Panayiotis Kotzanikolaou
Panayiotis Kotzanikolaou
Department of Informatics,University of Piraeus, Greece
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα unipi.gr
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Secure transactions with mobile agents in hostile environments
P Kotzanikolaou, M Burmester, V Chrissikopoulos
Australasian Conference on Information Security and Privacy, 289-297, 2000
1382000
Solving coverage problems in wireless sensor networks using cover sets
D Zorbas, D Glynos, P Kotzanikolaou, C Douligeris
Ad Hoc Networks 8 (4), 400-415, 2010
1332010
SecMR–a secure multipath routing protocol for ad hoc networks
R Mavropodi, P Kotzanikolaou, C Douligeris
Ad Hoc Networks 5 (1), 87-99, 2007
1112007
Assessing n-order dependencies between critical infrastructures
P Kotzanikolaou, M Theoharidou, D Gritzalis
International Journal of Critical Infrastructures 6 9 (1-2), 93-110, 2013
982013
A multi-layer criticality assessment methodology based on interdependencies
M Theoharidou, P Kotzanikolaou, D Gritzalis
Computers & Security 29 (6), 643-658, 2010
982010
Risk assessment methodology for interdependent critical infrastructures
M Theoharidou, P Kotzanikolaou, D Gritzalis
International Journal of Risk Assessment and Management 15 (2-3), 128-148, 2011
792011
Risk-based criticality analysis
M Theoharidou, P Kotzanikolaou, D Gritzalis
International Conference on Critical Infrastructure Protection, 35-49, 2009
722009
Secure multipath routing for mobile ad hoc networks
P Kotzanikolaou, R Mavropodi, C Douligeris
Second Annual Conference on Wireless On-demand Network Systems and Services …, 2005
692005
Risk mitigation strategies for critical infrastructures based on graph centrality analysis
G Stergiopoulos, P Kotzanikolaou, M Theocharidou, D Gritzalis
International Journal of Critical Infrastructure Protection 10, 34-44, 2015
642015
Interdependencies between critical infrastructures: Analyzing the risk of cascading effects
P Kotzanikolaou, M Theoharidou, D Gritzalis
International Workshop on Critical Information Infrastructures Security, 104-115, 2011
602011
Preventing impersonation attacks in MANET with multi-factor authentication
D Glynos, P Kotzanikolaou, C Douligeris
Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc …, 2005
602005
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures
G Stergiopoulos, P Kotzanikolaou, M Theocharidou, G Lykou, D Gritzalis
International Journal of Critical Infrastructure Protection 12, 46-60, 2016
582016
A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services
I Stellios, P Kotzanikolaou, M Psarakis, C Alcaraz, J Lopez
IEEE Communications Surveys & Tutorials 20 (4), 3453-3495, 2018
552018
Cascading effects of common-cause failures in critical infrastructures
P Kotzanikolaou, M Theoharidou, D Gritzalis
International Conference on Critical Infrastructure Protection, 171-182, 2013
422013
Mobile agents for secure electronic transactions
P Kotzanikolaou, G Katsirelos, V Chrissikopoulos
Recent Advances in signal processing and communications, 363-368, 1999
361999
A framework for secure and verifiable logging in public communication networks
V Stathopoulos, P Kotzanikolaou, E Magkos
International Workshop on Critical Information Infrastructures Security, 273-284, 2006
352006
B {GOP}: An adaptive algorithm for coverage problems in wireless sensor networks
D Zorbas, D Glynos, P Kotzanikolaou, C Douligeris
13th European wireless conference, EW 134, 2007
32*2007
Evaluating security controls against HTTP-based DDoS attacks
D Moustis, P Kotzanikolaou
IISA 2013, 1-6, 2013
292013
Strong forward security
M Burmester, V Chrissikopoulos, P Kotzanikolaou, E Magkos
IFIP International Information Security Conference, 109-121, 2001
282001
Using centrality measures in dependency risk graphs for efficient risk mitigation
G Stergiopoulos, M Theocharidou, P Kotzanikolaou, D Gritzalis
International Conference on Critical Infrastructure Protection, 299-314, 2015
262015
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20