• Real-life paradigms of wireless network security attacks 

      Mavridis, I. P.; Androulakis, A. I. E.; Halkias, A. B.; Mylonas, Ph (2011)
      Wirelesses Local Area Networks (WLANs) have become more prevalent and are widely deployed in many popular places like university campuses, cafés, airports, residences, etc. However, WLAN security is a very important but ...
    • The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats 

      Vlachos V., Stamatiou Y.C., Tzamalis P., Nikoletseas S. (2022)
      Data from Online Social Networks, search engines, and the World Wide Web are forms of unstructured knowledge that are not regularly used in cybersecurity systems. The main reason for the reluctance to utilize them is the ...
    • Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes 

      Ferrag M.A., Maglaras L., Argyriou A., Kosmanos D., Janicke H. (2018)
      This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ...
    • Security Revisited: Honeytokens meet Google Authenticator 

      Papaspirou V., Papathanasaki M., Maglaras L., Kantzavelou I., Douligeris C., Ferrag M.A., Janicke H. (2022)
      In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors ...
    • Server Consolidation in Cloud Computing 

      Tziritas N., Mustafa S., Koziri M., Loukopoulos T., Khan S.U., Xu C.-Z., Zomaya A.Y. (2019)
      Minimizing service-level agreement (SLA) violations and energy consumption through server consolidation is of paramount importance for the sustainability of cloud environments. In this paper, we propose an online method ...
    • Smart devices security enhancement via power supply monitoring 

      Myridakis D., Spathoulas G., Kakarountas A., Schinianakis D. (2020)
      The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, ...
    • ZKPs: Does this make the cut? Recent advances and success of zero-knowledge security protocols 

      Kassaras S., Maglaras L. (2020)
      How someone can get health insurance without sharing his health information? How you can get a loan without disclosing your credit score? There is a method to certify certain attributes of various data, either this is ...