Othonas Sultatos

Orcid: 0000-0002-3309-3202

According to our database1, Othonas Sultatos authored at least 14 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device.
IEEE Trans. Sustain. Comput., 2021

2020
MobileTrust: Secure Knowledge Integration in VANETs.
ACM Trans. Cyber Phys. Syst., 2020

2019
Secure Semantic Interoperability for IoT Applications with Linked Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Architectural Patterns for Secure IoT Orchestrations.
Proceedings of the 2019 Global IoT Summit, 2019

The THREAT-ARREST Cyber-Security Training Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Review of Security and Privacy for the Internet of Medical Things (IoMT).
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

End-to-End Semantic Interoperability Mechanisms for IoT.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

2018
XSACd - Cross-domain resource sharing & access control for smart environments.
Future Gener. Comput. Syst., 2018

The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park's SDN/NFV-enabled 5G industrial network.
Comput. Commun., 2018

Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

2016
Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Proceedings of the Information Security Theory and Practice, 2015

2014
Policy-based access control for DPWS-enabled ubiquitous devices.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014


  Loading...