• An analytic framework for modeling and detecting access layer misbehavior in wireless networks 

      Radosavac, S.; Moustakides, G.; Baras, J. S.; Koutsopoulos, I. (2008)
      The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology has forced network designers to put emphasis on the importance of ensuring efficient and fair use of network resources. ...
    • Energy security in the Eastern Mediterranean 

      Stergiou A. (2017)
      As is widely known, the East Mediterranean region has experienced a series of large-scale discoveries of energy resources offshore Israel, Cyprus and Egypt (Leviathan, Tamar, Aphrodite and Zohr fields) since 2009. From the ...
    • Supply current monitoring for anomaly detection on IoT devices 

      Myridakis D., Spathoulas G., Kakarountas A. (2017)
      This paper presents results from the correlation of the supply current of a smart device to its functional characteristics in order to detect a manufacturing or an operational anomaly. Awareness of the typical operation ...
    • VIPSec defined 

      Zisiadis, D.; Kopsidas, S.; Tassiulas, L. (2008)
      Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...