City Research Online

Items where Author is "Douligeris, C."

Up a level
Group by: Type | No Grouping
Number of items: 18.

Procopiou, A., Komninos, N. ORCID: 0000-0003-2776-1283 & Douligeris, C. (2019). ForChaos: Real Time Application DDoS detection using Forecasting and Chaos Theory in Smart Home IoT Network. Wireless Communications and Mobile Computing, 2019, pp. 1-14. doi: 10.1155/2019/8469410

Tselikis, C., Douligeris, C., Mitropoulos, S. , Komninos, N. & Tselikis, G. (2017). Adaptation of a Conference Key Distribution System for the Wireless Ad Hoc Network. 2017 IEEE International Conference on Communications (ICC), doi: 10.1109/ICC.2017.7996339

Komninos, N., Tselikis, C. & Douligeris, C. (2013). SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks. Paper presented at the 18th IEEE Symposium on Computers and Communication (ISCC’13), 07 - 10 July 2013, Croatia.

Georgakakis, E., Komninos, N. & Douligeris, C. (2012). NAVI: Novel authentication with visual information. 2012 IEEE Symposium on Computers and Communications (ISCC), 000588-000595. doi: 10.1109/ISCC.2012.6249360

Tselikis, C., Mitropoulos, S., Komninos, N. & Douligeris, C. (2012). Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack. IEEE Communications Letters, 16(5), pp. 619-621. doi: 10.1109/lcomm.2012.031912.112484

Georgakakis, E., Komninos, N. & Douligeris, C. (2012). NAVI: Novel authentication with visual information. In: ISCC. IEEE Symposium on Computers and Communications (ISCC), 1 - 4 July 2012, Cappadocia, Turkey. doi: 10.1109/ISCC.2012.6249360

Sabouri, A., Komninos, N. & Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 18th International Conference on Telecommunications, ICT 2011, pp. 422-427. doi: 10.1109/cts.2011.5898962

Mitrokotsa, A., Komninos, N. & Douligeris, C. (2010). Protection of an intrusion detection engine with watermarking in ad hoc networks. International Journal of Network Security, 10(2), pp. 93-106.

Tselikis, C., Mitropoulos, S., Douligeris, C. , Ladis, E., Georgouleas, K., Vangelatos, C. & Komninos, N. (2009). Empirical study of clustering algorithms for wireless ad hoc networks. In: 2009 16th International Conference on Systems, Signals and Image Processing, IWSSIP 2009. 16th International Conference on Systems, Signals and Image Processing (IWSSIP 2009), 18 - 20 June 2009, Chalkida, Greece.

Komninos, N. & Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7(1), pp. 171-182. doi: 10.1016/j.adhoc.2008.01.001

Tselikis, C., Douligeris, C., Mitropoulos, S. & Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. In: IWCMC 2008 - International Wireless Communications and Mobile Computing Conference. IWCMC 2008 - International Wireless Communications and Mobile Computing Conference, 6 - 8 August 2008, Crete, Greece.

Mitrokotsa, A., Komninos, N. & Douligeris, C. (2007). Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks. Paper presented at the The Sixth Annual Mediterranean Ad Hoc Networking WorkShop, 12th - 15th June 2007, Corfu, Greece.

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26(5), pp. 373-380. doi: 10.1016/j.cose.2006.12.011

Komninos, N., Vergados, D. & Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5(3), pp. 289-298. doi: 10.1016/j.adhoc.2005.11.005

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Multifold node authentication in mobile ad hoc networks. International Journal of Communication Systems, 20(12), pp. 1391-1406. doi: 10.1002/dac.882

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). A two‐step authentication framework for Mobile ad hoc networks. China Communications Journal, 4(1), pp. 28-39.

Komninos, N., Vergados, D. & Douligeris, C. (2006). Layered security design for mobile ad hoc networks. Computers & Security, 25(2), pp. 121-130. doi: 10.1016/j.cose.2005.09.005

Komninos, N., Vergados, D. D. & Douligeris, C. (2006). Two‐Step Authentication in Mobile Ad Hoc Networks. Paper presented at the Global Mobile Congress, 11-16 Oct 2006, Beijing, China.

This list was generated on Thu Mar 28 03:32:39 2024 UTC.