Dimitrios Serpanos

According to our database1, Dimitrios Serpanos authored at least 109 papers between 1990 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
The Role of Modularity in Multimodal Simultaneous Localization and Mapping Systems.
Computer, 2021

2020
Neural networks and statistical decision making for fault diagnosis of PM linear synchronous machines.
Int. J. Syst. Sci., 2020

Runtime Protection of Real-time Critical Control Applications against Known Threats.
IEEE Des. Test, 2020

Embedded Artificial Intelligence: The ARTEMIS Vision.
Computer, 2020

Rigorous Machine Learning for Secure and Autonomous Cyber Physical Systems.
Proceedings of the 25th IEEE International Conference on Emerging Technologies and Factory Automation, 2020

Neural Network-Based Side Channel Attacks and Countermeasures.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

2019
Guest Editors' Introduction: Circuits and Systems for VLSI IoT Devices.
IEEE Des. Test, 2019

Challenges and Opportunities in VLSI IoT Devices and Systems.
IEEE Des. Test, 2019

There Is No Safety Without Security and Dependability.
Computer, 2019

Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?
Computer, 2019

Condition monitoring for three-phase inverters with the Derivative-free nonlinear Kalman Filter.
Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, 2019

Fault Diagnosis in Energy Conversion Systems using Neural Networks and Statistical Decision Making.
Proceedings of the IECON 2019, 2019

Condition Monitoring of Wind-Power Units Using the H-Infinity Kalman Filter.
Proceedings of the IEEE International Conference on Mechatronics, 2019

Secure Memory for Embedded Tamper-proof Systems.
Proceedings of the 14th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2019

Secure and Safe IIoT Systems via Machine and Deep Learning Approaches.
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019

Design and Run-Time Aspects of Secure Cyber-Physical Systems.
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019

2018
Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems.
Proc. IEEE, 2018

Scanning The Issue.
Proc. IEEE, 2018

ARMET: Behavior-Based Secure and Resilient Industrial Control Systems.
Proc. IEEE, 2018

Designing Safe and Secure Industrial Control Systems: A Tutorial Review.
IEEE Des. Test, 2018

Secure and Resilient Industrial Control Systems.
IEEE Des. Test, 2018

The Cyber-Physical Systems Revolution.
Computer, 2018

Highly Assured Safety and Security of e-Health Applications.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Condition monitoring of wind-power units using the Derivative-free nonlinear Kalman Filter.
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018

MTF -Storm: a High Performance Fuzzer for Modbus/TCP.
Proceedings of the 23rd IEEE International Conference on Emerging Technologies and Factory Automation, 2018

2017
Safety and Security of Cyber-Physical and Internet of Things Systems [Point of View].
Proc. IEEE, 2017

PriviPK: Certificate-less and secure email communication.
Comput. Secur., 2017

Kalman filtering and statistical decision making for detection of attacks against power grid sensors.
Proceedings of the 26th IEEE International Symposium on Industrial Electronics, 2017

Distributed filtering and local statistical approach to fault diagnosis for securing the power gric.
Proceedings of the 26th IEEE International Symposium on Industrial Electronics, 2017

2016
Behaviour-Based Security for Cyber-Physical Systems.
ERCIM News, 2016

Sound and Complete Runtime Security Monitor for Application Software.
CoRR, 2016

A rigorous and efficient run-time security monitor for real-time critical embedded system applications.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

2015
Guest Editorial: Special Section on Embedded System Security.
IEEE Embed. Syst. Lett., 2015

Sleep monitoring classification strategy for an unobtrusive EEG system.
Proceedings of the 4th Mediterranean Conference on Embedded Computing, 2015

A Low-Latency, Low-Area Hardware Oblivious RAM Controller.
Proceedings of the 23rd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2015

Abstract Data Machine: Data Classifier for Reliable Embedded Systems Software.
Proceedings of the 10th Workshop on Embedded Systems Security, 2015

Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

2014
Introduction to Special Issue on Risk and Trust in Embedded Critical Systems.
ACM Trans. Embed. Comput. Syst., 2014

On the Formal Semantics of the Cognitive Middleware AWDRAT.
CoRR, 2014

On the Behavioural Formalization of the Cognitive Middleware AWDRAT.
CoRR, 2014

Detection, traceback and filtering of denial of service attacks in networked embedded systems.
Proceedings of the 9th Workshop on Embedded Systems Security, 2014

2013
Security challenges in embedded systems.
ACM Trans. Embed. Comput. Syst., 2013

CoppEnd - A Security System for Power Equipment.
ERCIM News, 2013

Increasing security in wireless e-health systems.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Content management and protection in Smart Cities IP - Based backbone Wireless Sensors Networks.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Welcome message from the general co-chairs.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Performance and power trade-offs for cryptographic applications in embedded processors.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

2012
Power Analysis Attack Resistance Engineering by Dynamic Voltage and Frequency Scaling.
ACM Trans. Embed. Comput. Syst., 2012

2011
An Empirical Study on the Web Password Strength in Greece.
Proceedings of the 15th Panhellenic Conference on Informatics, 2011

Performance of the Controlled Randomness Protocol on .NET Compact Framework Embedded Systems.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Identifying Chronic Disease Complications Utilizing State of the Art Data Fusion Methodologies and Signal Processing Algorithms.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

2010
Towards Stock Market Data Mining Using Enriched Random Forests from Textual Resources and Technical Indicators.
Proceedings of the Artificial Intelligence Applications and Innovations, 2010

An agent based middleware imposing intelligence over critical infrastructures utilizing Wireless Sensor Networks.
Proceedings of 15th IEEE International Conference on Emerging Technologies and Factory Automation, 2010

2009
Network Stack Optimization for Improved IPsec Performance on Linux.
Proceedings of the SECRYPT 2009, 2009

Adaptive DRM framework in user-converged multimedia ecosystems, utilizing MPEG-21 semantics.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

Optimizations for High-Performance IPsec Execution.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Design Issues in Secure Embedded Systems.
Proceedings of the Embedded Systems Design and Verification, 2009

2008
The security of the Fiat-Shamir scheme in the presence of transient hardware faults.
ACM Trans. Embed. Comput. Syst., 2008

Security and Privacy in Distributed Smart Cameras.
Proc. IEEE, 2008

Non deterministic caches: a simple and effective defense against side channel attacks.
Des. Autom. Embed. Syst., 2008

Dependability and Security Will Change Embedded Computing.
Computer, 2008

Web Services based Collaborative B2B e-commerce in the Oil Industry.
Proceedings of the ISCA 21st International Conference on Parallel and Distributed Computing and Communication Systems, 2008

2007
Network Systems Architecture [Guest Editorial].
IEEE Netw., 2007

Chloe@University: an indoor, mobile mixed reality guidance system.
Proceedings of the ACM Symposium on Virtual Reality Software and Technology, 2007

VLSI models of network-on-chip interconnect.
Proceedings of the IFIP VLSI-SoC 2007, 2007

Using value locality to reduce memory encryption overhead in embedded processors.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2007

2006
Real-time service provisioning for mobile and wireless networks.
Comput. Commun., 2006

Preventing Denial-of-Service Attacks in Shared CMP Caches.
Proceedings of the Embedded Computer Systems: Architectures, 2006

2005
Design Issues in Secure Embedded Systems.
Proceedings of the Embedded Systems Handbook., 2005

CryptoPalm: A Cryptographic Library for PalmOS.
Proceedings of the Advances in Informatics, 2005

Efficient switch schedulers with random decisions.
Proceedings of the 2005 International Symposium on Autonomous Decentralized Systems, 2005

Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach.
Proceedings of the 2005 Design, 2005

2004
Evaluation of hardware and software schedulers for embedded switches.
ACM Trans. Embed. Comput. Syst., 2004

Guest editorial: Special issue on embedded systems and security.
ACM Trans. Embed. Comput. Syst., 2004

Speeding Up High-Speed Protocol Processors.
Computer, 2004

Scheduling objects in broadcast systems with energy-limited clients.
Comput. Commun., 2004

A Fault-Injection Attack on Fiat-Shamir Cryptosystems.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

2003
Algorithms for Scalable Content Distribution.
Proceedings of the Quality of Future Internet Services, COST Action 263 Final Report, 2003

Evaluation of Switch Schedulers for Embedded Systems.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Pulse: A Class of Super-Worms against Network Infrastructure.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

2002
Network and service security.
IEEE Netw., 2002

Active hardware attacks and proactive countermeasures.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Object scheduling in broadcast systems for energy-limited clients.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Exploitation of different types of locality for Web caches.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Spy: A Method to Secure Clients for Network Services.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

2001
Efficient Memory Management for High-Speed ATM Systems.
Des. Autom. Embed. Syst., 2001

Defense Against Man-in-the-Middle Attack in Client-Server Systems.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

2000
Centralized versus distributed multimedia servers.
IEEE Trans. Circuits Syst. Video Technol., 2000

The Effect of Interword Connectivity in Associative Processing.
Scalable Comput. Pract. Exp., 2000

Scalable Memory Management for ATM Systems.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

FIRM: A Class of Distributed Scheduling Algorithms for High-Speed ATM Switches with Multiple Input Queues.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

Effective Caching of Web Objects using Zipf's Law.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
ATLAS I: implementing a single-chip ATM switch with backpressure.
IEEE Micro, 1999

1998
Preface.
Telecommun. Syst., 1998

MMPacking: a load and storage balancing algorithm for distributed multimedia servers.
IEEE Trans. Circuits Syst. Video Technol., 1998

Data link control emulation: rapid prototyping for high-speed networks.
IEEE Netw., 1998

ATLAS I: a single-chip, gigabit ATM switch with HIC/HS links arid multi-lane back-pressure.
Microprocess. Microsystems, 1998

Average Case Analysis of Searching in Associative Processing.
J. Parallel Distributed Comput., 1998

Evolution and challenges in multimedia.
IBM J. Res. Dev., 1998

Preface.
IBM J. Res. Dev., 1998

Credit scheduling: adaptive scheduling with dynamic service quota.
Comput. Commun., 1998

Credit-Flow-Controlled ATM for MP Interconnection: The ATLAS I Single-Chip ATM Switch.
Proceedings of the Fourth International Symposium on High-Performance Computer Architecture, Las Vegas, Nevada, USA, January 31, 1998

1997
ATLAS: A Single-Chip ATM Switch for NOWs.
Proceedings of the Communication and Architectural Support for Network-Based Parallel Computing, 1997

1996
Cable access beyond the hype: on residential broadband data services over HFC networks.
IEEE Commun. Mag., 1996

1994
A high performance transparent bridge.
IEEE/ACM Trans. Netw., 1994

Two-dimensional round-robin schedulers for packet switches with multiple input queues.
IEEE/ACM Trans. Netw., 1994

1993
Protocol Processing in Communication Subsystems for High Speed Networks.
Proceedings of the High Speed Networks and Their Performance, 1993

1992
An Adaptive Scheduling Scheme for Dynamic Service Time Allocation on a Shared Resource.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

1990
Uniform-Cost Communication in Scalable Multiprocessors.
Proceedings of the 1990 International Conference on Parallel Processing, 1990


  Loading...