• A framework for secure data delivery in wireless sensor networks 

      Perlepes, L.; Zaharis, A.; Stamoulis, G.; Kikiras, P. (2012)
      Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could ...
    • Security assessment in IoT ecosystems 

      Evangelou S., Akasiadis C. (2020)
      The Internet of Things (IoT) and "Smart Everything" trend is a reality that is becoming part of our daily lives. Consequently, there is a gradual increase in the deployment of real world IoT systems that attempt to make ...