Nicholas Kolokotronis

Orcid: 0000-0003-0660-8431

According to our database1, Nicholas Kolokotronis authored at least 92 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems.
Internet Things, December, 2023

Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence.
IEEE Trans. Intell. Transp. Syst., April, 2023

Cognitive Email Analysis with Automated Decision Support for Business Email Compromise Prevention.
Proceedings of the 8th South-East Europe Design Automation, 2023

Minimizing Software-Rooted Risk through Library Implementation Selection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023


2022
IDERES: Intrusion detection and response system using machine learning and attack graphs.
J. Syst. Archit., 2022

An Intelligent Platform for Threat Assessment and Cyber-Attack Mitigation in IoMT Ecosystems.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

Blockchain-Enabled Digital Forensics for the IoT: Challenges, Features, and Current Frameworks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy Systems.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
913 Malicious Network Traffic PCAPs and Binary Visualisation Images Dataset.
Dataset, March, 2021

Insider Detection using Deep Autoencoder and Variational Autoencoder Neural Networks.
CoRR, 2021

On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance.
Comput. Networks, 2021

Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Cyber-Security Training Evaluation Metrics.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Understanding and Mitigating Banking Trojans: From Zeus to Emotet.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

User-Generated Pseudonyms Through Merkle Trees.
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021

2020
Digital forensics cloud log unification: Implementing CADF in Apache CloudStack.
J. Inf. Secur. Appl., 2020

Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints.
IEEE Access, 2020

A Trust Management System for the IoT domain.
Proceedings of the 2020 IEEE World Congress on Services, 2020

Privacy Issues in Voice Assistant Ecosystems.
Proceedings of the 2020 IEEE World Congress on Services, 2020

On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues.
Proceedings of the 2020 IEEE World Congress on Services, 2020

2nd IEEE Services Workshop on Cyber Security and Resilience in the Internet of Things (CSRIoT 2020).
Proceedings of the 2020 IEEE World Congress on Services, 2020

On the Security of Permissioned Blockchain Solutions for IoT Applications.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

IoT Malware Network Traffic Classification using Visual Representation and Deep Learning.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Threat landscape for smart grid systems.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Advanced metering infrastructures: security risks and mitigation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
The Error Linear Complexity Spectrum as a Cryptographic Criterion of Boolean Functions.
IEEE Trans. Inf. Theory, 2019

Blockchain Technologies for Enhanced Security and Privacy in the Internet of Things.
CoRR, 2019

Are cracked applications really free? An empirical analysis on Android devices.
CoRR, 2019

A Novel Blockchain-based Trust Model for Cloud Identity Management.
CoRR, 2019

Secured by Blockchain: Safeguarding Internet of Things Devices.
IEEE Consumer Electron. Mag., 2019

Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

IoT Vulnerability Data Crawling and Analysis.
Proceedings of the 2019 IEEE World Congress on Services, 2019

On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection.
Proceedings of the 2019 IEEE World Congress on Services, 2019

A Novel Online Incremental Learning Intrusion Prevention System.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

Data Protection by Design for cybersecurity systems in a Smart Home environment.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

Blockchain Solutions for Forensic Evidence Preservation in IoT Environments.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

A Novel Malware Detection System Based on Machine Learning and Binary Visualization.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

The Quest for the Appropriate Cyber-threat Intelligence Sharing Platform.
Proceedings of the 8th International Conference on Data Science, 2019

2018
Secure Information Sharing in Adversarial Adaptive Diffusion Networks.
IEEE Trans. Signal Inf. Process. over Networks, 2018

Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction.
Des. Codes Cryptogr., 2018

WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Trust-based strategies for wireless networks under partial monitoring.
Proceedings of the 25th European Signal Processing Conference, 2017

2016
Secretly Pruned Convolutional Codes: Security Analysis and Performance Results.
IEEE Trans. Inf. Forensics Secur., 2016

Using trust to mitigate malicious and selfish behavior of autonomous agents in CRNs.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

Improving physical layer security in DF relay networks via two-stage cooperative jamming.
Proceedings of the 24th European Signal Processing Conference, 2016

2015
Secure encoder designs based on turbo codes.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A cooperative jamming protocol for physical layer security in wireless networks.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Managing trust in diffusion adaptive networks with malicious agents.
Proceedings of the 23rd European Signal Processing Conference, 2015

Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes.
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
Short paper: attacking and defending lightweight PHY security schemes for wireless communications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Cooperation for secure wireless communications with resource-bounded eavesdroppers.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

2013
Secondary constructions of Boolean functions with maximum algebraic immunity.
Cryptogr. Commun., 2013

Physical layer security via secret trellis pruning.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

2012
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity.
IACR Cryptol. ePrint Arch., 2012

A greedy algorithm for checking normality of cryptographic boolean functions.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

On the second-order nonlinearity of cubic Maiorana-McFarland Boolean functions.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
Maiorana-McFarland Functions with High Second-Order Nonlinearity.
IACR Cryptol. ePrint Arch., 2011

Constructing Boolean functions in odd number of variables with maximum algebraic immunity.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Fast decoding of regular LDPC codes using greedy approximation algorithms.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2009
Best affine and quadratic approximations of particular classes of Boolean functions.
IEEE Trans. Inf. Theory, 2009

Properties of the error linear complexity spectrum.
IEEE Trans. Inf. Theory, 2009

Factorization of determinants over finite fields and application in stream ciphers.
Cryptogr. Commun., 2009

2008
On the Linear Complexity of Sequences Obtained by State Space Generators.
IEEE Trans. Inf. Theory, 2008

Cryptographic properties of nonlinear pseudorandom number generators.
Des. Codes Cryptogr., 2008

On symplectic matrices of cubic Boolean forms and connections with second order nonlinearity.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

On the error linear complexity profiles of binary sequences of period 2<sup>n</sup>.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
On the Nonlinear Complexity and Lempel-Ziv Complexity of Finite Length Sequences.
IEEE Trans. Inf. Theory, 2007

Best Quadratic Approximations of Cubic Boolean Functions.
IACR Cryptol. ePrint Arch., 2007

Best Affine Approximations of Boolean Functions and Applications to Low Order Approximations.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions.
Proceedings of the Cryptography and Coding, 2007

Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression.
Proceedings of the Sequences and Their Applications, 2006

Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants.
Proceedings of the Sequences and Their Applications, 2006

New Results on the Linear Complexity of Binary Sequences.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Cryptographic Properties of Stream Ciphers Based on T-functions.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
On the quadratic span of binary sequences.
IEEE Trans. Inf. Theory, 2005

2004
On the generation of sequences simulating higher order white noise for system identification.
Signal Process., 2004

2003
Μη γραμμική επεξεργασία σήματος και εφαρμογές στην κρυπτογραφία
PhD thesis, 2003

On the linear complexity of nonlinearly filtered PN-sequences.
IEEE Trans. Inf. Theory, 2003

2002
Minimum linear span approximation of binary sequences.
IEEE Trans. Inf. Theory, 2002

Securing Web-based Information Systems: A Model and Implementation Guidelines.
Informatica (Slovenia), 2002

2001
First-Order Optimal Approximation of Binary Sequences.
Proceedings of the Sequences and their Applications, 2001

A Model and Implementation Guidelines for Information Security Strategies in Web Environments.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

1999
Wavelet-based medical image compression.
Future Gener. Comput. Syst., 1999


  Loading...