Orestis Tsigkas

According to our database1, Orestis Tsigkas authored at least 8 papers between 2005 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Visual spam campaigns analysis using abstract graphs representation.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

A Novel Unsupervised Method for Securing BGP Against Routing Hijacks.
Proceedings of the Computer and Information Sciences III, 2012

Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in <i>k</i>-Partite Graphs.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2008
Providing QOS support at the distributed wireless MAC layer: a comprehensive study.
IEEE Wirel. Commun., 2008

An adaptive medium access control protocol using m-ary tree algorithms for quality-of-service support in single-cell ad hoc networks.
Ad Hoc Networks, 2008

2007
An Adaptive Mechanism for High Efficiency and Fairness in IEEE 802.11 Wireless Lans.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

2006
A Dynamic Priority MAC Protocol for Time-Bounded Services in Wireless Networks.
Wirel. Pers. Commun., 2006

2005
On the Service Differentiation Capabilities of EY-NPMA and 802.11 DCF.
Proceedings of the Wired/Wireless Internet Communications, Third International Conference, 2005


  Loading...