Follow
Sofia Anna Menesidou
Sofia Anna Menesidou
Digital Security & Trusted Computing Group at UBITECH Ltd
Verified email at ubitech.eu
Title
Cited by
Cited by
Year
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
1162012
MILC: A secure and privacy-preserving mobile instant locator with chatting
A Loukas, D Damopoulos, SA Menesidou, ME Skarkala, G Kambourakis, ...
Information Systems Frontiers 14 (3), 481-497, 2012
292012
Secure edge computing with lightweight control-flow property-based attestation
N Koutroumpouchos, C Ntantogian, SA Menesidou, K Liang, P Gouvas, ...
2019 IEEE Conference on Network Softwarization (NetSoft), 84-92, 2019
152019
Cryptographic key management in delay tolerant networks: A survey
SA Menesidou, V Katos, G Kambourakis
Future Internet 9 (3), 26, 2017
142017
Authenticated key exchange (ake) in delay tolerant networks
SA Menesidou, V Katos
IFIP International Information Security Conference, 49-60, 2012
112012
Automated key exchange protocol evaluation in delay tolerant networks
SA Menesidou, D Vardalis, V Katos
Computers & Security 59, 1-8, 2016
52016
SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture
PR Grammatikis, P Sarigiannidis, C Dalamagkas, Y Spyridis, T Lagkas, ...
Digital 1 (4), 173-187, 2021
42021
A perfect match: Converging and automating privacy and security impact assessment on-the-fly
D Papamartzivanos, SA Menesidou, P Gouvas, T Giannetsos
Future Internet 13 (2), 30, 2021
42021
SECONDO: A platform for cybersecurity investments and cyber insurance decisions
A Farao, S Panda, SA Menesidou, E Veliou, N Episkopos, ...
International Conference on Trust and Privacy in Digital Business, 65-74, 2020
42020
Automated cyber and privacy risk management toolkit
G Gonzalez-Granadillo, SA Menesidou, D Papamartzivanos, R Romeu, ...
Sensors 21 (16), 5493, 2021
32021
Opportunistic key management in delay tolerant networks
SA Menesidou, V Katos
International Journal of Information and Computer Security 9 (3), 212-228, 2017
32017
A novel security architecture for a space-data DTN
NL Clarke, V Katos, SA Menesidou, B Ghita, S Furnell
International Conference on Wired/Wireless Internet Communications, 342-349, 2012
32012
Human-Centric Artificial Intelligence Architecture for Industry 5.0 Applications
JM Rožanec, I Novalija, P Zajec, K Kenda, H Tavakoli, S Suh, E Veliou, ...
arXiv preprint arXiv:2203.10794, 2022
22022
STARdom: an architecture for trusted and secure human-centered manufacturing systems
JM Rožanec, P Zajec, K Kenda, I Novalija, B Fortuna, D Mladenić, ...
IFIP International Conference on Advances in Production Management Systems …, 2021
22021
A Secure Protocol for Managing and Sharing Personal Healthcare Data
A Kiourtis, A Mavrogiorgou, SA Menesidou, P Gouvas, D Kyriazis
In Integrated Citizen Centered Digital Health and Social Care, 92-96, 2020
22020
Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing
D Papamartzivanos, SA Menesidou, P Gouvas, T Giannetsos
2021 IEEE International Mediterranean Conference on Communications and …, 2021
2021
SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture
P Radoglou-Grammatikis, P Sarigiannidis, C Dalamagkas, Y Spyridis, ...
MDPI, 2021
2021
Towards 5G Embedded Trust: Integrating Attestation Extensions in Vertical Industries
A Giannetsos, D Papamartzivanos, SA Menesidou, S Karagiorgou
30th European Conference on Networks andCommunications, 2021
2021
Correlation between Intense Solar Energetic Particle Fluxes and Atmospheric Weather Extremes
G Anagnostopoulos, SA Menesidou, VG Vassiliadis, A Rigas
Preprints, 2019
2019
Cryptographic key management in delay tolerant networks
SA Menesidou
Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ). Σχολή Πολυτεχνική. Τμήμα Ηλεκτρολόγων …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20