City Research Online

Items where Author is "Komninos, N."

Up a level
Group by: Type | No Grouping
Number of items: 61.

Article

Fernando, D. W. & Komninos, N. ORCID: 0000-0003-2776-1283 (2024). FeSAD ransomware detection framework with machine learning using adaption to concept drift. Computers & Security, 137, article number 103629. doi: 10.1016/j.cose.2023.103629

Behbehani, D., Komninos, N. ORCID: 0000-0003-2776-1283, Al-Begain, K. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2023). Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment. Journal of Cloud Computing, 12(1), article number 79. doi: 10.1186/s13677-023-00454-2

Haque, S., El-Moussa, F., Komninos, N. ORCID: 0000-0003-2776-1283 & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2023). A Systematic Review of Data-Driven Attack Detection Trends in IoT. Sensors, 23(16), article number 7191. doi: 10.3390/s23167191

Berry, C. & Komninos, N. ORCID: 0000-0003-2776-1283 (2022). Efficient Optimisation Framework for Convolutional Neural Networks with Secure Multiparty Computation. Computers and Security, 117, article number 102679. doi: 10.1016/j.cose.2022.102679

Fernando, D. W. & Komninos, N. ORCID: 0000-0003-2776-1283 (2022). FeSA: Feature Selection Architecture for Ransomware Detection Under Concept Drift. Computers & Security, 116, article number 102659. doi: 10.1016/j.cose.2022.102659

Junejo, A. K., Komninos, N. ORCID: 0000-0003-2776-1283, Sathiyanarayanan, M. ORCID: 0000-0002-8598-1949 & Chowdhry, B. S. (2021). Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems. IEEE Transactions on Emerging Topics in Computing, 9(4), pp. 2031-2041. doi: 10.1109/TETC.2019.2957394

Junejo, A. K., Komninos, N. ORCID: 0000-0003-2776-1283 & McCann, J. A. (2021). A Secure Integrated Framework for Fog-Assisted Internet of Things Systems. IEEE Internet of Things Journal, 8(8), pp. 6840-6852. doi: 10.1109/jiot.2020.3035474

Komninos, N., Saxena, N., Shen, H. , Raymond Choo, K-K. & Chaudhari, N. S. (2020). BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. IEEE Transactions on Dependable and Secure Computing, 17(3), pp. 550-565. doi: 10.1109/tdsc.2018.2799223

Junejo, A. K. & Komninos, N. ORCID: 0000-0003-2776-1283 (2020). A Lightweight Attribute-based Security Scheme for Fog-Enabled Cyber Physical Systems. Wireless Communications and Mobile Computing, 2020, pp. 1-18. doi: 10.1155/2020/2145829

Fernando, D. W., Komninos, N. ORCID: 0000-0003-2776-1283 & Chen, T. ORCID: 0000-0001-8037-1685 (2020). A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques. IoT, 1(2), pp. 551-604. doi: 10.3390/iot1020030

Procopiou, A., Komninos, N. ORCID: 0000-0003-2776-1283 & Douligeris, C. (2019). ForChaos: Real Time Application DDoS detection using Forecasting and Chaos Theory in Smart Home IoT Network. Wireless Communications and Mobile Computing, 2019, pp. 1-14. doi: 10.1155/2019/8469410

Acarali, D., Rajarajan, M., Komninos, N. ORCID: 0000-0003-2776-1283 & Zarpelao, B. (2019). Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Security and Communication Networks, 2019, pp. 1-13. doi: 10.1155/2019/3745619

Tselikis, C., Douligeris, C., Mitropoulos, S. , Komninos, N. & Tselikis, G. (2017). Adaptation of a Conference Key Distribution System for the Wireless Ad Hoc Network. 2017 IEEE International Conference on Communications (ICC), doi: 10.1109/ICC.2017.7996339

Acarali, D., Rajarajan, M., Komninos, N. & Herwono, I. (2016). Survey of Approaches and Features for the Identification of HTTP-Based Botnet Traffic. Journal of Network and Computer Applications, 76, pp. 1-15. doi: 10.1016/j.jnca.2016.10.007

Kamilaris, A., Pitsillides, A., Kondepudi, S. & Komninos, N. (2016). Privacy Concerns in Sharing Personal Consumption Data through Online Applications. 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), doi: 10.1109/IWCMC.2016.7577124

Komninos, N., Phillppou, E. & Pitsillides, A. (2014). Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures. Communications Surveys & Tutorials, 16(4), pp. 1933-1954. doi: 10.1109/comst.2014.2320093

Fengou, M. A., Mantas, G., Lymberopoulos, D. , Komninos, N., Fengos, S. & Lazarou, N. (2013). A new framework architecture for next generation e-Health services. IEEE Journal of Biomedical and Health Informatics, 17(1), pp. 9-18. doi: 10.1109/titb.2012.2224876

Georgakakis, E., Komninos, N. & Douligeris, C. (2012). NAVI: Novel authentication with visual information. 2012 IEEE Symposium on Computers and Communications (ISCC), 000588-000595. doi: 10.1109/ISCC.2012.6249360

Tselikis, C., Mitropoulos, S., Komninos, N. & Douligeris, C. (2012). Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack. IEEE Communications Letters, 16(5), pp. 619-621. doi: 10.1109/lcomm.2012.031912.112484

Mantas, G., Lymberopoulos, D. & Komninos, N. (2012). PKI security in large-scale healthcare networks. Journal of Medical Systems, 36(3), pp. 1107-1116. doi: 10.1007/s10916-010-9573-1

Michalas, A., Dimitriou, T., Giannetsos, T. , Komninos, N. & Prasad, N. R. (2012). Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Wireless Personal Communications, 66(3), pp. 559-575. doi: 10.1007/s11277-012-0734-z

Michalas, A., Komninos, N. & Prasad, N. R. (2011). Multiplayer game for DDoS attacks resilience in ad hoc networks. Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, pp. 1-5. doi: 10.1109/wirelessvitae.2011.5940931

Komninos, N. & Mantas, G. (2011). PEA: Polymorphic Encryption Algorithm based on quantum computation. International Journal of Systems, Control and Communications, 3(1), pp. 1-18. doi: 10.1504/ijscc.2011.039222

Sabouri, A., Komninos, N. & Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 18th International Conference on Telecommunications, ICT 2011, 1, pp. 422-427. doi: 10.1109/cts.2011.5898962

Michalas, A., Komninos, N., Prasad, N. R. & Oleshchuk, V. A. (2010). New client puzzle approach for DoS resistance in ad hoc networks. Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, pp. 568-573. doi: 10.1109/icitis.2010.5689528

Mitrokotsa, A., Komninos, N. & Douligeris, C. (2010). Protection of an intrusion detection engine with watermarking in ad hoc networks. International Journal of Network Security, 10(2), pp. 93-106.

Mantas, G., Lymberopoulos, D. & Komninos, N. (2010). A new framework for ubiquitous context-aware healthcare applications. Proceedings of the IEEE/EMBS Region 8 International Conference on Information Technology Applications in Biomedicine, ITAB, 3468, pp. 1-4. doi: 10.1109/itab.2010.5687758

Komninos, N. & Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7(1), pp. 171-182. doi: 10.1016/j.adhoc.2008.01.001

Komninos, N. & Mantas, G. (2008). Efficient group key agreement & recovery in ad hoc networks. IET Conference Publications(545 CP), pp. 25-28. doi: 10.1049/cp:20080928

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26(5), pp. 373-380. doi: 10.1016/j.cose.2006.12.011

Komninos, N., Vergados, D. & Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5(3), pp. 289-298. doi: 10.1016/j.adhoc.2005.11.005

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Multifold node authentication in mobile ad hoc networks. International Journal of Communication Systems, 20(12), pp. 1391-1406. doi: 10.1002/dac.882

Komninos, N. & Dimitriou, T. (2007). Protecting biometric templates with image watermarking techniques. Advances in Biometrics: Lecture Notes in Computer Science, 4642, pp. 114-123. doi: 10.1007/978-3-540-74549-5_13

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). A two‐step authentication framework for Mobile ad hoc networks. China Communications Journal, 4(1), pp. 28-39.

Komninos, N., Vergados, D. & Douligeris, C. (2006). Layered security design for mobile ad hoc networks. Computers & Security, 25(2), pp. 121-130. doi: 10.1016/j.cose.2005.09.005

Book Section

Procopiou, A. & Komninos, N. ORCID: 0000-0003-2776-1283 (2019). Bio/Nature-inspired algorithms in A.I. for malicious activity detection. In: El-Alfy, E-S. M., Elroweissy, M., Fulp, E. W. & Mazurczyk, W. (Eds.), Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applications. . IET.

Mantas, G., Komninos, N., Rodriuez, J. , Logota, E. & Marques, H. (2015). Security for 5G Communications. In: Rodriguez, J. (Ed.), Fundamentals of 5G Mobile Networks. (pp. 207-220). John Wiley & Sons, Ltd.. doi: 10.1002/9781118867464.ch9

Conference or Workshop Item

Acarali, D., Rajarajan, M. & Komninos, N. ORCID: 0000-0003-2776-1283 (2018). Evaluating the Provision of Botnet Defences using Translational Research Concepts. In: Samarati, P. & Obaidat, M. S. (Eds.), Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018) - Volume 2: SECRYPT. 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018, 26 - 27 July 2018, Porto, Portugal. doi: 10.5220/0006884405140519

Procopiou, A. & Komninos, N. (2015). Current and Future Threats Framework in Smart Grid Domain. Paper presented at the 5th Annual IEEE International Conference on CYBER Technology in Automation Control and Intelligence Systems, 8-06-2015 - 12-06-2015, Shenyang, China.

Komninos, N. & Junejo, A. K. (2015). Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment. Paper presented at the 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15), 07-12-2015 - 09-12-2015, Limassol, Cyprus.

Mourouzis, T., Courtois, N. & Komninos, N. (2014). Advanced truncated differential cryptanalysis of GOST block cipher. Paper presented at the 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces, 1st - 2nd April 2014, Hellenic Military Academy, Athens, Greece.

Michalas, A. & Komninos, N. (2014). The Lord of the Sense: A Privacy Preserving Reputation System for Participatory Sensing Applications. Paper presented at the 19th IEEE Symposium on Computers and Communication (ISCC’2014), 23rd - 26th June 2014, Madeira, Portugal.

Mourouzis, T., Komninos, N. & Christofi, M. (2014). Towards a combined Rotational-Differential Cryptanalytic Framework. Paper presented at the 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces, 1st - 2nd April 2014, Hellenic Military Academy, Athens, Greece.

Komninos, N., Tselikis, C. & Douligeris, C. (2013). SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks. Paper presented at the 18th IEEE Symposium on Computers and Communication (ISCC’13), 07 - 10 July 2013, Croatia.

Georgakakis, E., Komninos, N. & Douligeris, C. (2012). NAVI: Novel authentication with visual information. In: ISCC. IEEE Symposium on Computers and Communications (ISCC), 1 - 4 July 2012, Cappadocia, Turkey. doi: 10.1109/ISCC.2012.6249360

Michalas, A., Bakopoulos, M., Komninos, N. & Prasad, N. R. (2012). Secure & trusted communication in emergency situations. In: 35th IEEE Sarnoff Symposium, SARNOFF 2012 - Conference Proceedings. 35th IEEE Sarnoff Symposium (SARNOFF), 21 - 22 May 2012, Newark, USA. doi: 10.1109/SARNOF.2012.6222751

Michalas, A., Oleshchuk, V. A., Komninos, N. & Prasad, N. R. (2011). Privacy-preserving scheme for mobile ad hoc networks. In: ISCC. 2011 IEEE Symposium on Computers and Communications (ISCC), 28 June - 1 July 2011, Kerkyra, Greece. doi: 10.1109/ISCC.2011.5983930

Fengou, M. A., Mantas, G., Lymberopoulos, D. & Komninos, N. (2011). Ubiquitous healthcare profile management applying smart card technology. In: Nikita, KS, Lin, JC, Fotiadis, DI & Waldmeyer, MTA (Eds.), MobiHealth. Second International ICST Conference, MobiHealth 2011, 5 - 7 October 2011, Kos Island, Greece. doi: 10.1007/978-3-642-29734-2_34

Tselikis, C., Mitropoulos, S., Douligeris, C. , Ladis, E., Georgouleas, K., Vangelatos, C. & Komninos, N. (2009). Empirical study of clustering algorithms for wireless ad hoc networks. In: 2009 16th International Conference on Systems, Signals and Image Processing, IWSSIP 2009. 16th International Conference on Systems, Signals and Image Processing (IWSSIP 2009), 18 - 20 June 2009, Chalkida, Greece.

Tselikis, C., Douligeris, C., Mitropoulos, S. & Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. In: IWCMC 2008 - International Wireless Communications and Mobile Computing Conference. IWCMC 2008 - International Wireless Communications and Mobile Computing Conference, 6 - 8 August 2008, Crete, Greece.

Mitrokotsa, A., Komninos, N. & Douligeris, C. (2007). Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks. Paper presented at the The Sixth Annual Mediterranean Ad Hoc Networking WorkShop, 12th - 15th June 2007, Corfu, Greece.

Komninos, N., Soroush, H. & Salajegheh, M. (2007). LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.

Komninos, N. (2007). Morpheus: stream cipher for software & hardware applications. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.

Komninos, N. & Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04 - 08 June 2006, Mykonos, Greece.

Komninos, N., Vergados, D. D. & Douligeris, C. (2006). Two‐Step Authentication in Mobile Ad Hoc Networks. Paper presented at the Global Mobile Congress, 11-16 Oct 2006, Beijing, China.

Komninos, N. & Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. Paper presented at the 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.

Komninos, N. & Honary, B. (2002). Security enhancement for A5/1 without losing hardware efficiency in future mobile systems. In: IEE Conference Publication. 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.

Komninos, N. & Honary, B. (2001). Modified WAP for secure voice and video communication. In: IEE Conference Publication. 2nd IEE International Conference on 3G Mobile Communication Technologies, 26 - 28 March 2001, London.

Komninos, N., Samarakoon, M. I. & Honary, B. (2000). Authentication and key distribution for wired and wireless systems. Paper presented at the 1st Annual Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 19 - 20 June 2000, Liverpool John Moores University, Liverpool, UK.

Komninos, N., Honary, B. & Darnell, M. (2000). Secure communication protocol for mobile multimedia applications. Paper presented at the 3rd International Symposium on Wireless Personal Multimedia Communications (WPMC’2000), 12 - 15 November 2000, Bangkok, Thailand.

Other

Mourouzis, T., Wojcik, M. & Komninos, N. (2016). On The Security Evaluation of Partial Password Implementations.

This list was generated on Sun Oct 13 03:07:57 2024 UTC.