Georgios Mantas

According to our database1, Georgios Mantas authored at least 56 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks.
Sensors, 2021

On the Performance Analysis of IDLP and SpaceMac for Network Coding-Enabled Mobile Small Cells.
IEEE Commun. Lett., 2021

Secure Virtual Mobile Small Cells: A Stepping Stone Toward 6G.
IEEE Commun. Stand. Mag., 2021

Secure Virtual Mobile Small Cells: A Stepping Stone Towards 6G.
CoRR, 2021

DISTANT: DIStributed Trusted Authority-based key managemeNT for beyond 5G wireless mobile small cells.
Comput. Commun., 2021

2020
A Signature Scheme with Unlinkable-yet-Accountable Pseudonymity for Privacy-Preserving Crowdsensing.
IEEE Trans. Mob. Comput., 2020

Editorial: Security and Privacy Protection for Mobile Applications and Platforms.
Mob. Networks Appl., 2020

An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices.
Mob. Networks Appl., 2020

HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android.
IEEE Access, 2020

IDLP: An Efficient Intrusion Detection and Location-Aware Prevention Mechanism for Network Coding-Enabled Mobile Small Cells.
IEEE Access, 2020

Public Key Cryptography Without Certificates for Beyond 5G Mobile Small Cells.
Proceedings of the 12th International Symposium on Communication Systems, 2020

User Authentication and Authorization for Next Generation Mobile Passenger ID Devices for Land and Sea Border Control.
Proceedings of the 12th International Symposium on Communication Systems, 2020

Classification of Psychosomatic's Symptoms of Depression: Iliou Versus PCA Preprocessing Methods.
Proceedings of the 25th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2020

2019
A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells.
IEEE Trans. Comput. Soc. Syst., 2019

A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment.
IEEE Internet Things J., 2019

Key Management for Beyond 5G Mobile Small Cells: A Survey.
IEEE Access, 2019

An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain.
IEEE Access, 2019

Distributed Trusted Authority-based Key Management for Beyond 5G Network Coding-enabled Mobile Small Cells.
Proceedings of the 2nd IEEE 5G World Forum, 5GWF 2019, Dresden, Germany, September 30, 2019

A Location-aware IDPS scheme for Network Coding-enabled Mobile Small Cells.
Proceedings of the 2nd IEEE 5G World Forum, 5GWF 2019, Dresden, Germany, September 30, 2019

2018
Physical-layer entity authentication scheme for mobile MIMO systems.
IET Commun., 2018

A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications.
Comput. Secur., 2018

Machine Learning to Automate Network Segregation for Enhanced Security in Industry 4.0.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Towards an Autonomous Host-Based Intrusion Detection System for Android Mobile Devices.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Key Management for Secure Network Coding-Enabled Mobile Small Cells.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Security Threats in Network Coding-Enabled Mobile Small Cells.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Profile Management System in Ubiquitous Healthcare Cloud Computing Environment.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Security Framework for the Semiconductor Supply Chain Environment.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Software-Defined Networking for Ubiquitous Healthcare Service Delivery.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

2017
An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks.
Int. J. Inf. Sec., 2017

Towards a secure network architecture for smart grids in 5G era.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Towards trustworthy end-to-end communication in industry 4.0.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Towards a Hybrid Intrusion Detection System for Android-based PPDR terminals.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2017

2016
An Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC.
IEEE Commun. Lett., 2016

An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems.
EURASIP J. Wirel. Commun. Netw., 2016

An autonomous privacy-preserving authentication scheme for intelligent transportation systems.
Comput. Secur., 2016

An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Lightweight Privacy-Preserving OAuth2-Based Protocol for Smart City Mobile Apps.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Application-layer denial of service attacks: taxonomy and survey.
Int. J. Inf. Comput. Secur., 2015

Dual-Homomorphic Message Authentication Code Scheme for Network Coding-Enabled Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

A null space-based MAC scheme against pollution attacks to Random linear Network Coding.
Proceedings of the IEEE International Conference on Communication, 2015

Analysis of a Homomorphic MAC-based scheme against tag pollution in RLNC-enabled wireless networks.
Proceedings of the 20th IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2015

2014
Analysis of the Impact of Denial of Service Attacks on Centralized Control in Smart Cities.
Proceedings of the Wireless Internet - 8th International Conference, 2014

Towards an Advanced PKI-Based Security Solution for Next Generation e-Passport and Associated Applications: The NewP@ss Approach.
Proceedings of the Wireless Internet - 8th International Conference, 2014

Jointly padding for subspace orthogonality against tag pollution.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

An improved homomorphic message authentication code scheme for RLNC-enabled wireless networks.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

Towards personalization of Trust Management service for ubiquitous healthcare environment.
Proceedings of IEEE-EMBS International Conference on Biomedical and Health Informatics, 2014

2013
Towards Personalized Services in the Healthcare Domain.
Proceedings of the Handbook of Medical and Healthcare Technologies, 2013

A New Framework Architecture for Next Generation e-Health Services.
IEEE J. Biomed. Health Informatics, 2013

A profile-based Trust Management scheme for Ubiquitous Healthcare environment.
Proceedings of the 13th IEEE International Conference on BioInformatics and BioEngineering, 2013

2012
Health products sales forecasting using computational intelligence and adaptive neuro fuzzy inference systems.
Oper. Res., 2012

PKI Security in Large-Scale Healthcare Networks.
J. Medical Syst., 2012

Group Profile Creation in Ubiquitous Healthcare Environment Applying the Analytic Hierarchy Process.
Proceedings of the Wireless Mobile Communication and Healthcare, 2012

Group profile management in ubiquitous healthcare environment.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

2011
Ubiquitous Healthcare Profile Management Applying Smart Card Technology.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

2010
ARATOS: An intelligent machine-to-machine framework for services based on satellite Earth Observation data.
Proceedings of the IEEE International Conference on Wireless Communications, 2010


  Loading...