Ioanna Kantzavelou

Orcid: 0000-0001-5976-7837

According to our database1, Ioanna Kantzavelou authored at least 26 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A novel autonomous container-based platform for cybersecurity training and research.
PeerJ Comput. Sci., 2023

A Novel Authentication Method That Combines Honeytokens and Google Authenticator.
Inf., 2023

A Blockchain-based Electronic Voting System: EtherVote.
CoRR, 2023

A Blockchain-based two Factor Honeytoken Authentication System.
CoRR, 2023

2022
A multiplayer game model to detect insiders in wireless sensor networks.
PeerJ Comput. Sci., 2022

Blockchain Technology to Secure Bluetooth.
CoRR, 2022

Security Revisited: Honeytokens meet Google Authenticator.
Proceedings of the 7th South-East Europe Design Automation, 2022

Cybersecurity at Merchant Shipping.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Cybersecurity Revisited: Honeytokens meet Google Authenticator.
CoRR, 2021

Challenges and Solutions of Surveillance Systems in IoT-Enabled Smart Campus: A Survey.
IEEE Access, 2021

Blockchain Technology: A case study in supply chain management.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Uncuffed: A Blockchain-based Secure Messaging System.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

A novel Two-Factor HoneyToken Authentication Mechanism.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
A novel Two-Factor HoneyToken Authentication Mechanism.
CoRR, 2020

Smart Homes: Security Challenges and Privacy Concerns.
CoRR, 2020

The Insider Threat: Reasons, Effects and Mitigation Techniques.
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020

2018
An evaluation of the HTTPS adoption in websites in Greece: estimating the users awareness.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

2015
Assessment and security issues in cloud computing services.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

2013
Detecting intrusive activities from insiders in a wireless sensor network using game theory.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Uncertainty in Intrusion Detection Signaling Games.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2010
A game-based intrusion detection mechanism to confront internal attackers.
Comput. Secur., 2010

2008
A Generic Intrusion Detection Game Model in IT Security.
Proceedings of the Trust, 2008

1997
An attack detection system for secure computer systems - outline of the solution.
Proceedings of the Information Security in Research and Business, 1997

1996
Network Security Guidelines for Health Care Management.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996

Issues of Security and Network Security in Health Care Information Systems.
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996

An attack detection system for secure computer systems - design of the ADS.
Proceedings of the Information Systems Security, 1996


  Loading...