• Monitoring supply current thresholds for smart device's security enhancement 

      Myridakis D., Spathoulas G., Kakarountas A., Schinianakis D., Lueken J. (2019)
      The rapid growth of connected devices and the sensitive data they generate poses a significant challenge for manufacturers seeking to comprehensively protect their devices from attack. This paper presents a study and its ...
    • Proactive Attack Detection at the Edge through an Ensemble Deep Learning Model 

      Fountas P., Papathanasaki M., Kolomvatsos K., Tziritas N. (2021)
      The new form of the Web involves numerous devices present in two infrastructures, i.e., the Internet of Things (IoT) and the Edge Computing (EC) infrastructure. IoT devices are adopted to record ambient data and host ...
    • Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts 

      Spathoulas G., Theodoridis G., Damiris G.-P. (2021)
      Cyber-security attacks are becoming more frequent and more severe day by day. To detect the execution of such attacks, organizations install intrusion detection systems. It would be beneficial for such organizations to ...
    • Wearable panic attack detection system 

      Sapounaki M., Polychronou I., Gkonta M., Vogiatzoglou A., Kakarountas A. (2017)
      The paper proposes a wearable system for panic attack detection, constructed by COTS products. It is the first open hardware/open software prototype of its kind to the best of the authors knowledge. In this paper, the ...