Logo
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Ελληνικά 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Σύνδεση
Πλοήγηση ανά Θέμα 
  •   Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
  • Πλοήγηση ανά Θέμα
  •   Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
  • Πλοήγηση ανά Θέμα
JavaScript is disabled for your browser. Some features of this site may not work without it.
Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
Όλο το DSpace
  • Κοινότητες & Συλλογές
  • Ανά ημερομηνία δημοσίευσης
  • Συγγραφείς
  • Τίτλοι
  • Λέξεις κλειδιά

Πλοήγηση ανά Θέμα "Network security"

  • 0-9
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • Α
  • Β
  • Γ
  • Δ
  • Ε
  • Ζ
  • Η
  • Θ
  • Ι
  • Κ
  • Λ
  • Μ
  • Ν
  • Ξ
  • Ο
  • Π
  • Ρ
  • Σ
  • Τ
  • Υ
  • Φ
  • Χ
  • Ψ
  • Ω

Ταξινόμηση κατά:

Σειρά:

Αποτελέσματα:

Αποτελέσματα 1-20 από 27

  • τίτλος
  • ημερομηνία δημοσίευσης
  • ημερομηνία υποβολής
  • αύξουσα
  • φθίνουσα
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
    • Thumbnail

      Anomaly detection via blockchained deep learning smart contracts in industry 4.0 

      Demertzis K., Iliadis L., Tziritas N., Kikiras P. (2020)
      The complexity of threats in the ever-changing environment of modern industry is constantly increasing. At the same time, traditional security systems fail to detect serious threats of increasing depth and duration. ...
    • Thumbnail

      Assessment of Machine Learning Techniques for Building an Efficient IDS 

      Chytas S.P., Maglaras L., Derhab A., Stamoulis G. (2020)
      Intrusion Detection Systems (IDS) are the systems that detect and block any potential threats (e.g. DDoS attacks) in the network. In this project, we explore the performance of several machine learning techniques when used ...
    • Thumbnail

      The beneficial endophytic fungus fusarium solani strain K alters tomato responses against spider mites to the benefit of the plant 

      Pappas M.L., Liapoura M., Papantoniou D., Avramidou M., Kavroulakis N., Weinhold A., Broufas G.D., Papadopoulou K.K. (2018)
      Beneficial microorganisms are known to promote plant growth and confer resistance to biotic and abiotic stressors. Soil-borne beneficial microbes in particular have shown potential in protecting plants against pathogens ...
    • Thumbnail

      Collaborative agent-based detection of DDoS IoT botnets 

      Giachoudis N., Damiris G.-P., Theodoridis G., Spathoulas G. (2019)
      The Internet of Things constitutes the latest paradigm shift in computing. Billions of devices sense the real world and store produced data in the cloud. Existing security models, approaches and solutions are not able to ...
    • Thumbnail

      Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets 

      Spathoulas G., Giachoudis N., Damiris G.-P., Theodoridis G. (2019)
      Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high ...
    • Thumbnail

      Data Replication and Virtual Machine Migrations to Mitigate Network Overhead in Edge Computing Systems 

      Tziritas N., Koziri M., Bachtsevani A., Loukopoulos T., Stamoulis G., Khan S.U., Xu C.-Z. (2017)
      Several virtual machine (VM) placement algorithms have been proposed and studied in the literature with various scopes such as server consolidation or network cost minimization. In most cases, decisions on VM migrations ...
    • Thumbnail

      Detection of abnormal behavior in smart-home environments 

      Spathoulas G., Evangelatos S., Anagnostopoulos M., Mema G., Katsikas S. (2019)
      Without a doubt, the security of Internet of Things (IoT) systems is of crucial importance. The use of such systems has significantly increased in the recent year, where in every aspect of our daily life we interact with ...
    • Thumbnail

      Diagnosis of Induced Resistance State in Tomato Using Artificial Neural Network Models Based on Supervised Self-Organizing Maps and Fluorescence Kinetics 

      Pantazi X.E., Lagopodi A.L., Tamouridou A.A., Kamou N.N., Giannakis I., Lagiotis G., Stavridou E., Madesis P., Tziotzios G., Dolaptsis K., Moshou D. (2022)
      The aim of this study was to develop three supervised self-organizing map (SOM) models for the automatic recognition of a systemic resistance state in plants after application of a resistance inducer. The pathosystem ...
    • Thumbnail

      DReDBox: Materializing a full-stack rack-scale system prototype of a next-generation disaggregated datacenter 

      Bielski M., Syrigos I., Katrinis K., Syrivelis D., Reale A., Theodoropoulos D., Alachiotis N., Pnevmatikatos D., Pap E.H., Zervas G., Mishra V., Saljoghei A., Rigo A., Fernando Zazo J., Lopez-Buedo S., Torrents M., Zyulkyarov F., Enrico M., Gonzalez De DIos O. (2018)
      Current datacenters are based on server machines, whose mainboard and hardware components form the baseline, monolithic building block that the rest of the system software, middleware and application stack are built upon. ...
    • Thumbnail

      An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks 

      Almomani I., Ahmed M., Kosmanos D., Alkhayer A., Maglaras L. (2022)
      Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets, especially for self-driving cars, as it is ...
    • Thumbnail

      Experimental evaluation of orchestration software for virtual network functions 

      Valantasis A., Makris N., Zarafetas C., Korakis T. (2021)
      The adoption of Network Functions Virtualization (NFV) is considered as one of the enablers for a fully softwarized 5G architecture, that allows significantly higher flexibility for network service providers to instantiate ...
    • Thumbnail

      From internet of threats to internet of things: A cyber security architecture for smart homes 

      Augusto-Gonzalez J., Collen A., Evangelatos S., Anagnostopoulos M., Spathoulas G., Giannoutakis K.M., Votis K., Tzovaras D., Genge B., Gelenbe E., Nijdam N.A. (2019)
      The H2020 European research project GHOST-Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control-aims to deploy a highly effective security framework for IoT smart home residents through a novel ...
    • Thumbnail

      Further adjustment of the Defense Meteorological Satellite Program - Operational Linescan System using radar data 

      Demetris S., Leonidas L. (2019)
      In the past, the Defense Meteorological Satellite Program - Operational Linescan System (DSMP/OLS) data have been successfully adjusted based on the presence of vegetation in each pixel. We propose a further adjustment ...
    • Thumbnail

      Intrusion detection system for platooning connected autonomous vehicles 

      Kosmanos D., Pappas A., Aparicio-Navarro F.J., Maglaras L., Janicke H., Boiten E., Argyriou A. (2019)
      The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication ...
    • Thumbnail

      A Lipschitz - Shapley Explainable Defense Methodology Against Adversarial Attacks 

      Demertzis K., Iliadis L., Kikiras P. (2021)
      Every learning algorithm, has a specific bias. This may be due to the choice of its hyperparameters, to the characteristics of its classification methodology, or even to the representation approach of the considered ...
    • Thumbnail

      A Mechanism Design and Learning Approach for Revenue Maximization on Cloud Dynamic Spot Markets 

      Tsiourvas A., Bitsakos C., Konstantinou I., Fotakis D., Koziris N. (2021)
      Modern large-scale computing deployments consist of complex elastic applications running over machine clusters. A current trend adopted by providers is to set unused virtual machines, or else spot instances, in low prices ...
    • Thumbnail

      The next generation cognitive security operations center: Adaptive analytic lambda architecture for efficient defense against adversarial attacks 

      Demertzis K., Tziritas N., Kikiras P., Sanchez S.L., Iliadis L. (2019)
      A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization’s security posture on an ongoing basis. The SOC staff works closely with ...
    • Thumbnail

      An open web services - Based framework for data mining of biomedical image data 

      Doukas, C.; Maglogiannis, I.; Chatziioannou, A. (2009)
      Mining of biomedical image data is a complex procedure that requires several processing phases, such as data acquisition, preprocessing (e.g., image enhancement, color processing), feature extraction and classification. ...
    • Thumbnail

      Patients Undergoing Surgery for Hip Fractures Suffer from Severe Oxidative Stress as Compared to Patients with Hip Osteoarthritis Undergoing Total Hip Arthroplasty 

      Karachalios T., Paridis D., Tekos F., Skaperda Z., Veskoukis A.S., Kouretas D. (2021)
      Hip fractures are associated with the highest degree of morbidity and mortality of all fractures in elderly patients and pose a major risk for subsequent fractures. Patients with hip fractures also present accelerated bone ...
    • Thumbnail

      Private 5G Networks: Concepts, Architectures, and Research Landscape 

      Wen M., Li Q., Kim K.J., Lopez-Perez D., Dobre O., Poor H.V., Popovski P., Tsiftsis T. (2022)
      A private fifth generation (5G) network is a dedicated 5G network with enhanced communication characteristics, unified connectivity, optimized services, and customized security within a specific area. By subsuming the ...
      Η δικτυακή πύλη της Ευρωπαϊκής Ένωσης
      Ψηφιακή Ελλάδα
      ΕΣΠΑ 2007-2013
      Με τη συγχρηματοδότηση της Ελλάδας και της Ευρωπαϊκής Ένωσης
      htmlmap 

       

      Πλοήγηση

      Όλο το DSpaceΚοινότητες & ΣυλλογέςΑνά ημερομηνία δημοσίευσηςΣυγγραφείςΤίτλοιΛέξεις κλειδιά

      Ο λογαριασμός μου

      ΣύνδεσηΕγγραφή (MyDSpace)
      Πληροφορίες-Επικοινωνία
      ΑπόθεσηΣχετικά μεΒοήθειαΕπικοινωνήστε μαζί μας
      Επιλογή ΓλώσσαςΌλο το DSpace
      EnglishΕλληνικά
      Η δικτυακή πύλη της Ευρωπαϊκής Ένωσης
      Ψηφιακή Ελλάδα
      ΕΣΠΑ 2007-2013
      Με τη συγχρηματοδότηση της Ελλάδας και της Ευρωπαϊκής Ένωσης
      htmlmap