Panos Kostakos

Orcid: 0000-0002-8545-599X

Affiliations:
  • University of Oulu, Center for Ubiquitous Computing, Finland


According to our database1, Panos Kostakos authored at least 40 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A novel Edge architecture and solution for detecting concept drift in smart environments.
Future Gener. Comput. Syst., January, 2024

CYGENT: A cybersecurity conversational agent with log summarization powered by GPT-3.
CoRR, 2024

Large language models in 6G security: challenges and opportunities.
CoRR, 2024

TSTEM: A Cognitive Platform for Collecting Cyber Threat Intelligence in the Wild.
CoRR, 2024

2023
Cyber Sentinel: Exploring Conversational Agents in Streamlining Security Tasks with GPT-4.
CoRR, 2023

HuntGPT: Integrating Machine Learning-Based Anomaly Detection and Explainable AI with Large Language Models (LLMs).
CoRR, 2023

Autonomous Federated Learning for Distributed Intrusion Detection Systems in Public Networks.
IEEE Access, 2023

PAC-GPT: A Novel Approach to Generating Synthetic Network Traffic With GPT-3.
IEEE Access, 2023

Analysis of Creative Engagement in AI Tools in Education Based on the #PPai6 Framework.
Proceedings of the Methodologies and Intelligent Systems for Technology Enhanced Learning, Workshops, 2023

Augmented Reality Integration for Real-Time Security and Maintenance in IoT-Enabled Smart Campuses.
Proceedings of the 31st IEEE International Conference on Network Protocols, 2023

DDoS attack detection using unsupervised federated learning for 5G networks and beyond.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

Cyber threat hunting using unsupervised federated learning and adversary emulation.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Transformer-based LLMs in Cybersecurity: An in-depth Study on Log Anomaly Detection and Conversational Defense Mechanisms.
Proceedings of the IEEE International Conference on Big Data, 2023

Hack the Room: Exploring the potential of an augmented reality game for teaching cyber security.
Proceedings of the Augmented Humans International Conference 2023, 2023

2022
A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection.
Sensors, 2022

Autonomy and Intelligence in the Computing Continuum: Challenges, Enablers, and Future Directions for Orchestration.
CoRR, 2022

2021
GPT-2C: A GPT-2 parser for Cowrie honeypot logs.
CoRR, 2021

Challenges and Solutions of Surveillance Systems in IoT-Enabled Smart Campus: A Survey.
IEEE Access, 2021

GPT-2C: a parser for honeypot logs using large pre-trained language models.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

Using smart glasses for monitoring cyber threat intelligence feeds.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

2020
On the use of distributed semantics of tweet metadata for user age prediction.
Future Gener. Comput. Syst., 2020

White Paper on 6G Drivers and the UN SDGs.
CoRR, 2020

MaTED: Metadata-Assisted Twitter Event Detection System.
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, 2020

Strings and Things: A Semantic Search Engine for news quotes using Named Entity Recognition.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
MAuto: Automatic Mobile Game Testing Tool Using Image-Matching Based Approach.
Comput. Games J., 2019

VR ethnography: a pilot study on the use of virtual reality 'go-along' interviews in Google street view.
Proceedings of the 18th International Conference on Mobile and Ubiquitous Multimedia, 2019

Implementing Big Data Lake for Heterogeneous Data Sources.
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019

Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

Crime Prediction Using Hotel Reviews?
Proceedings of the European Intelligence and Security Informatics Conference, 2019

2018
On the Use of URLs and Hashtags in Age Prediction of Twitter Users.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

Correlating Refugee Border Crossings with Internet Search Data.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

On Detecting Online Radicalization Using Natural Language Processing.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018

Inferring Demographic Data of Marginalized Users in Twitter with Computer Vision APIs.
Proceedings of the European Intelligence and Security Informatics Conference, 2018

SemanPhone: Combining Semantic and Phonetic Word Association in Verbal Learning Context.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Covert Online Ethnography and Machine Learning for Detecting Individuals at Risk of Being Drawn into Online Sex Work.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Meta-Terrorism: Identifying Linguistic Patterns in Public Discourse After an Attack.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
On Web Based Sentence Similarity for Paraphrasing Detection.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017

Catchem: A Browser Plugin for the Panama Papers Using Approximate String Matching.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

2010
Inferring social networks from physical interactions: a feasibility study.
Int. J. Pervasive Comput. Commun., 2010

2008
Intelligence gathering by capturing the social processes within prisons
CoRR, 2008


  Loading...