• Impact of optimal MAC layer attacks on the network layer 

      Radosavac, S.; Baras, J. S.; Moustakides, G. V. (2006)
      Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existing links. In this work we consider node ...
    • Intrusion detection system for platooning connected autonomous vehicles 

      Kosmanos D., Pappas A., Aparicio-Navarro F.J., Maglaras L., Janicke H., Boiten E., Argyriou A. (2019)
      The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication ...
    • Network threat analysis 

      Brékine A., Papathanasiou A., Kavallieros D., Ziegler S., Hemmens C., Quesada Rodriguez A., Germanos G., Kokkinis G., Leventakis G., Armin J., Bothos J. (2019)
      This chapter will share some key results from the SAINT project starting with an overview of the people who form the cybercrime network including attackers, victims and the organisations who are attempting to protect them. ...
    • Optimal jamming attack strategies and network defense policies in wireless sensor networks 

      Li, M.; Koutsopoulos, I.; Poovendran, R. (2010)
      We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-access-based wireless sensor network operates. The jammer controls the probability of jamming and the transmission range in ...
    • Real-life paradigms of wireless network security attacks 

      Mavridis, I. P.; Androulakis, A. I. E.; Halkias, A. B.; Mylonas, Ph (2011)
      Wirelesses Local Area Networks (WLANs) have become more prevalent and are widely deployed in many popular places like university campuses, cafés, airports, residences, etc. However, WLAN security is a very important but ...
    • A test-bed for intrusion detection systems results post-processing 

      Spathoulas, G.; Katsikas, S. K.; Charoulis, A. (2014)
      Intrusion detection systems produce alert sets of low quality. Many post-processing methods have been proposed to make alert sets more meaningful to security analysts. Relevant research has to deal with an important task; ...
    • Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts 

      Spathoulas G., Theodoridis G., Damiris G.-P. (2021)
      Cyber-security attacks are becoming more frequent and more severe day by day. To detect the execution of such attacks, organizations install intrusion detection systems. It would be beneficial for such organizations to ...