default search action
Nikos Komninos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Damien Warren Fernando, Nikos Komninos:
FeSAD ransomware detection framework with machine learning using adaption to concept drift. Comput. Secur. 137: 103629 (2024) - 2023
- [j23]Dawood Behbehani, Nikos Komninos, Khalid Al-Begain, Muttukrishnan Rajarajan:
Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment. J. Cloud Comput. 12(1): 79 (2023) - [j22]Safwana Haque, Fadi El-Moussa, Nikos Komninos, Muttukrishnan Rajarajan:
A Systematic Review of Data-Driven Attack Detection Trends in IoT. Sensors 23(16): 7191 (2023) - [c18]Safwana Haque, Fadi El-Moussa, Nikos Komninos, Muttukrishnan Rajarajan:
Identification of Important Features at Different IoT layers for Dynamic Attack Detection. BigDataSecurity/HPSC/IDS 2023: 84-90 - [c17]Dawood Behbehani, Nikos Komninos, Khalid Al-Begain, Muttukrishnan Rajarajan:
Open Banking API Security: Anomalous Access Behaviour. INISTA 2023: 1-4 - 2022
- [j21]Damien Warren Fernando, Nikos Komninos:
FeSA: Feature selection architecture for ransomware detection under concept drift. Comput. Secur. 116: 102659 (2022) - [j20]Cate Berry, Nikos Komninos:
Efficient optimisation framework for convolutional neural networks with secure multiparty computation. Comput. Secur. 117: 102679 (2022) - [c16]Chenxi Whitehouse, Tillman Weyde, Pranava Madhyastha, Nikos Komninos:
Evaluation of Fake News Detection with Knowledge-Enhanced Language Models. ICWSM 2022: 1425-1429 - [i3]Chenxi Whitehouse, Tillman Weyde, Pranava Madhyastha, Nikos Komninos:
Evaluation of Fake News Detection with Knowledge-Enhanced Language Models. CoRR abs/2204.00458 (2022) - 2021
- [j19]Aisha Kanwal Junejo, Nikos Komninos, Julie A. McCann:
A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems. IEEE Internet Things J. 8(8): 6840-6852 (2021) - [j18]Aisha Kanwal Junejo, Nikos Komninos, Mithileysh Sathiyanarayanan, Bhawani Shankar Chowdhry:
Trustee: A Trust Management System for Fog-Enabled Cyber Physical Systems. IEEE Trans. Emerg. Top. Comput. 9(4): 2030-2041 (2021) - [c15]Nikos Komninos:
Preserving Privacy of Data with Efficient Attribute-based Encryption Schemes. UMAP (Adjunct Publication) 2021: 366-367 - 2020
- [j17]Neetesh Saxena, Hong Shen, Nikos Komninos, Kim-Kwang Raymond Choo, Narendra S. Chaudhari:
BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. IEEE Trans. Dependable Secur. Comput. 17(3): 550-565 (2020) - [j16]Aisha Kanwal Junejo, Nikos Komninos:
A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems. Wirel. Commun. Mob. Comput. 2020: 2145829:1-2145829:18 (2020)
2010 – 2019
- 2019
- [j15]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos, Bruno Bogaz Zarpelão:
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Secur. Commun. Networks 2019: 3745619:1-3745619:13 (2019) - [j14]Andria Procopiou, Nikos Komninos, Christos Douligeris:
ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network. Wirel. Commun. Mob. Comput. 2019 (2019) - 2018
- [c14]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos:
Evaluating the Provision of Botnet Defences using Translational Research Concepts. ICETE (2) 2018: 680-685 - [c13]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos:
Modelling Botnet Propagation in Networks with Layered Defences. ISNCC 2018: 1-6 - 2017
- [c12]Christos Tselikis, Christos Douligeris, Sarandis Mitropoulos, Nikos Komninos, George Tselikis:
Adaptation of a Conference Key Distribution System for the wireless ad hoc network. ICC 2017: 1-6 - [i2]Theodosis Mourouzis, Marcin Wójcik, Nikos Komninos:
On The Security Evaluation of Partial Password Implementations. CoRR abs/1701.00104 (2017) - 2016
- [j13]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos, Ian Herwono:
Survey of approaches and features for the identification of HTTP-based botnet traffic. J. Netw. Comput. Appl. 76: 1-15 (2016) - [c11]Andreas Kamilaris, Andreas Pitsillides, Sekhar Kondepudi, Nikos Komninos:
Privacy concerns in sharing personal consumption data through online applications. IWCMC 2016: 594-599 - 2015
- [c10]Nikos Komninos, Aisha Kanwal Junejo:
Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment. UCC 2015: 595-600 - 2014
- [j12]Nikos Komninos, Eleni Philippou, Andreas Pitsillides:
Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures. IEEE Commun. Surv. Tutorials 16(4): 1933-1954 (2014) - [c9]Antonis Michalas, Nikos Komninos:
The lord of the sense: A privacy preserving reputation system for participatory sensing applications. ISCC 2014: 1-6 - 2013
- [j11]Maria-Anna Fengou, Georgios Mantas, Dimitrios K. Lymberopoulos, Nikos Komninos, Spyros Fengos, Nikolaos Lazarou:
A New Framework Architecture for Next Generation e-Health Services. IEEE J. Biomed. Health Informatics 17(1): 9-18 (2013) - [c8]Nikos Komninos, Christos Tselikis, Christos Douligeris:
SAnoVS: Secure anonymous voting scheme for clustered ad hoc networks. ISCC 2013: 192-196 - 2012
- [j10]Christos Tselikis, Sarandis Mitropoulos, Nikos Komninos, Christos Douligeris:
Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack. IEEE Commun. Lett. 16(5): 619-621 (2012) - [j9]Georgios Mantas, Dimitrios K. Lymberopoulos, Nikos Komninos:
PKI Security in Large-Scale Healthcare Networks. J. Medical Syst. 36(3): 1107-1116 (2012) - [j8]Antonis Michalas, Tassos Dimitriou, Thanassis Giannetsos, Nikos Komninos, Neeli R. Prasad:
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Wirel. Pers. Commun. 66(3): 559-575 (2012) - [c7]Emmanouil Georgakakis, Nikos Komninos, Christos Douligeris:
NAVI: Novel authentication with visual information. ISCC 2012: 588-595 - [c6]Antonis Michalas, Menelaos Bakopoulos, Nikos Komninos, Neeli R. Prasad:
Secure & trusted communication in emergency situations. Sarnoff Symposium 2012: 1-5 - 2011
- [j7]Antonis Michalas, Nikos Komninos, Neeli R. Prasad:
Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks. Int. J. Digit. Crime Forensics 3(1): 14-36 (2011) - [c5]Ahmad Sabouri, Nikos Komninos, Christos Douligeris:
User dependent cryptography for security in future mobile telecommunication systems. ICT 2011: 422-427 - [c4]Antonis Michalas, Vladimir A. Oleshchuk, Nikos Komninos, Neeli R. Prasad:
Privacy-preserving scheme for mobile ad hoc networks. ISCC 2011: 752-757 - [c3]Maria-Anna Fengou, Georgios Mantas, Dimitrios K. Lymberopoulos, Nikos Komninos:
Ubiquitous Healthcare Profile Management Applying Smart Card Technology. MobiHealth 2011: 248-255 - 2010
- [j6]Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris:
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks. Int. J. Netw. Secur. 10(2): 93-106 (2010) - [p1]Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris:
Security for Ad Hoc Networks. Handbook of Information and Communication Security 2010: 421-432 - [e1]Nikos Komninos:
Sensor Applications, Experimentation, and Logistics - First International Conference, SENSAPPEAL 2009, Athens, Greece, September 25, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 29, Springer 2010, ISBN 978-3-642-11869-2 [contents]
2000 – 2009
- 2009
- [j5]Nikos Komninos, Christos Douligeris:
LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks 7(1): 171-182 (2009) - 2008
- [i1]Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris:
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks. CoRR abs/0807.2053 (2008) - 2007
- [j4]Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris:
Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks 5(3): 289-298 (2007) - [j3]Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris:
Authentication in a layered security approach for mobile ad hoc networks. Comput. Secur. 26(5): 373-380 (2007) - [j2]Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris:
Multifold node authentication in mobile ad hoc networks. Int. J. Commun. Syst. 20(12): 1391-1406 (2007) - [c2]Nikos Komninos, Tassos Dimitriou:
Protecting Biometric Templates with Image Watermarking Techniques. ICB 2007: 114-123 - [c1]Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris:
Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. ICPS 2007: 118-127 - 2006
- [j1]Nikos Komninos, Dimitris Vergados, Christos Douligeris:
Layered security design for mobile ad hoc networks. Comput. Secur. 25(2): 121-130 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint