Christos Douligeris

Orcid: 0000-0002-6849-6693

According to our database1, Christos Douligeris authored at least 280 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards more sustainable higher education institutions: Implementing the sustainable development goals and embedding sustainability into the information and computer technology curricula.
Educ. Inf. Technol., March, 2024

Exploring the Awareness Outcomes of Educating ICT Students on the Environmental Implications of e-Waste Recycling and Energy Consumption in Data Centers.
IEEE Trans. Educ., February, 2024

Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing.
Comput., 2024

2023
A Novel Authentication Method That Combines Honeytokens and Google Authenticator.
Inf., 2023

Applying a persuasive framework for adopting a sustainable mobile travelling attitude.
Int. J. Mob. Commun., 2023

Teachers' Evaluation of 3D Design and 3D Printing Activities in Secondary Education.
Proceedings of the 8th South-East Europe Design Automation, 2023

Educational Virtual Worlds for Vocational Education and Training Laboratories.
Proceedings of the 8th South-East Europe Design Automation, 2023

ARM64 Architecture: A Review in Virtualization Technology and Cloud Computing Maturity, in the context of Environmental Sustainability.
Proceedings of the 8th South-East Europe Design Automation, 2023

An Early Warning Opportunistic Interference Method in Tactical Voice and Data Communications.
Proceedings of the 8th South-East Europe Design Automation, 2023

"Athens Museum Explorer": A Pilot Application of Cultural Proposals for a Smart City.
Proceedings of the 8th South-East Europe Design Automation, 2023

Preface.
Proceedings of the 8th South-East Europe Design Automation, 2023

Specific modeling issues for designing the transformation of a smart city.
Proceedings of the 27th Pan-Hellenic Conference on Progress in Computing and Informatics, 2023

Automated WiFi Incident Detection Attack Tool on 802.11 Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Assessment of data types and of the ways they are used in Scratch using the SOLO taxonomy.
Proceedings of the IEEE Global Engineering Education Conference, 2023

Sustainability-Oriented Schools in Greece: Analyzing Pupils' Opinions and Perceptions about Sustainability and Redesign Computer Science Curricula towards Green Informatics.
Proceedings of the IEEE Global Engineering Education Conference, 2023

Reducing the Synchronization Time in the Minimal 6TiSCH Configuration Under Channel Uncertainty.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023

2022
A prototype network monitoring information system: modelling, design, implementation and evaluation.
Int. J. Inf. Commun. Technol., 2022

Reengineering the certification process for aircraft equipment.
Int. J. Bus. Process. Integr. Manag., 2022

A prototype workflow MIS for supply chain management: architecture, implementation and business evaluation.
Int. J. Bus. Inf. Syst., 2022

Electric Vehicle Charging: A Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP).
IEEE Commun. Surv. Tutorials, 2022

Guest Editorial: 26th IEEE symposium on computers and communications (ISCC 2021) selected papers.
Comput. Networks, 2022

"Pythagorean Academy" - A game for the teaching of junior high school mathematics using mobile devices.
Proceedings of the 7th South-East Europe Design Automation, 2022

Security Revisited: Honeytokens meet Google Authenticator.
Proceedings of the 7th South-East Europe Design Automation, 2022

Assessment of data carriers with the SOLO taxonomy in Scratch.
Proceedings of the 7th South-East Europe Design Automation, 2022

Augmented Reality and Internet of Things Trends in Education.
Proceedings of the 7th South-East Europe Design Automation, 2022

Exploring Pupils' Knowledge and Awareness of E-Waste Recycling in Greece.
Proceedings of the 7th South-East Europe Design Automation, 2022

Exam Wizard e-assessment platform: new features, field test results and instructor's experience.
Proceedings of the 26th Pan-Hellenic Conference on Informatics, 2022

Re-configuration from the Edge: alternative Software Models for time-sensitive IoT Applications.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Automating environmental vulnerability analysis for network services.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Digital Twins and Sustainability in Vocational Education and Training: The Case of Structural Environment and Architectural Design in Vocational High Schools.
Proceedings of the Learning in the Age of Digital and Green Transition, 2022

Teaching the Simple Network Management Protocol Using the Packet Tracer Anywhere Network Simulator.
Proceedings of the Learning in the Age of Digital and Green Transition, 2022

Assessment of command structuring in Scratch programming using the SOLO taxonomy.
Proceedings of the IEEE Global Engineering Education Conference, 2022

Neural Network for Spam Recognition in Short Message Services as an Instructional Application for Students of Vocational Education and Training.
Proceedings of the IEEE Global Engineering Education Conference, 2022

FFDA: A novel Four-Factor Distributed Authentication mechanism.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

A Security Assessment Platform for Stochastic Petri Net (SPN) Modelling in the Internet of Things (IoT) Ecosystem.
Proceedings of the Domain-Specific Conceptual Modeling - Concepts, Methods and ADOxx Tools, 2022

2021
Searching Deterministic Chaotic Properties in System-Wide Vulnerability Datasets.
Informatics, 2021

Learning programming by creating games through the use of structured activities in secondary education in Greece.
Educ. Inf. Technol., 2021

Cybersecurity Revisited: Honeytokens meet Google Authenticator.
CoRR, 2021

Performance Determinants in LoRa Networks: A Literature Review.
IEEE Commun. Surv. Tutorials, 2021

Improving Business Performance by Employing Virtualization Technology: A Case Study in the Financial Sector.
Comput., 2021

ESTA: Educating Adolescents in Sustainable Travel Urban Behavior through Mobile Applications Using Motivational Features.
Comput., 2021

Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal.
IEEE Access, 2021

Optimal Initial Synchronization Time in the Minimal 6TiSCH Configuration.
IEEE Access, 2021

STEAM in VET - An ArcGIS StoryMap Approach.
Proceedings of the 6th South-East Europe Design Automation, 2021

Motivating students in distance programming learning using games.
Proceedings of the 6th South-East Europe Design Automation, 2021

Management of sensors in robotic constructions provided by primary school children.
Proceedings of the 6th South-East Europe Design Automation, 2021

A Review on Cloud Computing services, concerns, and security risk awareness in the context of Digital Transformation.
Proceedings of the 6th South-East Europe Design Automation, 2021

A Methodology for Adopting Security Management Principles in Health Sector Environments.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

Exploring the Utilization of Online Open-Source Environments for Mobile Applications Development in the Vocational Education and Training (VET) Curriculum.
Proceedings of the New Realities, Mobile Systems and Applications, 2021

Towards a Smart Classroom Enabled Sustainability Education: A Conceptual Model.
Proceedings of the New Realities, Mobile Systems and Applications, 2021

Network Simulator Software Utilization as a Teaching Method for Distance Learning.
Proceedings of the Mobility for Smart Cities and Regional Development - Challenges for Higher Education, 2021

A novel Two-Factor HoneyToken Authentication Mechanism.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

Techniques and Technologies for the Administrative Support of Distance Education in Junior High Schools in the Corona Virus Age.
Proceedings of the IEEE Global Engineering Education Conference, 2021

Women and Digital Economy: Culture Change or Perpetuation of Inequalities?
Proceedings of the IEEE Global Engineering Education Conference, 2021

Quantum Cryptography in Maritime Telecommunications.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Security in IoMT Communications: A Survey.
Sensors, 2020

On the conference key distribution system with user anonymity.
J. Inf. Secur. Appl., 2020

Improving software development process using simulation: case study in ICT services sector.
Int. J. Bus. Process. Integr. Manag., 2020

CAPODAZ: A containerised authorisation and policy-driven architecture using microservices.
Ad Hoc Networks, 2020

Efficient Resource Allocation in Tactile-Capable Ethernet Passive Optical Healthcare LANs.
IEEE Access, 2020

Creating and using digital games for learning in elementary and secondary education.
Proceedings of the 5th South-East Europe Design Automation, 2020

Educating Adolescents In Sustainable Travel Urban Behavior Through Mobile Applications Using Motivational Features.
Proceedings of the 5th South-East Europe Design Automation, 2020

The Insider Threat: Reasons, Effects and Mitigation Techniques.
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020

A Blockchain framework for reverse logistics of used medical equipment.
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020

Mobile Applications and Projects for Sustainable Urban Public Transportation: a Selective Review.
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020

A Theoretical Persuasive Framework for Supporting and Evolving an Individual's Sustainable Mobile Traveling Attitude.
Proceedings of the 11th International Conference on Information, 2020

Vocational Education and Training Apprenticeship: Using Teaching and Learning Analytics in a Learning Management System for improved Collaboration, Individual Empowerment and Development of Apprentices.
Proceedings of the 2020 IEEE Global Engineering Education Conference, 2020

Adaptive Protocol with Weights for Fair Distribution of Resources in Healthcare-Oriented PONs.
Proceedings of the International Conference on Computer, 2020

2019
ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network.
Wirel. Commun. Mob. Comput., 2019

Collision-Free Advertisement Scheduling for IEEE 802.15.4-TSCH Networks.
Sensors, 2019

Optimal routing approaches for IEEE 802.15.4 TSCH networks.
Trans. Emerg. Telecommun. Technol., 2019

Learning with the AppInventor programming software through the use of structured educational scenarios in secondary education in Greece.
Educ. Inf. Technol., 2019

Exam Wizard: A novel e-assessment system.
Proceedings of the 4th South-East Europe Design Automation, 2019

Students' Evaluation of the "Web Technologies" Android Application for Higher Education.
Proceedings of the 4th South-East Europe Design Automation, 2019

Teaching Internet of Things (IoT) in the Electronics Specialty of Vocational Education and Training.
Proceedings of the 4th South-East Europe Design Automation, 2019

Kinds of loops implemented with messages in Scratch and the SOLO Taxonomy.
Proceedings of the 4th South-East Europe Design Automation, 2019

Functional and non-functional requirements of a smart triage system for Emergency Departments: the case of IntelTriage project.
Proceedings of the 4th South-East Europe Design Automation, 2019

Towards the Definition of an Intelligent Triage and Continuous Monitoring System for Hospital Emergency Departments and Clinics.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019

Fast and Reliable LoRa-based Data Transmissions.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

"The Greek Steelbook (TGS)" The Home of Steelbook Presentations.
Proceedings of the Internet of Things, Infrastructures and Mobile Applications - Proceedings of the 13th IMCL Conference, Thessaloniki, Greece, 31 October, 2019

An Escape Room Game for Learning Digital Electronics in Vocational Education and Training (VET).
Proceedings of the Internet of Things, Infrastructures and Mobile Applications - Proceedings of the 13th IMCL Conference, Thessaloniki, Greece, 31 October, 2019

Detecting Sophisticated Attacks in Maritime Environments using Hybrid Situational Awareness.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

EduApp: A Collaborative Application for Mobile Devices to Support the Educational Process in Greek Secondary Education.
Proceedings of the IEEE Global Engineering Education Conference, 2019

Spyduino: Arduino as a HID Exploiting the BadUSB Vulnerability.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

A Framework for Supply Chain Traceability Based on Blockchain Tokens.
Proceedings of the Business Process Management Workshops, 2019

2018
Factors, issues and interdependencies in the incorporation of a Web 2.0 based learning environment in higher education.
Educ. Inf. Technol., 2018

The charger positioning problem in clustered RF-power harvesting wireless sensor networks.
Ad Hoc Networks, 2018

A policy-aware Service Oriented Architecture for secure machine-to-machine communications.
Ad Hoc Networks, 2018

LOST: Localized blacklisting aware scheduling algorithm for IEEE 802.15.4-TSCH networks.
Proceedings of the 2018 Wireless Days, 2018

A case study of a laboratory experimental process in Vocational Education Training (VET).
Proceedings of the 2018 South-Eastern European Design Automation, 2018

Preliminary design of a new approach to choose cyber exercise methodologies for critical infrastructures.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

Study, design and development of a modern video system to improve services from the production to the end user.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

Collision-Free Broadcast Methods for IEEE 802.15.4-TSCH Networks Formation.
Proceedings of the 21st ACM International Conference on Modeling, 2018

Exploring Cyber-Security Issues in Vessel Traffic Services.
Proceedings of the Knowledge Science, Engineering and Management, 2018

R-TSCH: Proactive Jamming Attack Protection for IEEE 802.15.4-TSCH Networks.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Computing optimal drone positions to wirelessly recharge IoT devices.
Proceedings of the IEEE INFOCOM 2018, 2018

Improving LoRa Network Capacity Using Multiple Spreading Factor Configurations.
Proceedings of the 25th International Conference on Telecommunications, 2018

Circle's Ontology Extended: Circumference and Surface Area of a Circle.
Proceedings of the Challenges of the Digital Transformation in Education - Proceedings of the 21st International Conference on Interactive Collaborative Learning (ICL 2018), 2018

An Online Game for the Digital Electronics Course for Vocational Education and Training (VET) Students.
Proceedings of the Challenges of the Digital Transformation in Education - Proceedings of the 21st International Conference on Interactive Collaborative Learning (ICL 2018), 2018

Local or Global Radio Channel Blacklisting for IEEE 802.15.4-TSCH Networks?
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Let's learn with Kahoot!
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

2017
A Policy-Aware Model for Intelligent Transportation Systems.
CoRR, 2017

A DSS model for IoT-based intelligent transportation systems.
Proceedings of the 2017 IEEE International Symposium on Signal Processing and Information Technology, 2017

On the optimal number of chargers in battery-less wirelessly powered sensor networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

An iOS Knowledge App to Support the Course "Developing Applications in a Programming Environment" of the Greek Lyceum.
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017

WIP: Design, Development and Implementation of a "Web Technologies" Android Application for Higher Education.
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017

A Game-Based Learning Platform for Vocational Education and Training.
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017

Adaptation of a Conference Key Distribution System for the wireless ad hoc network.
Proceedings of the IEEE International Conference on Communications, 2017

Employing Twitter Hashtags and Linked Data to Suggest Trending Resources in a Digital Library.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2017

Work in progress: Extending the application of ontologies in the teaching of geometry: The right triangle in the circle.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

Teaching conceptual modelling: The OMiLAB best practice.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

Science, technology, engineering and mathematics (STEM) for vocational education in Greece.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

Contemporary collaborative trends and their effect in education.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

A design and evaluation framework for visual programming codes.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

Factors affecting peer assessment of student presentations.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

2016
Energy Efficient Sensor Network Configuration for Covering Points of Interest.
Proceedings of the SENSORNETS 2016, 2016

Design and Development of a Learning Management System for Vocational Education.
Proceedings of the SouthEast European Design Automation, 2016

An Identity and Access Management approach for SOA.
Proceedings of the 2016 IEEE International Symposium on Signal Processing and Information Technology, 2016

Transport services within the IoT ecosystem using localisation parameters.
Proceedings of the 2016 IEEE International Symposium on Signal Processing and Information Technology, 2016

Optimizing SLA-driven adaptive routing.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Towards mobile cloud security performance: A cross-border approach.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Towards an Ontology Approach in Teaching Geometry.
Proceedings of the Interactive Collaborative Learning - Proceedings of the 19th ICL Conference, 2016

Daedalus: An ICT Tool for Employment within the Mediterranean Basin Region.
Proceedings of the Social Media: The Good, the Bad, and the Ugly, 2016

Applying ontologies in an educational context.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

2015
Energy efficient automated control of irrigation in agriculture by using wireless sensor networks.
Comput. Electron. Agric., 2015

UACS: Towards unified access control services.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

Performance evaluation of cloud systems: A behavioural approach.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

A heuristic for routing, modulation and spectrum allocation in spectrum sliced elastic optical path network.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

A cooperative framework towards self-protection and self-organization in Mobile Ad Hoc Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards a Successful Exercise Implementation - A Case Study of Exercise Methodologies.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Evaluating Web 2.0 technologies in higher education using students' perceptions and performance.
J. Comput. Assist. Learn., 2014

SociaLib: a collaborative digital library model platform using Web 2.0.
Electron. Libr., 2014

Software in e-Learning Architecture, Processes and Management.
CoRR, 2014

Pirus: A Web-based File Hosting Service with Object Oriented Logic in Cloud Computing.
CoRR, 2014

A Semantic Web Approach in the Implementation of a Linked Data Portal Using a CMS.
Proceedings of the Tenth International Conference on Signal-Image Technology and Internet-Based Systems, 2014

A secure clustering scheme for geographically routed wireless ad hoc networks.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

Earth and groundwater visualisation using 3D modelling techniques in a cloud computing environment.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

Pirus: A file storage service in cloud computing for educational use.
Proceedings of the 2014 IEEE Global Engineering Education Conference, 2014

A Low-Overhead Localized Target Coverage Algorithm in Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - 6th International ICST Conference, 2014

2013
Policy-based QoS management for SLA-driven adaptive routing.
J. Commun. Networks, 2013

An effective and secure web banking system: development and evaluation.
Int. J. Bus. Inf. Syst., 2013

Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering.
Algorithms, 2013

Combining technologies with the ECFS file system.
Proceedings of the 2013 12th International Conference on Information Technology Based Higher Education and Training, 2013

Welcome message from the general co-chairs.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Sensor Swarm query filtering: Heightened attack resilience for broadcast on-demand services.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

SAnoVS: Secure anonymous voting scheme for clustered ad hoc networks.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

S-Port: Collaborative security management of Port Information systems.
Proceedings of the 4th International Conference on Information, 2013

Unisuite: An innovative integrated suite for delivering synchronous and asynchronous online education.
Proceedings of the IEEE Global Engineering Education Conference, 2013

Security Risk Assessment Challenges in Port Information Technology Systems.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

2012
Collaborative service evaluation with the TwoHop trust framework.
Secur. Commun. Networks, 2012

Using data envelopment analysis to evaluate the efficiency of web caching object replacement strategies.
J. Netw. Comput. Appl., 2012

Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack.
IEEE Commun. Lett., 2012

Chord-PKI: A distributed trust infrastructure based on P2P networks.
Comput. Networks, 2012

Global Communications Newsletter.
IEEE Commun. Mag., 2012

Using Strand Space Model to Verify the Privacy Properties of a Fair Anonymous Authentication Scheme.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

I.P.AD.: An Integrated Project Management and Instructional Systems Development Model for E-learning.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

NAVI: Novel authentication with visual information.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Fair Anonymous Authentication for Location Based Services.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

An integrated self-evaluated framework for embedding Web 2.0 technologies in the educational process.
Proceedings of the IEEE Global Engineering Education Conference, 2012

2011
Editorial on "QoS and service provisioning for integrated wireless networks".
Pervasive Mob. Comput., 2011

An Advanced Web Attack Detection and Prevention Tool.
Inf. Manag. Comput. Secur., 2011

Connected coverage in WSNs based on critical targets.
Comput. Networks, 2011

Towards Utilizing Tcpcrypt in Mobile Healthcare Applications.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

Spatio temporal emergency role based access control (STEM-RBAC): A time and location aware role based access control model with a break the glass mechanism.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Target location based sink positioning in wireless sensor networks.
Proceedings of the 18th International Conference on Telecommunications, 2011

User dependent cryptography for security in future mobile telecommunication systems.
Proceedings of the 18th International Conference on Telecommunications, 2011

2010
Security for Ad Hoc Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system.
Inf. Manag. Comput. Secur., 2010

Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks.
Int. J. Netw. Secur., 2010

Bridging theory and practice in e-government: A set of guidelines for architectural design.
Gov. Inf. Q., 2010

Solving coverage problems in wireless sensor networks using cover sets.
Ad Hoc Networks, 2010

A secure ubiquitous healthcare system based on IMS and the HL7 standards.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010

An Analysis of Bluetooth, Zigbee and Bluetooth Low Energy and Their Use in WBANs.
Proceedings of the Wireless Mobile Communication and Healthcare, 2010

Efficient target coverage in WSNs with bidirectional communication.
Proceedings of the 15th IEEE International Workshop on Computer Aided Modeling, 2010

2009
A future location-aware replacement policy for the cache management at the mobile terminal.
Wirel. Commun. Mob. Comput., 2009

DPS: An Architecture for VBR Scheduling in IEEE 802.11e HCCA Networks with Multiple Access Points.
Mob. Networks Appl., 2009

Energy efficiency in wireless sensor networks using sleep mode TDMA scheduling.
Ad Hoc Networks, 2009

LIDF: Layered intrusion detection framework for ad-hoc networks.
Ad Hoc Networks, 2009

Connected partial target coverage and network lifetime in wireless sensor networks.
Proceedings of the 2nd IFIP Wireless Days, 2009

A Novel Power-Efficient Middleware Scheme for Sensor Grid Applications.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

Exploring The Dynamics Of Change In European Municipal Settings: A Case Study Of Two Research And Development Projects.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

An Efficient Simulator for Reactive Web Caching.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

SWEB: An Advanced Mobile Residence Certificate Service.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

A mobile healthcare system using IMS and the HL7 framework.
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009

2008
Home Automation.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Provision of unified IN functionality in the context of IMS.
Telecommun. Syst., 2008

Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
CoRR, 2008

Intrusion Detection Using Cost-Sensitive Classification
CoRR, 2008

Group registration with distributed databases for location tracking in 3G wireless networks.
Comput. Networks, 2008

Topological Dependence and Fault Tolerance in TDMA Based Power Conservation for WSNs.
Proceedings of the WINSYS 2008, 2008

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms.
Proceedings of the Advances in Ad Hoc Networking, 2008

Technological integration: evidence of processes of structuring in governmental organizations.
Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, 2008

TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
An evaluation of the middleware's impact on the performance of object oriented distributed systems.
J. Syst. Softw., 2007

A context-aware cache structure for mobile computing environments.
J. Syst. Softw., 2007

Incident response requirements for distributed security information management systems.
Inf. Manag. Comput. Secur., 2007

Multifold node authentication in mobile <i>ad hoc</i> networks.
Int. J. Commun. Syst., 2007

Towards secure online elections: models, primitives and open issues.
Electron. Gov. an Int. J., 2007

Authentication in a layered security approach for mobile ad hoc networks.
Comput. Secur., 2007

A tree-based decision rule for identifying profile groups of cases without predefined classes: application in diffuse large B-cell lymphomas.
Comput. Biol. Medicine, 2007

SecMR - a secure multipath routing protocol for ad hoc networks.
Ad Hoc Networks, 2007

Detecting unauthorized and compromised nodes in mobile ad hoc networks.
Ad Hoc Networks, 2007

Location Management in 3G Networks using a 2-Level Distributed Database Architecture.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Extending a Distributed System Architecture with E-Government Modelling Concepts.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Privacy Threats of Data Retention in Internet Communications.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Ontology-based tools for the management of customers' portfolios in a deregulated electricity market environment.
Proceedings of the Metadata and Semantics, 2007

A cache management object oriented simulation for mobile environments.
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007

Web Proxy CachingObject Replacement: Frontier Analysis to Discover the Good-Enough Algorithms.
Proceedings of the 15th International Symposium on Modeling, 2007

Intrusion Detection with Neural Networks and Watermarking Techniques for MANET.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Enhancing the design of e-government: identifying structures and modelling concepts in contemporary platforms.
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007

Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network.
Proceedings of the Public Key Infrastructure, 2007

2006
QoS-aware TDMA for end-to-end traffic scheduling in ad hoc networks.
IEEE Wirel. Commun., 2006

Group Registration with Local Anchor for Location Tracking in Mobile Networks.
IEEE Trans. Mob. Comput., 2006

On Incident Handling and Response: A state-of-the-art approach.
Comput. Secur., 2006

Layered security design for mobile ad hoc networks.
Comput. Secur., 2006

Secure distributed intelligent networks.
Comput. Commun., 2006

A future location-prediction replacement strategy for mobile computing environments.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Intrusion Detection Using Emergent Self-organizing Maps.
Proceedings of the Advances in Artificial Intelligence, 4th Helenic Conference on AI, 2006

A context-aware prefetching strategy for mobile computing environments.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2005
Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, Third International Conference, 2005

Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Secure Multipath Routing for Mobile Ad Hoc Networks.
Proceedings of the 2nd International Conference on Wireless on Demand Network Systems and Service (WONS 2005), 2005

Preventing Impersonation Attacks in MANET with Multi-Factor Authentication.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

Multipath Routing Protocols for Mobile Ad Hoc Networks: Security Issues and Performance Evaluation.
Proceedings of the Autonomic Communication, Second International IFIP Workshop, 2005

Applying the ISO RM-ODP Standard in E-Government.
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005

LUGrid: A Semantic-Capable Grid for University Data.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Engineering and Technology Aspects of an e-Government Architecture Based on Web Services.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

2004
A distributed database architecture for global roaming in next-generation mobile networks.
IEEE/ACM Trans. Netw., 2004

An integrated strategy for reducing location management cost.
IEEE Commun. Lett., 2004

DDoS attacks and defense mechanisms: classification and state-of-the-art.
Comput. Networks, 2004

Intelligent Web Prefetching Based upon User Profiles - The WebNaut Case.
Proceedings of the Methods and Applications of Artificial Intelligence, 2004

2003
Group Registration for Reducing Signaling Traffic in Location Tracking.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

2002
Group deregistration strategy for PCS networks.
IEEE Commun. Lett., 2002

Computational intelligence in telecommunications networks.
Comput. Commun., 2002

Telecommunication Networks Security - Guest Editorial.
IEEE Commun. Mag., 2002

Using Hopfield Networks to Solve Assignment Problem and N-Queen Problem: An Application of Guided Trial and Error Technique.
Proceedings of the Methods and Applications of Artificial Intelligence, 2002

Performance evaluation of delay-constrained least-cost QoS routing algorithms based on linear and nonlinear Lagrange relaxation.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Computer networks design using hybrid fuzzy expert systems.
Soft Comput., 2001

Design and architecture of a digital music library on the web (Technical note).
New Rev. Hypermedia Multim., 2001

An efficient approximate algorithm for delay-cost-constrained QoS routing.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

Stability of discrete-time systems with time-varying delays.
Proceedings of the American Control Conference, 2001

2000
Guest editorial: intelligent techniques in high speed networks.
IEEE J. Sel. Areas Commun., 2000

Fuzzy reasoning approach for QoS routing in B-ISDN.
J. Intell. Fuzzy Syst., 2000

A location-based mobility tracking scheme for PCS networks.
Comput. Commun., 2000

An integrated strategy for location tracking in mobile networks.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Extending the Prediction Horizon in Dynamic Bandwidth Allocation for VBR Video Transport.
Proceedings of the MICAI 2000: Advances in Artificial Intelligence, 2000

Switching Theory Approach to Alarm Correlation in Network Management.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

High Throughput Database Structures for Location Management in PCS Networks.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

Using Hopfield Networks to Solve Traveling Salesman Problems Based on Stable State Analysis Technique.
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, 2000

Performance Evaluation of Location Information Distribution Strategies for Mobility Tracking.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000

1999
A Maritime Global Route Planning Model for Hazardous Materials Transportation.
Transp. Sci., 1999

Fuzzy generalized network approach for solving an optimization model for routing in B-ISDN.
Telecommun. Syst., 1999

Fuzzy Temporal Reasoning Model for Event Correlation in Network Management.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

Two location tracking strategies for PCS systems.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Fuzzy metric approach for routing in B-ISDN.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

1998
The dynamic three-tier protocol: an access remedial scheme for DQDB Metropolitan Area Networks.
Comput. Commun., 1998

Fuzzy multiobjective routing model in B-ISDN.
Comput. Commun., 1998

1997
Rate Regulation with Feedback Controller in ATM Networks - A Neural Network Approach.
IEEE J. Sel. Areas Commun., 1997

Application of Neural Networks and Machine Learning in Network Design.
IEEE J. Sel. Areas Commun., 1997

Neuro-fuzzy control in ATM networks.
IEEE Commun. Mag., 1997

Fuzzy Optimization Model for Routing in B-ISDN.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997

An integrated AI approach for automating networks design, modeling and simulation.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Routing in multimetric networks using a fuzzy link cost.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

1996
Demand and service matching at heavy loads: a dynamic bandwidth control mechanism for DQDB MANs.
IEEE Trans. Commun., 1996

Guest editorial: Communications for the intelligent transportation system.
IEEE Commun. Mag., 1996

Communications in the Medical Environment [Guest Editorial].
IEEE Commun. Mag., 1996

NAMS: Network Automated Modeler and Simulator.
Proceedings of the Proceedings 29st Annual Simulation Symposium (SS '96), 1996

1995
END: an expert network designer.
IEEE Netw., 1995

Fairness Issues in the Networking Environment.
Comput. Commun., 1995

Fairness by Demand and Service Pattern Match: The Alpha Tuning Mechanism for DQDB MANs.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995

1994
A telecommunications quality study using the analytic hierarchy process.
IEEE J. Sel. Areas Commun., 1994

Implementation of a decentralized Pareto optimal algorithm.
Comput. Commun., 1994

The Dynamic 3-Tier Protocol: An Access Remedial Scheme to Control Unfairness in DQDB MANs.
Proceedings of the Proceedings 19th Conference on Local Computer Networks, 1994

1993
Intelligent home systems.
IEEE Commun. Mag., 1993

1992
Convergence of synchronous and asynchronous greedy algorithms in a multiclass telecommunications environment.
IEEE Trans. Commun., 1992

Multiobjective Flow Control in Telecommunication Networks.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

1991
Fairness in network optimal flow control: optimality of product forms.
IEEE Trans. Commun., 1991

Convergence of Synchronous and Asynchronous Algorithms in Multiclass Networks.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991


  Loading...