Artemios G. Voyiatzis
Artemios G. Voyiatzis
Artemios Vogiatzis
Verified email at artemiosv.info - Homepage
Title
Cited by
Cited by
Year
A survey of delay-and disruption-tolerant networking applications
AG Voyiatzis
1062012
On the necessity of user-friendly CAPTCHA
CA Fidas, AG Voyiatzis, NM Avouris
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
882011
Security challenges in embedded systems
DN Serpanos, AG Voyiatzis
ACM Transactions on embedded computing systems (TECS) 12 (1s), 1-10, 2013
522013
Exciting FPGA cryptographic Trojans using combinatorial testing
P Kitsos, DE Simos, J Torres-Jimenez, AG Voyiatzis
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
462015
A Modbus/TCP fuzzer for testing internetworked industrial systems
AG Voyiatzis, K Katsigiannis, S Koubias
2015 IEEE 20th conference on emerging technologies & factory automation …, 2015
422015
Merged Mining: Curse or Cure?
A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl
International Workshop on Cryptocurrencies and Blockchain Technology (CBT'17 …, 2017
332017
FPGA Trojan detection using length-optimized ring oscillators
P Kitsos, AG Voyiatzis
2014 17th Euromicro Conference on Digital System Design, 675-678, 2014
292014
When security meets usability: A user-centric approach on a crossroads priority problem
CA Fidas, AG Voyiatzis, NM Avouris
2010 14th Panhellenic Conference on Informatics, 112-117, 2010
292010
Time is on my side: Steganography in filesystem metadata
S Neuner, AG Voyiatzis, M Schmiedecker, S Brunthaler, S Katzenbeisser, ...
Digital Investigation 18, S76-S86, 2016
272016
A Trust-based Resilient Routing Mechanism for the Internet of Things
ZA Khan, J Ullrich, AG Voyiatzis, P Herrmann
International Conference on Availability, Reliability and Security (ARES), 2017
262017
High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
L Ioannou, HE Michail, AG Voyiatzis
Embedded Computing (MECO), 2015 4th Mediterranean Conference on, 2015
262015
An empirical study on the web password strength in greece
AG Voyiatzis, CA Fidas, DN Serpanos, NM Avouris
2011 15th Panhellenic Conference on Informatics, 212-216, 2011
262011
Towards a hardware Trojan detection methodology
P Kitsos, AG Voyiatzis
2014 3rd Mediterranean Conference on Embedded Computing (MECO), 18-23, 2014
222014
A versatile scalable smart waste-bin system based on resource-limited embedded devices
A Papalambrou, D Karadimas, J Gialelis, AG Voyiatzis
2015 IEEE 20th Conference on Emerging Technologies & Factory Automation …, 2015
212015
An HMM-based anomaly detection approach for SCADA systems
K Stefanidis, AG Voyiatzis
IFIP International Conference on Information Security Theory and Practice, 85-99, 2016
202016
Efficient Triggering of Trojan Hardware Logic
AG Voyiatzis, KG Stefanidis, P Kitsos
19th IEEE International Symposium on Design and Diagnostics of Electronic …, 2016
192016
A Survey on Network Resiliency Methodologies against Weather-based Disruptions
M Tornatore, J André, P Babarczi, T Braun, E Følstad, P Heegaard, ...
8th International Workshop on Resilient Networks Design and Modeling (RNDM …, 2016
172016
Pipelined SHA-3 implementations on FPGA: Architecture and performance analysis
HE Michail, L Ioannou, AG Voyiatzis
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
172015
Combinatorial Methods in Security Testing
DE Simos, R Kuhn, AG Voyiatzis, R Kacker
IEEE Computer 49 (10), 80-83, 2016
162016
Design and implementation of an efficient integer count sort in CUDA GPUs
V Kolonias, AG Voyiatzis, G Goulas, E Housos
Concurrency and Computation: Practice and Experience 23 (18), 2365-2381, 2011
152011
The system can't perform the operation now. Try again later.
Articles 1–20