Emmanouil A. Panaousis

According to our database1, Emmanouil A. Panaousis authored at least 40 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Risk Assessment Uncertainties in Cybersecurity Investments.
Games, 2018

Unsupervised Learning for Trustworthy IoT.
CoRR, 2018

An Options Approach to Cybersecurity Investment.
IEEE Access, 2018

An Enhanced Cyber Attack Attribution Framework.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Towards the Definition of a Security Incident Response Modelling Language.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Unsupervised Learning for Trustworthy IoT.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

2017
COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks.
Sensors, 2017

Uncertainty in Cyber Security Investments.
CoRR, 2017

Game theoretic path selection to support security in device-to-device communications.
CoRR, 2017

A conceptual model to support security analysis in the internet of things.
Comput. Sci. Inf. Syst., 2017

Game theoretic path selection to support security in device-to-device communications.
Ad Hoc Networks, 2017

Selecting Security Mechanisms in Secure Tropos.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

ASTo: A tool for security analysis of IoT systems.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Security requirements modelling for virtualized 5G small cell networks.
Proceedings of the 24th International Conference on Telecommunications, 2017

2016
Decision support approaches for cyber security investment.
Decision Support Systems, 2016

Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking.
CoRR, 2016

Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments.
Proceedings of the Information Security Theory and Practice, 2016

Evaluating Case-Based Reasoning Knowledge Discovery in Fraud Detection.
Proceedings of the Workshops Proceedings for the Twenty-fourth International Conference on Case-Based Reasoning (ICCBR 2016), Atlanta, Georgia, USA, October 31, 2016

Apparatus: Reasoning About Security Requirements in the Internet of Things.
Proceedings of the Advanced Information Systems Engineering Workshops, 2016

2015
Comparing Decision Support Approaches for Cyber Security Investment.
CoRR, 2015

Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A game-theoretic approach for minimizing security risks in the Internet-of-Things.
Proceedings of the IEEE International Conference on Communication, 2015

2014
Game Theory Meets Information Security Management.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Cybersecurity Games and Investments: A Decision Support Approach.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Secure Message Delivery Games for Device-to-Device Communications.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2013
Standardisation advancements in the area of routing for mobile ad-hoc networks.
The Journal of Supercomputing, 2013

Secure Communications for Mobile Verification Platforms.
Proceedings of the ISWCS 2013, 2013

A Probabilistic Algorithm for Secret Matrix Share Size Reduction.
Proceedings of the European Wireless 2013, 2013

2012
Security for mobile ad-hoc networks.
PhD thesis, 2012

Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions.
JNW, 2012

Security model for emergency real-time communications in autonomous networks.
Information Systems Frontiers, 2012

Recipients' Anonymity in Multihop Ad-Hoc Networks.
IEICE Transactions, 2012

Secure decentralised ubiquitous networking for emergency communications.
Proceedings of the 2012 International Conference on Telecommunications and Multimedia, 2012

2010
A Testbed Implementation for Securing OLSR in Mobile Ad hoc Networks
CoRR, 2010

Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks
CoRR, 2010

An Efficient Power Control Algorithm for Supporting Cognitive Communications in Shared Spectrum Areas.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

2009
Securing AODV against wormhole attacks in emergency MANET multimedia communications.
Proceedings of the 5th International Conference on Mobile Multimedia Communications, 2009

A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009


  Loading...