Search Results - "Ioannidis, Sotiris"

Refine Results
  1. 1

    Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware by Papadogiannaki, Eva, Ioannidis, Sotiris

    Published in Sensors (Basel, Switzerland) (06-02-2021)
    “…More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common…”
    Get full text
    Journal Article
  2. 2

    What Tweets and YouTube comments have in common? Sentiment and graph analysis on data related to US elections 2020 by Shevtsov, Alexander, Oikonomidou, Maria, Antonakaki, Despoina, Pratikakis, Polyvios, Ioannidis, Sotiris

    Published in PloS one (31-01-2023)
    “…Most studies analyzing political traffic on Social Networks focus on a single platform, while campaigns and reactions to political events produce interactions…”
    Get full text
    Journal Article
  3. 3

    Social media analysis during political turbulence by Antonakaki, Despoina, Spiliotopoulos, Dimitris, V Samaras, Christos, Pratikakis, Polyvios, Ioannidis, Sotiris, Fragopoulou, Paraskevi

    Published in PloS one (31-10-2017)
    “…Today, a considerable proportion of the public political discourse on nationwide elections proceeds in Online Social Networks. Through analyzing this content,…”
    Get full text
    Journal Article
  4. 4

    Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context Analysis by Abadal, Sergi, Liaskos, Christos, Tsioliaridou, Ageliki, Ioannidis, Sotiris, Pitsillides, Andreas, Solé-Pareta, Josep, Alarcón, Eduard, Cabellos-Aparicio, Albert

    Published in IEEE access (2017)
    “…Metamaterials are artificial structures that have recently enabled the realization of novel electromagnetic components with engineered and even unnatural…”
    Get full text
    Journal Article Publication
  5. 5

    CYRA: A Model-Driven CYber Range Assurance Platform by Smyrlis, Michail, Somarakis, Iason, Spanoudakis, George, Hatzivasilis, George, Ioannidis, Sotiris

    Published in Applied sciences (01-06-2021)
    “…Digital technologies are facilitating our daily activities, and thus leading to the social transformation with the upcoming 5G communications and the Internet…”
    Get full text
    Journal Article
  6. 6

    A survey on vulnerability assessment tools and databases for cloud-based web applications by Kritikos, Kyriakos, Magoutis, Kostas, Papoutsakis, Manos, Ioannidis, Sotiris

    Published in Array (New York) (01-09-2019)
    “…Due to its various offered benefits, an ever increasing number of applications are migrated to the cloud. However, such a migration should be carefully…”
    Get full text
    Journal Article
  7. 7

    Towards a Collection of Security and Privacy Patterns by Papoutsakis, Manos, Fysarakis, Konstantinos, Spanoudakis, George, Ioannidis, Sotiris, Koloutsou, Konstantina

    Published in Applied sciences (04-02-2021)
    “…Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices…”
    Get full text
    Journal Article
  8. 8

    Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees by Hatzivasilis, George, Ioannidis, Sotiris, Smyrlis, Michail, Spanoudakis, George, Frati, Fulvio, Goeke, Ludger, Hildebrandt, Torsten, Tsakirakis, George, Oikonomou, Fotis, Leftheriotis, George, Koshutanski, Hristo

    Published in Applied sciences (01-08-2020)
    “…Nowadays, more-and-more cyber-security training is emerging as an essential process for the lifelong personnel education in organizations, especially for those…”
    Get full text
    Journal Article
  9. 9
  10. 10

    CIRCE: Architectural Patterns for Circular and Trustworthy By-Design IoT Orchestrations by Papoutsakis, Manos, Fysarakis, Konstantinos, Michalodimitrakis, Emmanouil, Spanoudakis, George, Ioannidis, Sotiris

    Published in Frontiers in sustainability (Lausanne) (15-02-2022)
    “…The adoption of Internet of Things (IoT) devices, applications and services gradually transform our everyday lives. In parallel, the transition from linear to…”
    Get full text
    Journal Article
  11. 11

    Artificial Intelligence-Driven Composition and Security Validation of an Internet of Things Ecosystem by Hatzivasilis, George, Papadakis, Nikos, Hatzakis, Ilias, Ioannidis, Sotiris, Vardakis, George

    Published in Applied sciences (01-07-2020)
    “…Key challenges in Internet-of-Things (IoT) system design and management include the secure system composition and the calculation of the security and…”
    Get full text
    Journal Article
  12. 12
  13. 13
  14. 14

    A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks by Antonakaki, Despoina, Fragopoulou, Paraskevi, Ioannidis, Sotiris

    Published in Expert systems with applications (01-02-2021)
    “…Twitter is the third most popular worldwide Online Social Network (OSN) after Facebook and Instagram. Compared to other OSNs, it has a simple data model and a…”
    Get full text
    Journal Article
  15. 15

    Network Topology Effects on the Detectability of Crossfire Attacks by Liaskos, Christos, Ioannidis, Sotiris

    “…New strains of distributed denial-of-service (DDoS) attacks have exhibited potential to disconnect communication networks, even cutting off entire countries…”
    Get full text
    Journal Article
  16. 16

    Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting by Papadogiannaki, Eva, Ioannidis, Sotiris

    “…The growing adoption of network encryption protocols, like TLS, has altered the scene of monitoring network traffic. With the advent increase in network…”
    Get full text
    Conference Proceeding
  17. 17

    A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems by Liaskos, Christos, Nie, Shuai, Tsioliaridou, Ageliki, Pitsillides, Andreas, Ioannidis, Sotiris, Akyildiz, Ian

    Published in Ad hoc networks (01-05-2019)
    “…Wireless communication environments comprise passive objects that cause performance degradation and eavesdropping concerns due to anomalous scattering. This…”
    Get full text
    Journal Article
  18. 18

    On the Network-Layer Modeling and Configuration of Programmable Wireless Environments by Liaskos, Christos, Tsioliaridou, Ageliki, Nie, Shuai, Pitsillides, Andreas, Ioannidis, Sotiris, Akyildiz, Ian F.

    Published in IEEE/ACM transactions on networking (01-08-2019)
    “…Programmable wireless environments enable the software-defined propagation of waves within them, yielding exceptional performance. Several building-block…”
    Get full text
    Journal Article
  19. 19

    Software-Defined Reconfigurable Intelligent Surfaces: From Theory to End-to-End Implementation by Liaskos, Christos, Mamatas, Lefteris, Pourdamghani, Arash, Tsioliaridou, Ageliki, Ioannidis, Sotiris, Pitsillides, Andreas, Schmid, Stefan, Akyildiz, Ian F.

    Published in Proceedings of the IEEE (01-09-2022)
    “…Programmable wireless environments (PWEs) utilize internetworked intelligent metasurfaces to transform wireless propagation into a software-controlled…”
    Get full text
    Journal Article
  20. 20

    Scheduling of multiple network packet processing applications using Pythia by Giakoumakis, Giannis, Papadogiannaki, Eva, Vasiliadis, Giorgos, Ioannidis, Sotiris

    “…Modern commodity computing systems are composed by a number of different heterogeneous processing units, each of which has its own unique performance and…”
    Get full text
    Journal Article