Survey in smart grid and smart home security: Issues, challenges and countermeasures N Komninos, E Philippou, A Pitsillides IEEE Communications Surveys & Tutorials 16 (4), 1933-1954, 2014 | 404 | 2014 |
Detecting unauthorized and compromised nodes in mobile ad hoc networks N Komninos, D Vergados, C Douligeris Ad Hoc Networks 5 (3), 289-298, 2007 | 102 | 2007 |
A new framework architecture for next generation e-health services MA Fengou, G Mantas, D Lymberopoulos, N Komninos, S Fengos, ... IEEE journal of biomedical and health informatics 17 (1), 9-18, 2012 | 62 | 2012 |
Intrusion detection with neural networks and watermarking techniques for MANET A Mitrokotsa, N Komninos, C Douligeris IEEE International Conference on Pervasive Services, 118-127, 2007 | 57 | 2007 |
The lord of the sense: A privacy preserving reputation system for participatory sensing applications A Michalas, N Komninos 2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014 | 48 | 2014 |
Survey of approaches and features for the identification of HTTP-based botnet traffic D Acarali, M Rajarajan, N Komninos, I Herwono Journal of Network and Computer Applications 76, 1-15, 2016 | 45 | 2016 |
Protecting biometric templates with image watermarking techniques N Komninos, T Dimitriou International Conference on Biometrics, 114-123, 2007 | 44 | 2007 |
Layered security design for mobile ad hoc networks N Komninos, D Vergados, C Douligeris computers & security 25 (2), 121-130, 2006 | 44 | 2006 |
LIDF: Layered intrusion detection framework for ad-hoc networks N Komninos, C Douligeris Ad Hoc Networks 7 (1), 171-182, 2009 | 40 | 2009 |
Security for 5G communications G Mantas, N Komninos, J Rodriuez, E Logota, H Marques John Wiley & Sons, Ltd., 2015 | 38 | 2015 |
Security in smart home environment G Mantas, D Lymberopoulos, N Komninos Wireless Technologies for Ambient Assisted Living and Healthcare: Systems …, 2011 | 35 | 2011 |
New client puzzle approach for dos resistance in ad hoc networks A Michalas, N Komninos, NR Prasad, VA Oleshchuk 2010 IEEE International Conference on Information Theory and Information …, 2010 | 33 | 2010 |
Degree-based clustering algorithms for wireless ad hoc networks under attack C Tselikis, S Mitropoulos, N Komninos, C Douligeris IEEE Communications Letters 16 (5), 619-621, 2012 | 29 | 2012 |
Authentication in a layered security approach for mobile ad hoc networks N Komninos, DD Vergados, C Douligeris computers & security 26 (5), 373-380, 2007 | 23 | 2007 |
Modelling the spread of botnet malware in IoT-based wireless sensor networks D Acarali, M Rajarajan, N Komninos, BB Zarpelão Security and Communication Networks 2019, 2019 | 19 | 2019 |
Multiplayer game for ddos attacks resilience in ad hoc networks A Michalas, N Komninos, NR Prasad 2011 2nd International Conference on Wireless Communication, Vehicular …, 2011 | 18 | 2011 |
Vulnerabilities of decentralized additive reputation systems regarding the privacy of individual votes A Michalas, T Dimitriou, T Giannetsos, N Komninos, NR Prasad Wireless Personal Communications 66 (3), 559-575, 2012 | 16 | 2012 |
Privacy-preserving scheme for mobile ad hoc networks A Michalas, VA Oleshchuk, N Komninos, NR Prasad 2011 IEEE Symposium on Computers and Communications (ISCC), 752-757, 2011 | 16 | 2011 |
ForChaos: real time application DDoS detection using forecasting and chaos theory in smart home IoT network A Procopiou, N Komninos, C Douligeris Wireless Communications and Mobile Computing 2019, 2019 | 15 | 2019 |
Mitigate dos and ddos attack in mobile ad hoc networks A Michalas, N Komninos, NR Prasad International Journal of Digital Crime and Forensics (IJDCF) 3 (1), 14-36, 2011 | 15 | 2011 |