Search Results - "Ioannidis, Sotiris"
-
1
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware
Published in Sensors (Basel, Switzerland) (06-02-2021)“…More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common…”
Get full text
Journal Article -
2
What Tweets and YouTube comments have in common? Sentiment and graph analysis on data related to US elections 2020
Published in PloS one (31-01-2023)“…Most studies analyzing political traffic on Social Networks focus on a single platform, while campaigns and reactions to political events produce interactions…”
Get full text
Journal Article -
3
Social media analysis during political turbulence
Published in PloS one (31-10-2017)“…Today, a considerable proportion of the public political discourse on nationwide elections proceeds in Online Social Networks. Through analyzing this content,…”
Get full text
Journal Article -
4
Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context Analysis
Published in IEEE access (2017)“…Metamaterials are artificial structures that have recently enabled the realization of novel electromagnetic components with engineered and even unnatural…”
Get full text
Journal Article Publication -
5
CYRA: A Model-Driven CYber Range Assurance Platform
Published in Applied sciences (01-06-2021)“…Digital technologies are facilitating our daily activities, and thus leading to the social transformation with the upcoming 5G communications and the Internet…”
Get full text
Journal Article -
6
A survey on vulnerability assessment tools and databases for cloud-based web applications
Published in Array (New York) (01-09-2019)“…Due to its various offered benefits, an ever increasing number of applications are migrated to the cloud. However, such a migration should be carefully…”
Get full text
Journal Article -
7
Towards a Collection of Security and Privacy Patterns
Published in Applied sciences (04-02-2021)“…Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices…”
Get full text
Journal Article -
8
Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees
Published in Applied sciences (01-08-2020)“…Nowadays, more-and-more cyber-security training is emerging as an essential process for the lifelong personnel education in organizations, especially for those…”
Get full text
Journal Article -
9
Exploration of Intercell Wireless Millimeter-Wave Communication in the Landscape of Intelligent Metasurfaces
Published in IEEE access (2019)“…Software-defined metasurfaces are electromagnetically ultra-thin, artificial components that can provide engineered and externally controllable…”
Get full text
Journal Article Publication -
10
CIRCE: Architectural Patterns for Circular and Trustworthy By-Design IoT Orchestrations
Published in Frontiers in sustainability (Lausanne) (15-02-2022)“…The adoption of Internet of Things (IoT) devices, applications and services gradually transform our everyday lives. In parallel, the transition from linear to…”
Get full text
Journal Article -
11
Artificial Intelligence-Driven Composition and Security Validation of an Internet of Things Ecosystem
Published in Applied sciences (01-07-2020)“…Key challenges in Internet-of-Things (IoT) system design and management include the secure system composition and the calculation of the security and…”
Get full text
Journal Article -
12
On the Mobility Effect in UAV-mounted Absorbing Metasurfaces: A Theoretical and Experimental Study
Published in IEEE access (01-01-2023)“…In this work, we focus on the theoretical modeling and experimental evaluation of UAV-mounted absorbing metasurfaces as facilitators for secure wireless…”
Get full text
Journal Article -
13
XR-RF Imaging Enabled by Software-Defined Metasurfaces and Machine Learning: Foundational Vision, Technologies and Challenges
Published in IEEE access (2022)“…We present a new approach to Extended Reality (XR), denoted as iCOPYWAVES, which seeks to offer naturally low-latency operation and cost effectiveness,…”
Get full text
Journal Article -
14
A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks
Published in Expert systems with applications (01-02-2021)“…Twitter is the third most popular worldwide Online Social Network (OSN) after Facebook and Instagram. Compared to other OSNs, it has a simple data model and a…”
Get full text
Journal Article -
15
Network Topology Effects on the Detectability of Crossfire Attacks
Published in IEEE transactions on information forensics and security (01-07-2018)“…New strains of distributed denial-of-service (DDoS) attacks have exhibited potential to disconnect communication networks, even cutting off entire countries…”
Get full text
Journal Article -
16
Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting
Published in 2023 IEEE Symposium on Computers and Communications (ISCC) (09-07-2023)“…The growing adoption of network encryption protocols, like TLS, has altered the scene of monitoring network traffic. With the advent increase in network…”
Get full text
Conference Proceeding -
17
A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems
Published in Ad hoc networks (01-05-2019)“…Wireless communication environments comprise passive objects that cause performance degradation and eavesdropping concerns due to anomalous scattering. This…”
Get full text
Journal Article -
18
On the Network-Layer Modeling and Configuration of Programmable Wireless Environments
Published in IEEE/ACM transactions on networking (01-08-2019)“…Programmable wireless environments enable the software-defined propagation of waves within them, yielding exceptional performance. Several building-block…”
Get full text
Journal Article -
19
Software-Defined Reconfigurable Intelligent Surfaces: From Theory to End-to-End Implementation
Published in Proceedings of the IEEE (01-09-2022)“…Programmable wireless environments (PWEs) utilize internetworked intelligent metasurfaces to transform wireless propagation into a software-controlled…”
Get full text
Journal Article -
20
Scheduling of multiple network packet processing applications using Pythia
Published in Computer networks (Amsterdam, Netherlands : 1999) (20-07-2022)“…Modern commodity computing systems are composed by a number of different heterogeneous processing units, each of which has its own unique performance and…”
Get full text
Journal Article