Nikos Komninos

Orcid: 0000-0003-2776-1283

According to our database1, Nikos Komninos authored at least 45 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FeSAD ransomware detection framework with machine learning using adaption to concept drift.
Comput. Secur., February, 2024

2023
Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment.
J. Cloud Comput., December, 2023

A Systematic Review of Data-Driven Attack Detection Trends in IoT.
Sensors, August, 2023

Open Banking API Security: Anomalous Access Behaviour.
Proceedings of the International Conference on Innovations in Intelligent Systems and Applications, 2023

Identification of Important Features at Different IoT layers for Dynamic Attack Detection.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
FeSA: Feature selection architecture for ransomware detection under concept drift.
Comput. Secur., 2022

Efficient optimisation framework for convolutional neural networks with secure multiparty computation.
Comput. Secur., 2022

Evaluation of Fake News Detection with Knowledge-Enhanced Language Models.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

2021
Trustee: A Trust Management System for Fog-Enabled Cyber Physical Systems.
IEEE Trans. Emerg. Top. Comput., 2021

A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems.
IEEE Internet Things J., 2021

Preserving Privacy of Data with Efficient Attribute-based Encryption Schemes.
Proceedings of the Adjunct Publication of the 29th ACM Conference on User Modeling, 2021

2020
A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems.
Wirel. Commun. Mob. Comput., 2020

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users.
IEEE Trans. Dependable Secur. Comput., 2020

2019
ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network.
Wirel. Commun. Mob. Comput., 2019

Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks.
Secur. Commun. Networks, 2019

2018
Modelling Botnet Propagation in Networks with Layered Defences.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Evaluating the Provision of Botnet Defences using Translational Research Concepts.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
On The Security Evaluation of Partial Password Implementations.
CoRR, 2017

Adaptation of a Conference Key Distribution System for the wireless ad hoc network.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Survey of approaches and features for the identification of HTTP-based botnet traffic.
J. Netw. Comput. Appl., 2016

Privacy concerns in sharing personal consumption data through online applications.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

2015
Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

2014
Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures.
IEEE Commun. Surv. Tutorials, 2014

The lord of the sense: A privacy preserving reputation system for participatory sensing applications.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
A New Framework Architecture for Next Generation e-Health Services.
IEEE J. Biomed. Health Informatics, 2013

SAnoVS: Secure anonymous voting scheme for clustered ad hoc networks.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

2012
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
Wirel. Pers. Commun., 2012

PKI Security in Large-Scale Healthcare Networks.
J. Medical Syst., 2012

Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack.
IEEE Commun. Lett., 2012

Secure & trusted communication in emergency situations.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

NAVI: Novel authentication with visual information.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

2011
Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks.
Int. J. Digit. Crime Forensics, 2011

Ubiquitous Healthcare Profile Management Applying Smart Card Technology.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

Privacy-preserving scheme for mobile ad hoc networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

User dependent cryptography for security in future mobile telecommunication systems.
Proceedings of the 18th International Conference on Telecommunications, 2011

2010
Security for Ad Hoc Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks.
Int. J. Netw. Secur., 2010

2009
LIDF: Layered intrusion detection framework for ad-hoc networks.
Ad Hoc Networks, 2009

2008
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
CoRR, 2008

2007
Multifold node authentication in mobile <i>ad hoc</i> networks.
Int. J. Commun. Syst., 2007

Authentication in a layered security approach for mobile ad hoc networks.
Comput. Secur., 2007

Detecting unauthorized and compromised nodes in mobile ad hoc networks.
Ad Hoc Networks, 2007

Intrusion Detection with Neural Networks and Watermarking Techniques for MANET.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Protecting Biometric Templates with Image Watermarking Techniques.
Proceedings of the Advances in Biometrics, International Conference, 2007

2006
Layered security design for mobile ad hoc networks.
Comput. Secur., 2006


  Loading...