Constantinos Kolias
Title
Cited by
Cited by
Year
DDoS in the IoT: Mirai and Other Botnets
C Kolias, G Kambourakis, A Stavrou, J Voas
Computer 50 (7), 80-84, 2017
13462017
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
C Kolias, G Kambourakis, A Stavrou, S Gritzalis
IEEE, 2015
3192015
Swarm intelligence in intrusion detection: A survey
C Kolias, G Kambourakis, M Maragoudakis
Computers & Security 30 (8), 625-642, 2011
1932011
The mirai botnet and the iot zombie armies
G Kambourakis, C Kolias, A Stavrou
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 267-272, 2017
1592017
Learning Internet-of-Things Security" Hands-On"
C Kolias, A Stavrou, J Voas, I Bojanova, R Kuhn
IEEE Security & Privacy 14 (1), 37-46, 2016
1222016
DoS attacks exploiting signaling in UMTS and IMS
G Kambourakis, C Kolias, S Gritzalis, JH Park
Computer Communications 34 (3), 226-235, 2011
592011
Attacks and Countermeasures on 802.16: Analysis and Assessment
C Kolias, G Kambourakis, S Gritzalis
542013
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection
C Kolias, V Kolias, G Kambourakis
International Journal of Information Security 16 (4), 401-416, 2017
492017
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset
S Vidros, C Kolias, G Kambourakis, L Akoglu
Future Internet 9 (1), 6, 2017
322017
Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?
Z Tsiatsikas, A Fakis, D Papamartzivanos, D Geneiatakis, G Kambourakis, ...
2015 12th International Joint Conference on e-Business and …, 2015
232015
Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?
Z Tsiatsikas, A Fakis, D Papamartzivanos, D Geneiatakis, G Kambourakis, ...
2015 12th International Joint Conference on e-Business and …, 2015
232015
Signaling-oriented DoS attacks in UMTS networks
G Kambourakis, C Kolias, S Gritzalis, J Hyuk-Park
International Conference on Information Security and Assurance, 280-289, 2009
232009
Online recruitment services: another playground for fraudsters
S Vidros, C Kolias, G Kambourakis
Computer Fraud & Security 2016 (3), 8-13, 2016
212016
Breaking BLE Beacons For Fun But Mostly Profit
C Kolias, L Copi, F Zhang, A Stavrou
Proceedings of the 10th European Workshop on Systems Security, 4, 2017
172017
Securely Making" Things" Right
C Kolias, A Stavrou, J Voas
Computer 48 (9), 84-88, 2015
162015
Cybertrust in the IoT Age
J Voas, R Kuhn, C Kolias, A Stavrou, G Kambourakis
Computer 51 (7), 12-15, 2018
142018
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks
G Kambourakis, C Kolias, D Geneiatakis, G Karopoulos, GM Makrakis, ...
Symmetry 12 (4), 579, 2020
132020
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web
C Kolias, V Kolias, I Anagnostopoulos, G Kambourakis, E Kayafas
Personal and Ubiquitous Computing 14 (6), 527-539, 2010
132010
Enhancing user privacy in adaptive web sites with client-side user profiles
C Kolias, V Kolias, I Anagnostopoulos, G Kambourakis, E Kayafas
2008 Third International Workshop on Semantic Media Adaptation and …, 2008
132008
Security, privacy, and trust on internet of things
C Kolias, W Meng, G Kambourakis, J Chen
Wireless Communications and Mobile Computing 2019, 2019
102019
The system can't perform the operation now. Try again later.
Articles 1–20