Panagiotis I. Radoglou-Grammatikis

Orcid: 0000-0003-1605-9413

According to our database1, Panagiotis I. Radoglou-Grammatikis authored at least 75 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems.
IEEE Trans. Netw. Serv. Manag., August, 2025

Defending industrial internet of things against Modbus/TCP threats: A combined AI-based detection and SDN-based mitigation solution.
Int. J. Inf. Sec., August, 2025

Illicit object detection in X-ray imaging using deep learning techniques: A comparative evaluation.
CoRR, July, 2025

Visual Hand Gesture Recognition with Deep Learning: A Comprehensive Review of Methods, Datasets, Challenges and Future Research Directions.
CoRR, July, 2025

X-ray illicit object detection using hybrid CNN-transformer neural network architectures.
CoRR, May, 2025

Malware Detection in Docker Containers: An Image is Worth a Thousand Logs.
CoRR, April, 2025

Advances in diffusion models for image data augmentation: a review of methods, models, evaluation metrics and future research directions.
Artif. Intell. Rev., April, 2025

State of play and future directions in industrial computer vision AI standards.
CoRR, March, 2025

Federated Detection of Open Charge Point Protocol 1.6 Cyberattacks.
CoRR, February, 2025

Trustworthy Analytics in ETSI ZSM: A 5G Security Case Study.
IEEE Open J. Commun. Soc., 2025

A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutions.
Comput. Sci. Rev., 2025

A Novel Air-to-Ground Communication Scheme for Advanced Big Data Collection in Smart Farming Using UAVs.
IEEE Access, 2025

A Generalized Attention Deficit Disorder Chaotic Model With Soboleva Hyperbolic Tangent Functions.
Proceedings of the 14th International Conference on Modern Circuits and Systems Technologies, 2025

Public Space Security Management Using Digital Twin Technologies.
Proceedings of the 25th International Conference on Digital Signal Processing, 2025

Unlocking 5G Network Slicing: A Comprehensive Survey on Blockchain Marketplace Utilizing NFTs, AI, and Advanced Resource Management.
Proceedings of the IEEE International Conference on Consumer Electronics, 2025

Surrogate-Guided Adversarial Attacks: Enabling White-Box Methods in Black-Box Scenarios.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2025

Fortified Control-Plane Encapsulation with Session-Key Derivation for Secure IP Mesh Routing.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2025

2024
Channel-Aware QUIC Control for Enhanced CAM Communications in C-V2X Deployments Over Aerial Base Stations.
IEEE Trans. Veh. Technol., July, 2024

Strategic Honeypot Deployment in Ultra-Dense Beyond 5G Networks: A Reinforcement Learning Approach.
IEEE Trans. Emerg. Top. Comput., 2024

Leveraging the power of internet of things and artificial intelligence in forest fire prevention, detection, and restoration: A comprehensive survey.
Internet Things, 2024

Distributed intelligence in industrial and automotive cyber-physical systems: a review.
Frontiers Robotics AI, 2024

Evaluating the Energy Efficiency of Few-Shot Learning for Object Detection in Industrial Settings.
CoRR, 2024

Multimodal Explainable Artificial Intelligence: A Comprehensive Review of Methodological Advances and Future Research Directions.
IEEE Access, 2024

Towards Transparent AI-Powered Cybersecurity in Financial Systems: The Deployment of Federated Learning and Explainable AI in the CaixaBank pilot.
Proceedings of the IEEE International Conference on Data Mining, 2024

Advancements in Federated Learning for Health Applications: A Concise Survey.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

Autonomous AI-enabled Industrial Sorting Pipeline for Advanced Textile Recycling.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

Exploring Load Forecasting: Bridging Statistical Methods to Deep Learning Techniques in Real-World Environment.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

AI4COLLAB: An AI-based Threat Information Sharing Platform.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

AI-Driven Anomaly and Intrusion Detection in Energy Systems: Current Trends and Future Direction.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

Leveraging Digital Twin Technologies for Public Space Protection and Vulnerability Assessment.
Proceedings of the IEEE International Conference on Big Data, 2024

A Cloud-Based Key Rolling Technique for Alleviating Join Procedure Replay Attacks in LoRaWAN-based Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Big Data, 2024

AAG: Adversarial Attack Generator for evaluating the robustness of Machine Learning Models against Adversarial Attacks.
Proceedings of the IEEE International Conference on Big Data, 2024

2023


Introducing a New TCP Variant for UAV networks following comparative simulations.
Simul. Model. Pract. Theory, 2023

5G Core PFCP Intrusion Detection Dataset.
Proceedings of the 12th International Conference on Modern Circuits and Systems Technologies, 2023

5GCIDS: An Intrusion Detection System for 5G Core with AI and Explainability Mechanisms.
Proceedings of the IEEE Globecom Workshops 2023, 2023

5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks.
Proceedings of the IEEE Globecom Workshops 2023, 2023

False Data Injection Attacks Against High Voltage Transmission Systems.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023

Hunting IoT Cyberattacks With AI - Powered Intrusion Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

Explainable AI-based Intrusion Detection in the Internet of Things.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023


Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022



Modeling, Detecting, and Mitigating Threats Against Industrial Healthcare Systems: A Combined Software Defined Networking and Reinforcement Learning Approach.
IEEE Trans. Ind. Informatics, 2022

Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications.
EURASIP J. Wirel. Commun. Netw., 2022

Efficient Peer-to-Peer Unicasting for VANET Architectures via Enhanced Monolithic Protocols.
Proceedings of the 7th South-East Europe Design Automation, 2022

Dynamic Risk Assessment and Certification in the Power Grid: A Collaborative Approach.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022


Attacking and Defending DNP3 ICS/SCADA Systems.
Proceedings of the 18th International Conference on Distributed Computing in Sensor Systems, 2022

Risk Analysis of DNP3 Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Fault-Tolerant SDN Solution for Cybersecurity Applications.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture.
Digit., December, 2021

A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments.
IEEE Trans. Netw. Serv. Manag., 2021

SPEAR SIEM: A Security Information and Event Management system for the Smart Grid.
Comput. Networks, 2021

A Self-Learning Approach for Detecting Intrusions in Healthcare Systems.
Proceedings of the ICC 2021, 2021

TRUSTY: A Solution for Threat Hunting Using Data Analysis in Critical Infrastructures.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid.
Sensors, 2020

Game Theoretic Honeypot Deployment in Smart Grid.
Sensors, 2020

A compilation of UAV applications for precision agriculture.
Comput. Networks, 2020


An Anomaly Detection Mechanism for IEC 60870-5-104.
Proceedings of the 9th International Conference on Modern Circuits and Systems Technologies, 2020

Implementation and Detection of Modbus Cyberattacks.
Proceedings of the 9th International Conference on Modern Circuits and Systems Technologies, 2020

DIDEROT: an intrusion detection and prevention system for DNP3-based SCADA systems.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Securing the Internet of Things: Challenges, threats and solutions.
Internet Things, 2019

Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems.
IEEE Access, 2019

Attacking IEC-60870-5-104 SCADA Systems.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Operational Data Based Intrusion Detection System for Smart Grid.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

2018
An Overview of the Firewall Systems in the Smart Grid Paradigm.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

2017
Flow anomaly based intrusion detection system for Android mobile devices.
Proceedings of the 6th International Conference on Modern Circuits and Systems Technologies, 2017


  Loading...