Purposes with User Personalization},
  booktitle    = {Third International Workshop on Semantic Media Adaptation and Personalization,
                  {SMAP} 2008, Prague, Czech Republic, December 15-16, 2008},
  pages        = {157--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SMAP.2008.31},
  doi          = {10.1109/SMAP.2008.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smap/KoliasKAKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smap/KoliasKAKK08a,
  author       = {Constantinos Kolias and
                  Vassilis Kolias and
                  Ioannis Anagnostopoulos and
                  Georgios Kambourakis and
                  Eleftherios Kayafas},
  title        = {Enhancing User Privacy in Adaptive Web Sites with Client-Side User
                  Profiles},
  booktitle    = {Third International Workshop on Semantic Media Adaptation and Personalization,
                  {SMAP} 2008, Prague, Czech Republic, December 15-16, 2008},
  pages        = {170--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SMAP.2008.32},
  doi          = {10.1109/SMAP.2008.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smap/KoliasKAKK08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics