Constantinos Kolias
Title
Cited by
Cited by
Year
DDoS in the IoT: Mirai and Other Botnets
C Kolias, G Kambourakis, A Stavrou, J Voas
Computer 50 (7), 80-84, 2017
7622017
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
C Kolias, G Kambourakis, A Stavrou, S Gritzalis
IEEE, 2015
1752015
Swarm intelligence in intrusion detection: A survey
C Kolias, G Kambourakis, M Maragoudakis
Computers & Security 30 (8), 625-642, 2011
1642011
Learning Internet-of-Things Security" Hands-On"
C Kolias, A Stavrou, J Voas, I Bojanova, R Kuhn
IEEE Security & Privacy 14 (1), 37-46, 2016
872016
The mirai botnet and the iot zombie armies
G Kambourakis, C Kolias, A Stavrou
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 267-272, 2017
862017
DoS attacks exploiting signaling in UMTS and IMS
G Kambourakis, C Kolias, S Gritzalis, JH Park
Computer Communications 34 (3), 226-235, 2011
542011
Attacks and Countermeasures on 802.16: Analysis and Assessment
C Kolias, G Kambourakis, S Gritzalis
472013
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection
C Kolias, V Kolias, G Kambourakis
International Journal of Information Security 16 (4), 401-416, 2017
322017
Signaling-oriented DoS attacks in UMTS networks
G Kambourakis, C Kolias, S Gritzalis, J Hyuk-Park
International Conference on Information Security and Assurance, 280-289, 2009
202009
Securely Making" Things" Right
C Kolias, A Stavrou, J Voas
Computer 48 (9), 84-88, 2015
162015
Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?
Z Tsiatsikas, A Fakis, D Papamartzivanos, D Geneiatakis, G Kambourakis, ...
2015 12th International Joint Conference on e-Business and …, 2015
142015
Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?
Z Tsiatsikas, A Fakis, D Papamartzivanos, D Geneiatakis, G Kambourakis, ...
2015 12th International Joint Conference on e-Business and …, 2015
142015
Breaking BLE Beacons For Fun But Mostly Profit
C Kolias, L Copi, F Zhang, A Stavrou
Proceedings of the 10th European Workshop on Systems Security, 4, 2017
132017
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset
S Vidros, C Kolias, G Kambourakis, L Akoglu
Future Internet 9 (1), 6, 2017
132017
Online recruitment services: another playground for fraudsters
S Vidros, C Kolias, G Kambourakis
Computer Fraud & Security 2016 (3), 8-13, 2016
132016
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web
C Kolias, V Kolias, I Anagnostopoulos, G Kambourakis, E Kayafas
Personal and Ubiquitous Computing 14 (6), 527-539, 2010
132010
Enhancing user privacy in adaptive web sites with client-side user profiles
C Kolias, V Kolias, I Anagnostopoulos, G Kambourakis, E Kayafas
Semantic Media Adaptation and Personalization, 2008. SMAP'08. Third …, 2008
122008
RuleMR: Classification rule discovery with MapReduce
V Kolias, C Kolias, I Anagnostopoulos, E Kayafas
2014 IEEE International Conference on Big Data (Big Data), 20-28, 2014
82014
Cybertrust in the IoT Age
J Voas, R Kuhn, C Kolias, A Stavrou, G Kambourakis
Computer 51 (7), 12-15, 2018
72018
Enabling the provision of secure web based m‐health services utilizing XML based security models
D Vouyioukas, G Kambourakis, I Maglogiannis, A Rouskas, C Kolias, ...
Security and Communication Networks 1 (5), 375-388, 2008
72008
The system can't perform the operation now. Try again later.
Articles 1–20