Aikaterini (Katerina) Mitrokotsa
Cited by
Cited by
DDoS attacks and defense mechanisms: classification and state-of-the-art
C Douligeris, A Mitrokotsa
Computer Networks 44 (5), 643-666, 2004
RFID and sensor networks: architectures, protocols, security, and integrations
Y Zhang, LT Yang, J Chen
CRC Press, 2009
Classifying RFID attacks and defenses
A Mitrokotsa, MR Rieback, AS Tanenbaum
Information Systems Frontiers 12 (5), 491-505, 2010
A comprehensive RFID solution to enhance inpatient medication safety
P Peris-Lopez, A Orfila, A Mitrokotsa, JCA Van der Lubbe
international journal of medical informatics 80 (1), 13-24, 2011
Classification of RFID attacks
A Mitrokotsa, MR Rieback, AS Tanenbaum
Gen 15693 (14443), 14, 2010
Intrusion detection in MANET using classification algorithms: The effects of cost and model selection
A Mitrokotsa, C Dimitrakakis
Ad Hoc Networks 11 (1), 226-237, 2013
DDoS attacks and defense mechanisms: a classification
C Douligeris, A Mitrokotsa
Proceedings of the 3rd IEEE International Symposium on Signal Processing and …, 2003
Robust and private Bayesian inference
C Dimitrakakis, B Nelson, A Mitrokotsa, BIP Rubinstein
International Conference on Algorithmic Learning Theory, 291-305, 2014
Integrated RFID and sensor networks: architectures and applications
A Mitrokotsa, C Douligeris
RFID and sensor networks: Architectures, protocols, security and …, 2009
Practical and provably secure distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Journal of Computer Security 23 (2), 229-257, 2015
Detecting denial of service attacks using emergent self-organizing maps
A Mitrokotsa, C Douligeris
Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005
Secure and lightweight distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
International Workshop on Lightweight Cryptography for Security and Privacy …, 2013
Intrusion detection with neural networks and watermarking techniques for MANET
A Mitrokotsa, N Komninos, C Douligeris
IEEE International Conference on Pervasive Services, 118-127, 2007
Towards secure distance bounding
I Boureanu, A Mitrokotsa, S Vaudenay
International Workshop on Fast Software Encryption, 55-67, 2013
Evaluation of classification algorithms for intrusion detection in MANETs
S Pastrana, A Mitrokotsa, A Orfila, P Peris-Lopez
Knowledge-Based Systems 36, 217-225, 2012
Multi-key homomorphic authenticators
D Fiore, A Mitrokotsa, L Nizzardo, E Pagnin
IET Information Security 13 (6), 618-638, 2019
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels
A Mitrokotsa, C Dimitrakakis, P Peris-Lopez, JC Hernandez-Castro
IEEE Communications Letters 14 (2), 121-123, 2010
On the pseudorandom function assumption in (secure) distance-bounding protocols
I Boureanu, A Mitrokotsa, S Vaudenay
International Conference on Cryptology and Information Security in Latin …, 2012
Intrusion detection in mobile ad hoc networks using classification algorithms
A Mitrokotsa, M Tsagkaris, C Douligeris
IFIP Annual Mediterranean Ad Hoc Networking Workshop, 133-144, 2008
RFID technology, systems, and applications
QZ Sheng, S Zeadally, A Mitrokotsa, Z Maamar
Journal of network and computer applications 34 (ARTICLE), 797-798, 2011
The system can't perform the operation now. Try again later.
Articles 1–20