Search Results - "Chasaki, Danai"
-
1
Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Toward 6G
Published in IEEE Communications surveys and tutorials (01-01-2022)“…The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of Things (IoT),…”
Get full text
Journal Article -
2
Detecting covert channel attacks on cyber‐physical systems
Published in IET cyber-physical systems (01-09-2024)“…Cyberattacks on cyber‐physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning…”
Get full text
Journal Article -
3
Network-Based Machine Learning Detection of Covert Channel Attacks on Cyber-Physical Systems
Published in 2022 IEEE 20th International Conference on Industrial Informatics (INDIN) (25-07-2022)“…Most of the recent high-profile attacks targeting cyber-physical systems (CPS) started with lengthy reconnaissance periods that enabled attackers to gain…”
Get full text
Conference Proceeding -
4
Adaptive security monitoring for next-generation routers
Published in EURASIP journal on embedded systems (10-01-2019)“…In today’s Internet, modern routers rely on high-performance reliable general-purpose multi-core packet processing systems in order to support the flexibility…”
Get full text
Journal Article -
5
Security-Aware Ad Hoc Networking Protocol for Vehicular Safety Systems
Published in 2023 26th International Symposium on Wireless Personal Multimedia Communications (WPMC) (19-11-2023)“…Modern cars are implemented with a number of environmentally-aware safety systems, from radar-induced braking, to oncoming-vehicle detecting headlight…”
Get full text
Conference Proceeding -
6
Vulnerabilities of Control Systems in Internet of Things Applications
Published in IEEE internet of things journal (01-04-2018)“…In this paper, we present some initial results about vulnerability of control systems that can be used in Internet of Things (IoT) applications. Up to our best…”
Get full text
Journal Article -
7
Trust and reliability for next-generation routers
Published in MILCOM 2016 - 2016 IEEE Military Communications Conference (01-11-2016)“…To support the flexibility and the different protocol operations and applications provided by today's internet, modern routers rely on high-performance…”
Get full text
Conference Proceeding -
8
Hardware Implementation of High-Performance Polynomial Multiplication for KEM Saber
Published in 2022 IEEE International Symposium on Circuits and Systems (ISCAS) (28-05-2022)“…Recent advances in quantum computing have initiated a new round of cryptosystem innovation as the existing public-key cryptosystems are proven to be vulnerable…”
Get full text
Conference Proceeding -
9
Selective encryption of video transmissions over multi-hop wireless networks
Published in 2014 IEEE Symposium on Computers and Communications (ISCC) (01-06-2014)“…From a user perspective both security and power consumption during video transmissions are critical. On the one hand, assuming an eavesdropper on the wireless…”
Get full text
Conference Proceeding -
10
Microgrids: Technical and security recommendations for future implementations
Published in 2014 IEEE International Conference on Consumer Electronics (ICCE) (01-01-2014)“…Microgrids are modern, localized versions of the centralized utility grid. They have been gaining popularity due to the increased power demand and the…”
Get full text
Conference Proceeding -
11
Heterogeneous GNN with Express Edges for Intrusion Detection in Cyber-Physical Systems
Published in 2024 International Conference on Computing, Networking and Communications (ICNC) (19-02-2024)“…With the ever-increasing population of Internet-of-Things (IoT) and Cyber-Physical systems (CPS), cyber attacks can result in significantly more severe…”
Get full text
Conference Proceeding -
12
Attacks and Defenses in the Data Plane of Networks
Published in IEEE transactions on dependable and secure computing (01-11-2012)“…Security issues in computer networks have focused on attacks on end systems and the control plane. An entirely new class of emerging network attacks aims at…”
Get full text
Journal Article -
13
Ensemble Machine Learning for Intrusion Detection in Cyber-Physical Systems
Published in IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (10-05-2021)“…In this work, we evaluate the benefits of applying ensemble machine learning techniques to CPS attack detection, together with the application of data…”
Get full text
Conference Proceeding -
14
SDN Security through System Call Learning
Published in 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (19-04-2021)“…Software Defined Networking (SDN) has changed the way of designing and managing networks. This technology emerged from the efforts to make the networks more…”
Get full text
Conference Proceeding -
15
Detecting Malicious Hosts in SDN through System Call Learning
Published in IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (10-05-2021)“…Software Defined Networking (SDN) has changed the way of designing and managing networks through programmability. However, programmability also introduces…”
Get full text
Conference Proceeding -
16
Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning
Published in 2020 International Conference on Computing, Networking and Communications (ICNC) (01-02-2020)“…Modern networks can benefit immensely from the flexibility and the improvements in delivery of services that Software Defined Networking (SDN) provides…”
Get full text
Conference Proceeding -
17
Design of an adaptive security mechanism for modern routers
Published in 2015 IEEE International Conference on Consumer Electronics (ICCE) (01-01-2015)“…Modern routers should be able to support many new functions to meet the needs of customers. To achieve such flexibility, programmable packet processors have…”
Get full text
Conference Proceeding -
18
Low complexity Intercarrier Interference reduction for high mobility wireless systems
Published in 2015 IEEE International Conference on Consumer Electronics (ICCE) (01-01-2015)“…With the growing number of infotainment services, the demand on high speed internet in vehicles is increasing. Yet, ensuring a high speed internet access at…”
Get full text
Conference Proceeding -
19
Design of an SDN Security Mechanism to Detect Malicious Activities
Published in 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) (01-07-2018)“…Software Defined Networks (SDN) is a modern networking paradigm that introduces lots of benefits to the next-generation networks. It offers the necessary…”
Get full text
Conference Proceeding -
20
Security issues in networked embedded devices
Published 01-01-2012“…Embedded devices are ubiquitous; they are present in various sectors of everyday life: smart homes, automobiles, health care, telephony, industrial automation,…”
Get full text
Dissertation