Survey in smart grid and smart home security: Issues, challenges and countermeasures N Komninos, E Philippou, A Pitsillides IEEE Communications Surveys & Tutorials 16 (4), 1933-1954, 2014 | 750 | 2014 |
Detecting unauthorized and compromised nodes in mobile ad hoc networks N Komninos, D Vergados, C Douligeris Ad Hoc Networks 5 (3), 289-298, 2007 | 114 | 2007 |
A new framework architecture for next generation e-health services MA Fengou, G Mantas, D Lymberopoulos, N Komninos, S Fengos, ... IEEE journal of biomedical and health informatics 17 (1), 9-18, 2012 | 83 | 2012 |
A study on the evolution of ransomware detection using machine learning and deep learning techniques DW Fernando, N Komninos, T Chen IoT 1 (2), 551-604, 2020 | 82 | 2020 |
Security for 5G communications G Mantas, N Komninos, J Rodriguez, E Logota, H Marques Fundamentals of 5G mobile networks, 207-220, 2015 | 78 | 2015 |
Survey of approaches and features for the identification of HTTP-based botnet traffic D Acarali, M Rajarajan, N Komninos, I Herwono Journal of network and computer applications 76, 1-15, 2016 | 73 | 2016 |
Security in smart home environment G Mantas, D Lymberopoulos, N Komninos Wireless Technologies for Ambient Assisted Living and Healthcare: Systems …, 2011 | 70 | 2011 |
Modelling the spread of botnet malware in IoT‐based wireless sensor networks D Acarali, M Rajarajan, N Komninos, BB Zarpelão Security and Communication Networks 2019 (1), 3745619, 2019 | 65 | 2019 |
Intrusion detection with neural networks and watermarking techniques for MANET A Mitrokotsa, N Komninos, C Douligeris IEEE International Conference on Pervasive Services, 118-127, 2007 | 65 | 2007 |
ForChaos: Real time application DDoS detection using forecasting and chaos theory in smart home IoT network A Procopiou, N Komninos, C Douligeris Wireless Communications and Mobile Computing 2019 (1), 8469410, 2019 | 61 | 2019 |
The lord of the sense: A privacy preserving reputation system for participatory sensing applications A Michalas, N Komninos 2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014 | 58 | 2014 |
Layered security design for mobile ad hoc networks N Komninos, D Vergados, C Douligeris computers & security 25 (2), 121-130, 2006 | 47 | 2006 |
Protecting biometric templates with image watermarking techniques N Komninos, T Dimitriou Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007 | 46 | 2007 |
LIDF: Layered intrusion detection framework for ad-hoc networks N Komninos, C Douligeris Ad Hoc Networks 7 (1), 171-182, 2009 | 43 | 2009 |
Degree-based clustering algorithms for wireless ad hoc networks under attack C Tselikis, S Mitropoulos, N Komninos, C Douligeris IEEE Communications Letters 16 (5), 619-621, 2012 | 42 | 2012 |
Trustee: A trust management system for fog-enabled cyber physical systems AK Junejo, N Komninos, M Sathiyanarayanan, BS Chowdhry IEEE transactions on emerging topics in computing 9 (4), 2030-2041, 2019 | 39 | 2019 |
New client puzzle approach for dos resistance in ad hoc networks A Michalas, N Komninos, NR Prasad, VA Oleshchuk 2010 IEEE International Conference on Information Theory and Information …, 2010 | 38 | 2010 |
Current and future threats framework in smart grid domain A Procopiou, N Komninos 2015 IEEE international conference on cyber technology in automation …, 2015 | 34 | 2015 |
Authentication in a layered security approach for mobile ad hoc networks N Komninos, DD Vergados, C Douligeris computers & security 26 (5), 373-380, 2007 | 29 | 2007 |
FeSA: Feature selection architecture for ransomware detection under concept drift DW Fernando, N Komninos Computers & Security 116, 102659, 2022 | 28 | 2022 |