default search action
Anastasija Collen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Teri Lenard, Anastasija Collen, Meriem Benyahya, Niels Alexander Nijdam, Béla Genge:
Exploring Trust Modeling and Management Techniques in the Context of Distributed Wireless Networks: A Literature Review. IEEE Access 11: 106803-106832 (2023) - [j4]Hezam Akram Abdulghani, Anastasija Collen, Niels Alexander Nijdam:
Guidance Framework for Developing IoT-Enabled Systems' Cybersecurity. Sensors 23(8): 4174 (2023) - [c11]Meriem Benyahya, Teri Lenard, Anastasija Collen, Niels Alexander Nijdam:
A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles. ARES 2023: 99:1-99:10 - [c10]Teri Lenard, Anastasija Collen, Niels A. Nijdam, Béla Genge:
A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform Module. EuroS&P Workshops 2023: 329-335 - [c9]Teri Lenard, Béla Genge, Anastasija Collen, Niels A. Nijdam:
LOKI-2: An Improved Lightweight Cryptographic Key Distribution Protocol for Automotive Systems. ICCP 2023: 187-194 - 2022
- [j3]Meriem Benyahya, Anastasija Collen, Sotiria Kechagia, Niels Alexander Nijdam:
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments. Comput. Secur. 122: 102904 (2022) - [j2]Anastasija Collen, Ioan-Cosmin Szanto, Meriem Benyahya, Béla Genge, Niels Alexander Nijdam:
Integrating Human Factors in the Visualisation of Usable Transparency for Dynamic Risk Assessment. Inf. 13(7): 340 (2022) - 2021
- [c8]Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam:
On the analysis of open source datasets: validating IDS implementation for well-known and zero day attack detection. FNC/MobiSPC 2021: 192-199 - 2020
- [c7]Konstantinos M. Giannoutakis, Georgios P. Spathoulas, C. K. Filelis-Papadopoulos, Anastasija Collen, Marios Anagnostopoulos, Konstantinos Votis, Niels A. Nijdam:
A Blockchain Solution for Enhancing Cybersecurity Defence of IoT. Blockchain 2020: 490-495 - [c6]Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam:
Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System. FNC/MobiSPC 2020: 560-565
2010 – 2019
- 2019
- [j1]Hezam Akram Abdulghani, Niels Alexander Nijdam, Anastasija Collen, Dimitri Konstantas:
A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective. Symmetry 11(6): 774 (2019) - [c5]Javier Augusto-Gonzalez, Anastasija Collen, Spyridon C. Evangelatos, Marios Anagnostopoulos, Georgios P. Spathoulas, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras, Béla Genge, Erol Gelenbe, Niels A. Nijdam:
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes. CAMAD 2019: 1-6 - 2018
- [c4]Anastasija Collen, Niels A. Nijdam, Javier Augusto-Gonzalez, Sokratis K. Katsikas, Konstantinos M. Giannoutakis, Georgios P. Spathoulas, Erol Gelenbe, Konstantinos Votis, Dimitrios Tzovaras, Navid Ghavami, Melanie Volkamer, Piroska Haller, Alvaro Sánchez, Miltiadis Dimas:
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control. Euro-CYBERSEC 2018: 68-78 - [c3]Charalampos S. Kouzinopoulos, Georgios P. Spathoulas, Konstantinos M. Giannoutakis, Konstantinos Votis, Pankaj Pandey, Dimitrios Tzovaras, Sokratis K. Katsikas, Anastasija Collen, Niels A. Nijdam:
Using Blockchains to Strengthen the Security of Internet of Things. Euro-CYBERSEC 2018: 90-100 - [c2]Charalampos S. Kouzinopoulos, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras, Anastasija Collen, Niels A. Nijdam, Dimitri Konstantas, Georgios P. Spathoulas, Pankaj Pandey, Sokratis K. Katsikas:
Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain to promote user trust. INISTA 2018: 1-6 - [c1]Georgios P. Spathoulas, Anastasija Collen, Pankaj Pandey, Niels A. Nijdam, Sokratis K. Katsikas, Charalampos S. Kouzinopoulos, Maher Ben Moussa, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras:
Towards Reliable Integrity in Blacklisting: Facing Malicious IPs in GHOST Smart Contracts. INISTA 2018: 1-8
Coauthor Index
aka: Niels Alexander Nijdam
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint