default search action
Constantinos Kolias
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Vyron Kampourakis, Georgios Michail Makrakis, Constantinos Kolias:
From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks. Future Internet 16(4): 137 (2024) - [j23]Georgios Michail Makrakis, Dakota Roberson, Constantinos Kolias, Dallin Cook:
Evaluation of SDN security measures in the context of IEC 62443-3-3. Int. J. Crit. Infrastructure Prot. 47: 100716 (2024) - [c13]Kurt A. Vedros, Constantinos Kolias, Daniel Barbará, Robert C. Ivans:
From Code to EM Signals: A Generative Approach to Side Channel Analysis-based Anomaly Detection. ARES 2024: 20:1-20:10 - 2023
- [c12]Kurt A. Vedros, Constantinos Kolias, Robert C. Ivans:
Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis. MILCOM 2023: 716-721 - [i4]Kurt A. Vedros, Georgios Michail Makrakis, Constantinos Kolias, Robert C. Ivans, Craig Rieger:
Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting. CoRR abs/2302.02324 (2023) - 2022
- [j22]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias, Christos Smiliotopoulos:
Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection Systems. IEEE Access 10: 64761-64784 (2022) - [j21]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE. J. Inf. Secur. Appl. 64: 103058 (2022) - [j20]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces. Secur. Commun. Networks 2022: 1833062:1-1833062:24 (2022) - [j19]Efstratios Chatzoglou, Georgios Kambourakis, Christos Smiliotopoulos, Constantinos Kolias:
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features. Sensors 22(15): 5633 (2022) - [i3]Ekaterina Miller, Georgios Michail Makrakis, Kurt A. Vedros, Constantinos Kolias, Craig Rieger, Daniel Barbará:
Detecting Code Injections in Noisy Environments Through EM Signal Analysis and SVD Denoising. CoRR abs/2212.05643 (2022) - 2021
- [j18]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset. IEEE Access 9: 34188-34205 (2021) - [j17]Georgios Michail Makrakis, Constantinos Kolias, Georgios Kambourakis, Craig Rieger, Jacob Benjamin:
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents. IEEE Access 9: 165295-165325 (2021) - [j16]Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias:
WiF0: All Your Passphrase Are Belong to Us. Computer 54(7): 82-88 (2021) - [c11]Panagiotis Chatzigiannis, Foteini Baldimtsi, Constantinos Kolias, Angelos Stavrou:
Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors. IoTDI 2021: 1-14 - [i2]Panagiotis Chatzigiannis, Foteini Baldimtsi, Constantinos Kolias, Angelos Stavrou:
Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors. CoRR abs/2103.04028 (2021) - [i1]Georgios Michail Makrakis, Constantinos Kolias, Georgios Kambourakis, Craig Rieger, Jacob Benjamin:
Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures. CoRR abs/2109.03945 (2021) - 2020
- [j15]Georgios Kambourakis, Constantinos Kolias, Dimitris Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, Ioannis Kounelis:
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks. Symmetry 12(4): 579 (2020) - [c10]Constantinos Kolias, Daniel Barbará, Craig Rieger, Jacob Ulrich:
EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle. SP (Workshops) 2020: 144-151
2010 – 2019
- 2019
- [j14]Constantinos Kolias, Weizhi Meng, Georgios Kambourakis, Jiageng Chen:
Security, Privacy, and Trust on Internet of Things. Wirel. Commun. Mob. Comput. 2019 (2019) - 2018
- [j13]Jeffrey M. Voas, Rick Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis:
Cybertrust in the IoT Age. Computer 51(7): 12-15 (2018) - 2017
- [j12]Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Jeffrey M. Voas:
DDoS in the IoT: Mirai and Other Botnets. Computer 50(7): 80-84 (2017) - [j11]Sokratis Vidros, Constantinos Kolias, Georgios Kambourakis, Leman Akoglu:
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset. Future Internet 9(1): 6 (2017) - [j10]Constantinos Kolias, Vassilis Kolias, Georgios Kambourakis:
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection. Int. J. Inf. Sec. 16(4): 401-416 (2017) - [c9]Constantinos Kolias, Lucas Copi, Fengwei Zhang, Angelos Stavrou:
Breaking BLE Beacons For Fun But Mostly Profit. EUROSEC 2017: 4:1-4:6 - [c8]Georgios Kambourakis, Constantinos Kolias, Angelos Stavrou:
The Mirai botnet and the IoT Zombie Armies. MILCOM 2017: 267-272 - 2016
- [j9]Angelos Stavrou, Daniel Fleck, Constantinos Kolias:
On the Move: Evading Distributed Denial-of-Service Attacks. Computer 49(3): 104-107 (2016) - [j8]Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Stefanos Gritzalis:
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Commun. Surv. Tutorials 18(1): 184-208 (2016) - [j7]Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas, Irena Bojanova, D. Richard Kuhn:
Learning Internet-of-Things Security "Hands-On". IEEE Secur. Priv. 14(1): 37-46 (2016) - 2015
- [j6]Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas:
Securely Making "Things" Right. Computer 48(9): 84-88 (2015) - [c7]Zisis Tsiatsikas, Alexandros Fakis, Dimitrios Papamartzivanos, Dimitris Geneiatakis, Georgios Kambourakis, Constantinos Kolias:
Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?. SECRYPT 2015: 301-308 - 2014
- [b1]Constantinos Kolias:
Intrusion detection in wireless networks using nature inspired algorithms. University of the Aegean, Greece, 2014 - [c6]Vassilis Kolias, Constantinos Kolias, Ioannis Anagnostopoulos, Eleftherios Kayafas:
RuleMR: Classification rule discovery with MapReduce. IEEE BigData 2014: 20-28 - 2013
- [j5]Constantinos Kolias, Georgios Kambourakis, Stefanos Gritzalis:
Attacks and Countermeasures on 802.16: Analysis and Assessment. IEEE Commun. Surv. Tutorials 15(1): 487-514 (2013) - [p1]Constantinos Kolias, Vassilis Kolias, Georgios Kambourakis, Eleftherios Kayafas:
A Client-Side Privacy Framework for Web Personalization. Semantic Hyper/Multimedia Adaptation 2013: 297-316 - 2011
- [j4]Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park:
DoS attacks exploiting signaling in UMTS and IMS. Comput. Commun. 34(3): 226-235 (2011) - [j3]Constantinos Kolias, Georgios Kambourakis, Manolis Maragoudakis:
Swarm intelligence in intrusion detection: A survey. Comput. Secur. 30(8): 625-642 (2011) - 2010
- [j2]Constantinos Kolias, Vassilis Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, Eleftherios Kayafas:
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web. Pers. Ubiquitous Comput. 14(6): 527-539 (2010)
2000 – 2009
- 2009
- [c5]Constantinos Kolias, Vasilis Kolias, Georgios Kambourakis:
A secure and efficient authentication protocol for passive RFID tags. ISWCS 2009: 36-40 - [c4]Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park:
Signaling-Oriented DoS Attacks in UMTS Networks. ISA 2009: 280-289 - 2008
- [j1]Demosthenes Vouyioukas, Georgios Kambourakis, Ilias Maglogiannis, Angelos N. Rouskas, Constantinos Kolias, Stefanos Gritzalis:
Enabling the provision of secure web based m-health services utilizing XML based security models. Secur. Commun. Networks 1(5): 375-388 (2008) - [c3]Constantinos Kolias, Vassilis Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, Eleftherios Kayafas:
A pervasive wiki application based on VoiceXML. PETRA 2008: 58 - [c2]Vassilis Kolias, Constantinos Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, Eleftherios Kayafas:
A Speech-Enabled Assistive Collaborative Platform for Educational Purposes with User Personalization. SMAP 2008: 157-163 - [c1]Constantinos Kolias, Vassilis Kolias, Ioannis Anagnostopoulos, Georgios Kambourakis, Eleftherios Kayafas:
Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles. SMAP 2008: 170-176
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint